Oct 31 01:33:23.668467 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Oct 30 23:32:41 -00 2025 Oct 31 01:33:23.668482 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 01:33:23.668489 kernel: Disabled fast string operations Oct 31 01:33:23.668493 kernel: BIOS-provided physical RAM map: Oct 31 01:33:23.668496 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Oct 31 01:33:23.668500 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Oct 31 01:33:23.668506 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Oct 31 01:33:23.668510 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Oct 31 01:33:23.668515 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Oct 31 01:33:23.668519 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Oct 31 01:33:23.668523 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Oct 31 01:33:23.668527 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Oct 31 01:33:23.668531 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Oct 31 01:33:23.668535 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Oct 31 01:33:23.668545 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Oct 31 01:33:23.668550 kernel: NX (Execute Disable) protection: active Oct 31 01:33:23.668554 kernel: SMBIOS 2.7 present. Oct 31 01:33:23.668559 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Oct 31 01:33:23.668564 kernel: vmware: hypercall mode: 0x00 Oct 31 01:33:23.668568 kernel: Hypervisor detected: VMware Oct 31 01:33:23.668573 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Oct 31 01:33:23.668578 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Oct 31 01:33:23.668582 kernel: vmware: using clock offset of 8464964125 ns Oct 31 01:33:23.668587 kernel: tsc: Detected 3408.000 MHz processor Oct 31 01:33:23.668592 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 31 01:33:23.668597 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 31 01:33:23.668602 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Oct 31 01:33:23.668606 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 31 01:33:23.668611 kernel: total RAM covered: 3072M Oct 31 01:33:23.668616 kernel: Found optimal setting for mtrr clean up Oct 31 01:33:23.668622 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Oct 31 01:33:23.668626 kernel: Using GB pages for direct mapping Oct 31 01:33:23.668631 kernel: ACPI: Early table checksum verification disabled Oct 31 01:33:23.668635 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Oct 31 01:33:23.668640 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Oct 31 01:33:23.668644 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Oct 31 01:33:23.668649 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Oct 31 01:33:23.668653 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Oct 31 01:33:23.668658 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Oct 31 01:33:23.668664 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Oct 31 01:33:23.668671 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Oct 31 01:33:23.668675 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Oct 31 01:33:23.668680 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Oct 31 01:33:23.668685 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Oct 31 01:33:23.668691 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Oct 31 01:33:23.668696 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Oct 31 01:33:23.668701 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Oct 31 01:33:23.668706 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Oct 31 01:33:23.668711 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Oct 31 01:33:23.668716 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Oct 31 01:33:23.668721 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Oct 31 01:33:23.668725 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Oct 31 01:33:23.668730 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Oct 31 01:33:23.668736 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Oct 31 01:33:23.668741 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Oct 31 01:33:23.668746 kernel: system APIC only can use physical flat Oct 31 01:33:23.668750 kernel: Setting APIC routing to physical flat. Oct 31 01:33:23.668755 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 31 01:33:23.668760 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Oct 31 01:33:23.668765 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Oct 31 01:33:23.668770 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Oct 31 01:33:23.668774 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Oct 31 01:33:23.668780 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Oct 31 01:33:23.668785 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Oct 31 01:33:23.668790 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Oct 31 01:33:23.668794 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Oct 31 01:33:23.668799 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Oct 31 01:33:23.668804 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Oct 31 01:33:23.668809 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Oct 31 01:33:23.668813 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Oct 31 01:33:23.668818 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Oct 31 01:33:23.668823 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Oct 31 01:33:23.668829 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Oct 31 01:33:23.668834 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Oct 31 01:33:23.668838 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Oct 31 01:33:23.668843 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Oct 31 01:33:23.668848 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Oct 31 01:33:23.668853 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Oct 31 01:33:23.668858 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Oct 31 01:33:23.668863 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Oct 31 01:33:23.668867 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Oct 31 01:33:23.668873 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Oct 31 01:33:23.668878 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Oct 31 01:33:23.668883 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Oct 31 01:33:23.668888 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Oct 31 01:33:23.668892 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Oct 31 01:33:23.668897 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Oct 31 01:33:23.668902 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Oct 31 01:33:23.668907 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Oct 31 01:33:23.668912 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Oct 31 01:33:23.668916 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Oct 31 01:33:23.668922 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Oct 31 01:33:23.668927 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Oct 31 01:33:23.668932 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Oct 31 01:33:23.668937 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Oct 31 01:33:23.668942 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Oct 31 01:33:23.668946 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Oct 31 01:33:23.668951 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Oct 31 01:33:23.668956 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Oct 31 01:33:23.668961 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Oct 31 01:33:23.668967 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Oct 31 01:33:23.668971 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Oct 31 01:33:23.668985 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Oct 31 01:33:23.669002 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Oct 31 01:33:23.669007 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Oct 31 01:33:23.669012 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Oct 31 01:33:23.669017 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Oct 31 01:33:23.669022 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Oct 31 01:33:23.669027 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Oct 31 01:33:23.669032 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Oct 31 01:33:23.669038 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Oct 31 01:33:23.669043 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Oct 31 01:33:23.669048 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Oct 31 01:33:23.669053 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Oct 31 01:33:23.669058 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Oct 31 01:33:23.669062 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Oct 31 01:33:23.669067 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Oct 31 01:33:23.669072 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Oct 31 01:33:23.669082 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Oct 31 01:33:23.669087 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Oct 31 01:33:23.669092 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Oct 31 01:33:23.669097 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Oct 31 01:33:23.669103 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Oct 31 01:33:23.669108 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Oct 31 01:33:23.669113 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Oct 31 01:33:23.669119 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Oct 31 01:33:23.669124 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Oct 31 01:33:23.669129 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Oct 31 01:33:23.669135 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Oct 31 01:33:23.669140 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Oct 31 01:33:23.669145 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Oct 31 01:33:23.669151 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Oct 31 01:33:23.669156 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Oct 31 01:33:23.669161 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Oct 31 01:33:23.669166 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Oct 31 01:33:23.669171 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Oct 31 01:33:23.669176 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Oct 31 01:33:23.669182 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Oct 31 01:33:23.669188 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Oct 31 01:33:23.669193 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Oct 31 01:33:23.669198 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Oct 31 01:33:23.669203 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Oct 31 01:33:23.669208 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Oct 31 01:33:23.669213 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Oct 31 01:33:23.669218 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Oct 31 01:33:23.669223 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Oct 31 01:33:23.669228 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Oct 31 01:33:23.669235 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Oct 31 01:33:23.669240 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Oct 31 01:33:23.669245 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Oct 31 01:33:23.669250 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Oct 31 01:33:23.669255 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Oct 31 01:33:23.669260 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Oct 31 01:33:23.669265 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Oct 31 01:33:23.669271 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Oct 31 01:33:23.669276 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Oct 31 01:33:23.669282 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Oct 31 01:33:23.669287 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Oct 31 01:33:23.669292 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Oct 31 01:33:23.669297 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Oct 31 01:33:23.669302 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Oct 31 01:33:23.669307 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Oct 31 01:33:23.669312 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Oct 31 01:33:23.669317 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Oct 31 01:33:23.669322 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Oct 31 01:33:23.669328 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Oct 31 01:33:23.669334 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Oct 31 01:33:23.669339 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Oct 31 01:33:23.669344 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Oct 31 01:33:23.669349 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Oct 31 01:33:23.669354 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Oct 31 01:33:23.669359 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Oct 31 01:33:23.669365 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Oct 31 01:33:23.669370 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Oct 31 01:33:23.669375 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Oct 31 01:33:23.669381 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Oct 31 01:33:23.669386 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Oct 31 01:33:23.669391 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Oct 31 01:33:23.669396 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Oct 31 01:33:23.669401 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Oct 31 01:33:23.669406 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Oct 31 01:33:23.669412 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Oct 31 01:33:23.669417 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Oct 31 01:33:23.669422 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Oct 31 01:33:23.669427 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Oct 31 01:33:23.669433 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Oct 31 01:33:23.669438 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Oct 31 01:33:23.669444 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Oct 31 01:33:23.669449 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Oct 31 01:33:23.669454 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Oct 31 01:33:23.669460 kernel: Zone ranges: Oct 31 01:33:23.669465 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 31 01:33:23.669470 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Oct 31 01:33:23.669476 kernel: Normal empty Oct 31 01:33:23.669482 kernel: Movable zone start for each node Oct 31 01:33:23.669487 kernel: Early memory node ranges Oct 31 01:33:23.669492 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Oct 31 01:33:23.669497 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Oct 31 01:33:23.669503 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Oct 31 01:33:23.669508 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Oct 31 01:33:23.669513 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 31 01:33:23.669518 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Oct 31 01:33:23.669524 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Oct 31 01:33:23.669530 kernel: ACPI: PM-Timer IO Port: 0x1008 Oct 31 01:33:23.669535 kernel: system APIC only can use physical flat Oct 31 01:33:23.669549 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Oct 31 01:33:23.669557 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Oct 31 01:33:23.669564 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Oct 31 01:33:23.669571 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Oct 31 01:33:23.669578 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Oct 31 01:33:23.669585 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Oct 31 01:33:23.669593 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Oct 31 01:33:23.669601 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Oct 31 01:33:23.669608 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Oct 31 01:33:23.669613 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Oct 31 01:33:23.669619 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Oct 31 01:33:23.669624 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Oct 31 01:33:23.669629 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Oct 31 01:33:23.669634 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Oct 31 01:33:23.669639 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Oct 31 01:33:23.669645 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Oct 31 01:33:23.669650 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Oct 31 01:33:23.669656 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Oct 31 01:33:23.669661 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Oct 31 01:33:23.669666 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Oct 31 01:33:23.669671 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Oct 31 01:33:23.669677 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Oct 31 01:33:23.669682 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Oct 31 01:33:23.669687 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Oct 31 01:33:23.669692 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Oct 31 01:33:23.669697 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Oct 31 01:33:23.669703 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Oct 31 01:33:23.669709 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Oct 31 01:33:23.669714 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Oct 31 01:33:23.669719 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Oct 31 01:33:23.669724 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Oct 31 01:33:23.669729 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Oct 31 01:33:23.669735 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Oct 31 01:33:23.669740 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Oct 31 01:33:23.669745 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Oct 31 01:33:23.669750 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Oct 31 01:33:23.669756 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Oct 31 01:33:23.669762 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Oct 31 01:33:23.669767 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Oct 31 01:33:23.669772 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Oct 31 01:33:23.669777 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Oct 31 01:33:23.669782 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Oct 31 01:33:23.669787 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Oct 31 01:33:23.669793 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Oct 31 01:33:23.669798 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Oct 31 01:33:23.669804 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Oct 31 01:33:23.669809 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Oct 31 01:33:23.669814 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Oct 31 01:33:23.669820 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Oct 31 01:33:23.669825 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Oct 31 01:33:23.669830 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Oct 31 01:33:23.669835 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Oct 31 01:33:23.669841 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Oct 31 01:33:23.669846 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Oct 31 01:33:23.669852 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Oct 31 01:33:23.669857 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Oct 31 01:33:23.669862 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Oct 31 01:33:23.669867 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Oct 31 01:33:23.669872 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Oct 31 01:33:23.669878 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Oct 31 01:33:23.669883 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Oct 31 01:33:23.669888 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Oct 31 01:33:23.669893 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Oct 31 01:33:23.669900 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Oct 31 01:33:23.669905 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Oct 31 01:33:23.669910 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Oct 31 01:33:23.669915 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Oct 31 01:33:23.669921 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Oct 31 01:33:23.669926 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Oct 31 01:33:23.669931 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Oct 31 01:33:23.669936 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Oct 31 01:33:23.669941 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Oct 31 01:33:23.669946 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Oct 31 01:33:23.669953 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Oct 31 01:33:23.669958 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Oct 31 01:33:23.669963 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Oct 31 01:33:23.669968 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Oct 31 01:33:23.669973 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Oct 31 01:33:23.669996 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Oct 31 01:33:23.670001 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Oct 31 01:33:23.670006 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Oct 31 01:33:23.670012 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Oct 31 01:33:23.670018 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Oct 31 01:33:23.670028 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Oct 31 01:33:23.670036 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Oct 31 01:33:23.670042 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Oct 31 01:33:23.670047 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Oct 31 01:33:23.670052 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Oct 31 01:33:23.670057 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Oct 31 01:33:23.670062 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Oct 31 01:33:23.670067 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Oct 31 01:33:23.670074 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Oct 31 01:33:23.670079 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Oct 31 01:33:23.670084 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Oct 31 01:33:23.670089 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Oct 31 01:33:23.670094 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Oct 31 01:33:23.670099 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Oct 31 01:33:23.670105 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Oct 31 01:33:23.670110 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Oct 31 01:33:23.670115 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Oct 31 01:33:23.670121 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Oct 31 01:33:23.670126 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Oct 31 01:33:23.670131 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Oct 31 01:33:23.670137 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Oct 31 01:33:23.670142 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Oct 31 01:33:23.670147 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Oct 31 01:33:23.670152 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Oct 31 01:33:23.670157 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Oct 31 01:33:23.670163 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Oct 31 01:33:23.670169 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Oct 31 01:33:23.670174 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Oct 31 01:33:23.670179 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Oct 31 01:33:23.670184 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Oct 31 01:33:23.670189 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Oct 31 01:33:23.670194 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Oct 31 01:33:23.670199 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Oct 31 01:33:23.670204 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Oct 31 01:33:23.670210 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Oct 31 01:33:23.670215 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Oct 31 01:33:23.670221 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Oct 31 01:33:23.670226 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Oct 31 01:33:23.670231 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Oct 31 01:33:23.670236 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Oct 31 01:33:23.670241 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Oct 31 01:33:23.670247 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Oct 31 01:33:23.670252 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Oct 31 01:33:23.670257 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Oct 31 01:33:23.670262 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Oct 31 01:33:23.670268 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Oct 31 01:33:23.670274 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Oct 31 01:33:23.670279 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 31 01:33:23.670284 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Oct 31 01:33:23.670290 kernel: TSC deadline timer available Oct 31 01:33:23.670295 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Oct 31 01:33:23.670300 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Oct 31 01:33:23.670305 kernel: Booting paravirtualized kernel on VMware hypervisor Oct 31 01:33:23.670311 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 31 01:33:23.670317 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Oct 31 01:33:23.670322 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Oct 31 01:33:23.670328 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Oct 31 01:33:23.670333 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Oct 31 01:33:23.670338 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Oct 31 01:33:23.670343 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Oct 31 01:33:23.670348 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Oct 31 01:33:23.670353 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Oct 31 01:33:23.670358 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Oct 31 01:33:23.670364 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Oct 31 01:33:23.670376 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Oct 31 01:33:23.670383 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Oct 31 01:33:23.670388 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Oct 31 01:33:23.670394 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Oct 31 01:33:23.670399 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Oct 31 01:33:23.670405 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Oct 31 01:33:23.670410 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Oct 31 01:33:23.670415 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Oct 31 01:33:23.670422 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Oct 31 01:33:23.670427 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Oct 31 01:33:23.670433 kernel: Policy zone: DMA32 Oct 31 01:33:23.670439 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 01:33:23.670445 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 31 01:33:23.670451 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Oct 31 01:33:23.670456 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Oct 31 01:33:23.670462 kernel: printk: log_buf_len min size: 262144 bytes Oct 31 01:33:23.670468 kernel: printk: log_buf_len: 1048576 bytes Oct 31 01:33:23.670474 kernel: printk: early log buf free: 239728(91%) Oct 31 01:33:23.670479 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 31 01:33:23.670485 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 31 01:33:23.670491 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 31 01:33:23.670497 kernel: Memory: 1940392K/2096628K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 155976K reserved, 0K cma-reserved) Oct 31 01:33:23.670503 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Oct 31 01:33:23.670508 kernel: ftrace: allocating 34614 entries in 136 pages Oct 31 01:33:23.670515 kernel: ftrace: allocated 136 pages with 2 groups Oct 31 01:33:23.670522 kernel: rcu: Hierarchical RCU implementation. Oct 31 01:33:23.670527 kernel: rcu: RCU event tracing is enabled. Oct 31 01:33:23.670533 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Oct 31 01:33:23.670539 kernel: Rude variant of Tasks RCU enabled. Oct 31 01:33:23.670544 kernel: Tracing variant of Tasks RCU enabled. Oct 31 01:33:23.670551 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 31 01:33:23.670557 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Oct 31 01:33:23.670562 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Oct 31 01:33:23.670568 kernel: random: crng init done Oct 31 01:33:23.670573 kernel: Console: colour VGA+ 80x25 Oct 31 01:33:23.670579 kernel: printk: console [tty0] enabled Oct 31 01:33:23.670584 kernel: printk: console [ttyS0] enabled Oct 31 01:33:23.670590 kernel: ACPI: Core revision 20210730 Oct 31 01:33:23.670596 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Oct 31 01:33:23.670602 kernel: APIC: Switch to symmetric I/O mode setup Oct 31 01:33:23.670609 kernel: x2apic enabled Oct 31 01:33:23.670615 kernel: Switched APIC routing to physical x2apic. Oct 31 01:33:23.670620 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Oct 31 01:33:23.670626 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Oct 31 01:33:23.670632 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Oct 31 01:33:23.670637 kernel: Disabled fast string operations Oct 31 01:33:23.670643 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 31 01:33:23.670649 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 Oct 31 01:33:23.670655 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 31 01:33:23.670662 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Oct 31 01:33:23.670668 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Oct 31 01:33:23.670673 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Oct 31 01:33:23.670679 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Oct 31 01:33:23.670685 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Oct 31 01:33:23.670690 kernel: RETBleed: Mitigation: Enhanced IBRS Oct 31 01:33:23.670696 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 31 01:33:23.670702 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 31 01:33:23.670708 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 31 01:33:23.670714 kernel: SRBDS: Unknown: Dependent on hypervisor status Oct 31 01:33:23.670719 kernel: GDS: Unknown: Dependent on hypervisor status Oct 31 01:33:23.670725 kernel: active return thunk: its_return_thunk Oct 31 01:33:23.670730 kernel: ITS: Mitigation: Aligned branch/return thunks Oct 31 01:33:23.670736 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 31 01:33:23.670742 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 31 01:33:23.670747 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 31 01:33:23.670753 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 31 01:33:23.670759 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Oct 31 01:33:23.670765 kernel: Freeing SMP alternatives memory: 32K Oct 31 01:33:23.670771 kernel: pid_max: default: 131072 minimum: 1024 Oct 31 01:33:23.670776 kernel: LSM: Security Framework initializing Oct 31 01:33:23.670782 kernel: SELinux: Initializing. Oct 31 01:33:23.670788 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 31 01:33:23.670794 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 31 01:33:23.670802 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Oct 31 01:33:23.670811 kernel: Performance Events: Skylake events, core PMU driver. Oct 31 01:33:23.670821 kernel: core: CPUID marked event: 'cpu cycles' unavailable Oct 31 01:33:23.670830 kernel: core: CPUID marked event: 'instructions' unavailable Oct 31 01:33:23.670836 kernel: core: CPUID marked event: 'bus cycles' unavailable Oct 31 01:33:23.670842 kernel: core: CPUID marked event: 'cache references' unavailable Oct 31 01:33:23.670847 kernel: core: CPUID marked event: 'cache misses' unavailable Oct 31 01:33:23.670852 kernel: core: CPUID marked event: 'branch instructions' unavailable Oct 31 01:33:23.670858 kernel: core: CPUID marked event: 'branch misses' unavailable Oct 31 01:33:23.670863 kernel: ... version: 1 Oct 31 01:33:23.670870 kernel: ... bit width: 48 Oct 31 01:33:23.670875 kernel: ... generic registers: 4 Oct 31 01:33:23.670881 kernel: ... value mask: 0000ffffffffffff Oct 31 01:33:23.670887 kernel: ... max period: 000000007fffffff Oct 31 01:33:23.670892 kernel: ... fixed-purpose events: 0 Oct 31 01:33:23.670898 kernel: ... event mask: 000000000000000f Oct 31 01:33:23.670903 kernel: signal: max sigframe size: 1776 Oct 31 01:33:23.670909 kernel: rcu: Hierarchical SRCU implementation. Oct 31 01:33:23.670914 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 31 01:33:23.670920 kernel: smp: Bringing up secondary CPUs ... Oct 31 01:33:23.670927 kernel: x86: Booting SMP configuration: Oct 31 01:33:23.670932 kernel: .... node #0, CPUs: #1 Oct 31 01:33:23.670938 kernel: Disabled fast string operations Oct 31 01:33:23.670943 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Oct 31 01:33:23.670949 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Oct 31 01:33:23.670954 kernel: smp: Brought up 1 node, 2 CPUs Oct 31 01:33:23.670961 kernel: smpboot: Max logical packages: 128 Oct 31 01:33:23.670967 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Oct 31 01:33:23.670972 kernel: devtmpfs: initialized Oct 31 01:33:23.670987 kernel: x86/mm: Memory block size: 128MB Oct 31 01:33:23.670995 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Oct 31 01:33:23.671001 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 31 01:33:23.671007 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Oct 31 01:33:23.671012 kernel: pinctrl core: initialized pinctrl subsystem Oct 31 01:33:23.671018 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 31 01:33:23.671024 kernel: audit: initializing netlink subsys (disabled) Oct 31 01:33:23.671030 kernel: audit: type=2000 audit(1761874402.104:1): state=initialized audit_enabled=0 res=1 Oct 31 01:33:23.671036 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 31 01:33:23.671041 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 31 01:33:23.671048 kernel: cpuidle: using governor menu Oct 31 01:33:23.671054 kernel: Simple Boot Flag at 0x36 set to 0x80 Oct 31 01:33:23.671059 kernel: ACPI: bus type PCI registered Oct 31 01:33:23.671065 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 31 01:33:23.671070 kernel: dca service started, version 1.12.1 Oct 31 01:33:23.671076 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Oct 31 01:33:23.671082 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Oct 31 01:33:23.671087 kernel: PCI: Using configuration type 1 for base access Oct 31 01:33:23.671093 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 31 01:33:23.671100 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 31 01:33:23.671105 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 31 01:33:23.671112 kernel: ACPI: Added _OSI(Module Device) Oct 31 01:33:23.671119 kernel: ACPI: Added _OSI(Processor Device) Oct 31 01:33:23.671124 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 31 01:33:23.671130 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 31 01:33:23.671136 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 31 01:33:23.671141 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 31 01:33:23.671147 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 31 01:33:23.671153 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Oct 31 01:33:23.671159 kernel: ACPI: Interpreter enabled Oct 31 01:33:23.671165 kernel: ACPI: PM: (supports S0 S1 S5) Oct 31 01:33:23.671170 kernel: ACPI: Using IOAPIC for interrupt routing Oct 31 01:33:23.671176 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 31 01:33:23.671181 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Oct 31 01:33:23.671187 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Oct 31 01:33:23.671266 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 31 01:33:23.671321 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Oct 31 01:33:23.671369 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Oct 31 01:33:23.671377 kernel: PCI host bridge to bus 0000:00 Oct 31 01:33:23.671425 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 31 01:33:23.671469 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000dbfff window] Oct 31 01:33:23.671512 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 31 01:33:23.671557 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 31 01:33:23.671600 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Oct 31 01:33:23.671646 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Oct 31 01:33:23.671703 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Oct 31 01:33:23.671763 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Oct 31 01:33:23.671818 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Oct 31 01:33:23.671874 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Oct 31 01:33:23.671924 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Oct 31 01:33:23.672022 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Oct 31 01:33:23.672072 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Oct 31 01:33:23.672120 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Oct 31 01:33:23.672167 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Oct 31 01:33:23.672219 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Oct 31 01:33:23.672269 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Oct 31 01:33:23.672317 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Oct 31 01:33:23.672369 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Oct 31 01:33:23.672418 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Oct 31 01:33:23.672465 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Oct 31 01:33:23.672518 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Oct 31 01:33:23.672573 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Oct 31 01:33:23.672625 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Oct 31 01:33:23.672672 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Oct 31 01:33:23.672723 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Oct 31 01:33:23.672775 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 31 01:33:23.672834 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Oct 31 01:33:23.672887 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.672939 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.673009 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.673066 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.673119 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.673168 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.673221 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.673273 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.673325 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.673373 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.673425 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.673473 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.673525 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.673573 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.673627 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.673676 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.673727 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.673775 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.673828 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.673879 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.673933 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.673991 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.674047 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.674096 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.674148 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.674200 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.674251 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.674300 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.674354 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.674403 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.674454 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.674505 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.674557 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.674605 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.674657 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.674705 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.674760 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.674808 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.674863 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.674913 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.674965 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.675021 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.675074 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.675122 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.675176 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.678521 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.678610 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.678669 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.678738 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.678820 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.678893 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.678958 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.679114 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.679166 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.679219 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.679269 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.679322 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.679375 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.679428 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.679478 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.679530 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.679591 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.679644 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Oct 31 01:33:23.679697 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.679750 kernel: pci_bus 0000:01: extended config space not accessible Oct 31 01:33:23.679802 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 31 01:33:23.679856 kernel: pci_bus 0000:02: extended config space not accessible Oct 31 01:33:23.679865 kernel: acpiphp: Slot [32] registered Oct 31 01:33:23.679871 kernel: acpiphp: Slot [33] registered Oct 31 01:33:23.679878 kernel: acpiphp: Slot [34] registered Oct 31 01:33:23.679886 kernel: acpiphp: Slot [35] registered Oct 31 01:33:23.679892 kernel: acpiphp: Slot [36] registered Oct 31 01:33:23.679899 kernel: acpiphp: Slot [37] registered Oct 31 01:33:23.679905 kernel: acpiphp: Slot [38] registered Oct 31 01:33:23.679911 kernel: acpiphp: Slot [39] registered Oct 31 01:33:23.679916 kernel: acpiphp: Slot [40] registered Oct 31 01:33:23.679922 kernel: acpiphp: Slot [41] registered Oct 31 01:33:23.679927 kernel: acpiphp: Slot [42] registered Oct 31 01:33:23.679933 kernel: acpiphp: Slot [43] registered Oct 31 01:33:23.679940 kernel: acpiphp: Slot [44] registered Oct 31 01:33:23.679946 kernel: acpiphp: Slot [45] registered Oct 31 01:33:23.679952 kernel: acpiphp: Slot [46] registered Oct 31 01:33:23.679958 kernel: acpiphp: Slot [47] registered Oct 31 01:33:23.679964 kernel: acpiphp: Slot [48] registered Oct 31 01:33:23.679969 kernel: acpiphp: Slot [49] registered Oct 31 01:33:23.679975 kernel: acpiphp: Slot [50] registered Oct 31 01:33:23.681025 kernel: acpiphp: Slot [51] registered Oct 31 01:33:23.681033 kernel: acpiphp: Slot [52] registered Oct 31 01:33:23.681040 kernel: acpiphp: Slot [53] registered Oct 31 01:33:23.681048 kernel: acpiphp: Slot [54] registered Oct 31 01:33:23.681054 kernel: acpiphp: Slot [55] registered Oct 31 01:33:23.681059 kernel: acpiphp: Slot [56] registered Oct 31 01:33:23.681065 kernel: acpiphp: Slot [57] registered Oct 31 01:33:23.681073 kernel: acpiphp: Slot [58] registered Oct 31 01:33:23.681083 kernel: acpiphp: Slot [59] registered Oct 31 01:33:23.681089 kernel: acpiphp: Slot [60] registered Oct 31 01:33:23.681095 kernel: acpiphp: Slot [61] registered Oct 31 01:33:23.681103 kernel: acpiphp: Slot [62] registered Oct 31 01:33:23.681110 kernel: acpiphp: Slot [63] registered Oct 31 01:33:23.681193 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Oct 31 01:33:23.681259 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Oct 31 01:33:23.681312 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Oct 31 01:33:23.681362 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Oct 31 01:33:23.681414 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Oct 31 01:33:23.681466 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000dbfff window] (subtractive decode) Oct 31 01:33:23.681533 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Oct 31 01:33:23.681597 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Oct 31 01:33:23.681647 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Oct 31 01:33:23.681708 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Oct 31 01:33:23.681761 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Oct 31 01:33:23.681812 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Oct 31 01:33:23.681878 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Oct 31 01:33:23.681945 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Oct 31 01:33:23.684071 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Oct 31 01:33:23.684136 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Oct 31 01:33:23.684208 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Oct 31 01:33:23.684313 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Oct 31 01:33:23.684704 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Oct 31 01:33:23.684840 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Oct 31 01:33:23.684919 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Oct 31 01:33:23.685023 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Oct 31 01:33:23.685408 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Oct 31 01:33:23.685492 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Oct 31 01:33:23.685574 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Oct 31 01:33:23.685639 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Oct 31 01:33:23.685704 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Oct 31 01:33:23.685761 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Oct 31 01:33:23.685825 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Oct 31 01:33:23.685907 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Oct 31 01:33:23.685973 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Oct 31 01:33:23.686122 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Oct 31 01:33:23.686214 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Oct 31 01:33:23.686282 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Oct 31 01:33:23.686341 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Oct 31 01:33:23.686419 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Oct 31 01:33:23.686504 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Oct 31 01:33:23.686577 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Oct 31 01:33:23.686650 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Oct 31 01:33:23.686721 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Oct 31 01:33:23.686788 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Oct 31 01:33:23.686849 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Oct 31 01:33:23.686911 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Oct 31 01:33:23.687028 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Oct 31 01:33:23.687091 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Oct 31 01:33:23.687149 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Oct 31 01:33:23.687223 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Oct 31 01:33:23.687290 kernel: pci 0000:0b:00.0: supports D1 D2 Oct 31 01:33:23.687363 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 31 01:33:23.687436 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Oct 31 01:33:23.687508 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Oct 31 01:33:23.687579 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Oct 31 01:33:23.687674 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Oct 31 01:33:23.687746 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Oct 31 01:33:23.687828 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Oct 31 01:33:23.687893 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Oct 31 01:33:23.687957 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Oct 31 01:33:23.688037 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Oct 31 01:33:23.688111 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Oct 31 01:33:23.688186 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Oct 31 01:33:23.688253 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Oct 31 01:33:23.688315 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Oct 31 01:33:23.688387 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Oct 31 01:33:23.688442 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Oct 31 01:33:23.688505 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Oct 31 01:33:23.688576 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Oct 31 01:33:23.688667 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Oct 31 01:33:23.688741 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Oct 31 01:33:23.688791 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Oct 31 01:33:23.688848 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Oct 31 01:33:23.688907 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Oct 31 01:33:23.688965 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Oct 31 01:33:23.689092 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Oct 31 01:33:23.689161 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Oct 31 01:33:23.689232 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Oct 31 01:33:23.689302 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Oct 31 01:33:23.689370 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Oct 31 01:33:23.689424 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Oct 31 01:33:23.689482 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Oct 31 01:33:23.689561 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Oct 31 01:33:23.689634 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Oct 31 01:33:23.689706 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Oct 31 01:33:23.689766 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Oct 31 01:33:23.689828 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Oct 31 01:33:23.689910 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Oct 31 01:33:23.689973 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Oct 31 01:33:23.690036 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Oct 31 01:33:23.690094 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Oct 31 01:33:23.690162 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Oct 31 01:33:23.690235 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Oct 31 01:33:23.690304 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Oct 31 01:33:23.690360 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Oct 31 01:33:23.690416 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Oct 31 01:33:23.690469 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Oct 31 01:33:23.690529 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Oct 31 01:33:23.690588 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Oct 31 01:33:23.690648 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Oct 31 01:33:23.690710 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Oct 31 01:33:23.690767 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Oct 31 01:33:23.690825 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Oct 31 01:33:23.690880 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Oct 31 01:33:23.690952 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Oct 31 01:33:23.691015 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Oct 31 01:33:23.691074 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Oct 31 01:33:23.691133 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Oct 31 01:33:23.691187 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Oct 31 01:33:23.691243 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Oct 31 01:33:23.691308 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Oct 31 01:33:23.691362 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Oct 31 01:33:23.691417 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Oct 31 01:33:23.691471 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Oct 31 01:33:23.691546 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Oct 31 01:33:23.691603 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Oct 31 01:33:23.691672 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Oct 31 01:33:23.691746 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Oct 31 01:33:23.691816 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Oct 31 01:33:23.691883 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Oct 31 01:33:23.691956 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Oct 31 01:33:23.693749 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Oct 31 01:33:23.693817 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Oct 31 01:33:23.693871 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Oct 31 01:33:23.694271 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Oct 31 01:33:23.694330 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Oct 31 01:33:23.694392 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Oct 31 01:33:23.694444 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Oct 31 01:33:23.694819 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Oct 31 01:33:23.694882 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Oct 31 01:33:23.694942 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Oct 31 01:33:23.695386 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Oct 31 01:33:23.695398 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Oct 31 01:33:23.695405 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Oct 31 01:33:23.695411 kernel: ACPI: PCI: Interrupt link LNKB disabled Oct 31 01:33:23.695417 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 31 01:33:23.695426 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Oct 31 01:33:23.695432 kernel: iommu: Default domain type: Translated Oct 31 01:33:23.695439 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 31 01:33:23.695517 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Oct 31 01:33:23.696910 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 31 01:33:23.697017 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Oct 31 01:33:23.697029 kernel: vgaarb: loaded Oct 31 01:33:23.697036 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 31 01:33:23.697043 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 31 01:33:23.697048 kernel: PTP clock support registered Oct 31 01:33:23.697054 kernel: PCI: Using ACPI for IRQ routing Oct 31 01:33:23.697060 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 31 01:33:23.697069 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Oct 31 01:33:23.697075 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Oct 31 01:33:23.697080 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Oct 31 01:33:23.697086 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Oct 31 01:33:23.697092 kernel: clocksource: Switched to clocksource tsc-early Oct 31 01:33:23.697098 kernel: VFS: Disk quotas dquot_6.6.0 Oct 31 01:33:23.697105 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 31 01:33:23.697112 kernel: pnp: PnP ACPI init Oct 31 01:33:23.697183 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Oct 31 01:33:23.697249 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Oct 31 01:33:23.697305 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Oct 31 01:33:23.697365 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Oct 31 01:33:23.697419 kernel: pnp 00:06: [dma 2] Oct 31 01:33:23.697478 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Oct 31 01:33:23.697524 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Oct 31 01:33:23.697571 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Oct 31 01:33:23.697578 kernel: pnp: PnP ACPI: found 8 devices Oct 31 01:33:23.697585 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 31 01:33:23.697591 kernel: NET: Registered PF_INET protocol family Oct 31 01:33:23.697597 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 31 01:33:23.697603 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 31 01:33:23.697609 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 31 01:33:23.697614 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 31 01:33:23.697622 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 31 01:33:23.697628 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 31 01:33:23.697634 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 31 01:33:23.697639 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 31 01:33:23.697645 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 31 01:33:23.697651 kernel: NET: Registered PF_XDP protocol family Oct 31 01:33:23.697703 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Oct 31 01:33:23.697763 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Oct 31 01:33:23.697826 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Oct 31 01:33:23.697886 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Oct 31 01:33:23.697948 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Oct 31 01:33:23.698021 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Oct 31 01:33:23.698073 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Oct 31 01:33:23.698123 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Oct 31 01:33:23.698177 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Oct 31 01:33:23.698241 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Oct 31 01:33:23.698299 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Oct 31 01:33:23.698363 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Oct 31 01:33:23.698414 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Oct 31 01:33:23.698475 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Oct 31 01:33:23.698535 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Oct 31 01:33:23.698604 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Oct 31 01:33:23.698666 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Oct 31 01:33:23.698736 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Oct 31 01:33:23.698789 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Oct 31 01:33:23.698845 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Oct 31 01:33:23.698911 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Oct 31 01:33:23.698964 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Oct 31 01:33:23.699031 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Oct 31 01:33:23.699083 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Oct 31 01:33:23.699133 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Oct 31 01:33:23.699183 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.699237 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.699286 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.699335 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.699383 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.699432 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.699480 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.699531 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.699592 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.699646 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.699696 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.699750 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.699800 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.699848 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.699896 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.699944 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.700006 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.700060 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.700109 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.700157 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.700205 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.700254 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.700303 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.700352 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.700401 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.700457 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.700517 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.700567 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.700634 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.700705 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.700768 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.700819 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.700873 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.700930 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.701003 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.701064 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.701116 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.701164 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.701212 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.701267 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.701336 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.701396 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.701444 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.701493 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.701544 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.701614 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.701667 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.701727 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.701787 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.701840 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.701894 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.701964 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.702057 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.702107 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.702155 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.702203 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.702256 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.702306 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.702377 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.702428 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.702490 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.702557 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.702617 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.702681 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.702732 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.702780 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.702834 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.702888 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.702939 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.703374 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.703447 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.703518 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.703585 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.703652 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.703740 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.704146 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.704216 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.704269 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.704321 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.704399 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.704746 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.704852 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.704910 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Oct 31 01:33:23.704966 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:33:23.705132 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 31 01:33:23.705206 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Oct 31 01:33:23.705262 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Oct 31 01:33:23.705310 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Oct 31 01:33:23.705360 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Oct 31 01:33:23.705414 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Oct 31 01:33:23.705467 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Oct 31 01:33:23.705538 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Oct 31 01:33:23.705603 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Oct 31 01:33:23.705669 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Oct 31 01:33:23.705735 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Oct 31 01:33:23.705801 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Oct 31 01:33:23.705870 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Oct 31 01:33:23.705929 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Oct 31 01:33:23.706061 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Oct 31 01:33:23.706123 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Oct 31 01:33:23.706176 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Oct 31 01:33:23.708243 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Oct 31 01:33:23.708319 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Oct 31 01:33:23.708375 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Oct 31 01:33:23.708426 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Oct 31 01:33:23.708477 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Oct 31 01:33:23.708530 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Oct 31 01:33:23.708585 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Oct 31 01:33:23.708638 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Oct 31 01:33:23.708687 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Oct 31 01:33:23.708735 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Oct 31 01:33:23.708787 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Oct 31 01:33:23.708837 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Oct 31 01:33:23.708890 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Oct 31 01:33:23.708965 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Oct 31 01:33:23.709040 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Oct 31 01:33:23.709102 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Oct 31 01:33:23.709157 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Oct 31 01:33:23.709208 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Oct 31 01:33:23.709257 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Oct 31 01:33:23.709325 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Oct 31 01:33:23.709388 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Oct 31 01:33:23.709449 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Oct 31 01:33:23.709500 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Oct 31 01:33:23.709574 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Oct 31 01:33:23.709635 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Oct 31 01:33:23.710077 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Oct 31 01:33:23.710144 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Oct 31 01:33:23.710199 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Oct 31 01:33:23.710584 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Oct 31 01:33:23.710665 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Oct 31 01:33:23.710724 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Oct 31 01:33:23.710784 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Oct 31 01:33:23.710858 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Oct 31 01:33:23.710915 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Oct 31 01:33:23.711081 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Oct 31 01:33:23.711146 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Oct 31 01:33:23.711528 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Oct 31 01:33:23.711589 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Oct 31 01:33:23.711657 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Oct 31 01:33:23.711730 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Oct 31 01:33:23.711797 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Oct 31 01:33:23.711860 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Oct 31 01:33:23.711927 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Oct 31 01:33:23.712000 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Oct 31 01:33:23.712066 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Oct 31 01:33:23.712118 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Oct 31 01:33:23.712176 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Oct 31 01:33:23.712234 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Oct 31 01:33:23.712290 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Oct 31 01:33:23.712350 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Oct 31 01:33:23.712409 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Oct 31 01:33:23.712458 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Oct 31 01:33:23.712527 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Oct 31 01:33:23.712609 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Oct 31 01:33:23.712671 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Oct 31 01:33:23.712732 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Oct 31 01:33:23.712782 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Oct 31 01:33:23.712836 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Oct 31 01:33:23.712888 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Oct 31 01:33:23.712937 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Oct 31 01:33:23.712993 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Oct 31 01:33:23.713046 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Oct 31 01:33:23.713100 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Oct 31 01:33:23.713166 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Oct 31 01:33:23.713231 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Oct 31 01:33:23.713293 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Oct 31 01:33:23.713343 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Oct 31 01:33:23.713405 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Oct 31 01:33:23.713461 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Oct 31 01:33:23.713510 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Oct 31 01:33:23.713558 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Oct 31 01:33:23.713607 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Oct 31 01:33:23.713655 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Oct 31 01:33:23.713702 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Oct 31 01:33:23.713750 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Oct 31 01:33:23.713799 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Oct 31 01:33:23.713847 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Oct 31 01:33:23.713897 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Oct 31 01:33:23.713946 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Oct 31 01:33:23.714003 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Oct 31 01:33:23.714051 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Oct 31 01:33:23.714100 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Oct 31 01:33:23.714148 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Oct 31 01:33:23.714197 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Oct 31 01:33:23.714243 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Oct 31 01:33:23.714293 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Oct 31 01:33:23.714344 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Oct 31 01:33:23.714392 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Oct 31 01:33:23.714447 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Oct 31 01:33:23.714507 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Oct 31 01:33:23.714561 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Oct 31 01:33:23.714615 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Oct 31 01:33:23.714663 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Oct 31 01:33:23.714718 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Oct 31 01:33:23.714771 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Oct 31 01:33:23.714825 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Oct 31 01:33:23.714877 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Oct 31 01:33:23.714925 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Oct 31 01:33:23.714968 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000dbfff window] Oct 31 01:33:23.715024 kernel: pci_bus 0000:00: resource 6 [mem 0xc0000000-0xfebfffff window] Oct 31 01:33:23.715073 kernel: pci_bus 0000:00: resource 7 [io 0x0000-0x0cf7 window] Oct 31 01:33:23.715116 kernel: pci_bus 0000:00: resource 8 [io 0x0d00-0xfeff window] Oct 31 01:33:23.715164 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Oct 31 01:33:23.715213 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Oct 31 01:33:23.715258 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Oct 31 01:33:23.715309 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Oct 31 01:33:23.715362 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000dbfff window] Oct 31 01:33:23.715413 kernel: pci_bus 0000:02: resource 6 [mem 0xc0000000-0xfebfffff window] Oct 31 01:33:23.715464 kernel: pci_bus 0000:02: resource 7 [io 0x0000-0x0cf7 window] Oct 31 01:33:23.715523 kernel: pci_bus 0000:02: resource 8 [io 0x0d00-0xfeff window] Oct 31 01:33:23.716956 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Oct 31 01:33:23.717037 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Oct 31 01:33:23.717389 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Oct 31 01:33:23.717459 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Oct 31 01:33:23.717517 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Oct 31 01:33:23.717565 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Oct 31 01:33:23.717642 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Oct 31 01:33:23.717949 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Oct 31 01:33:23.718046 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Oct 31 01:33:23.718401 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Oct 31 01:33:23.718455 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Oct 31 01:33:23.718508 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Oct 31 01:33:23.718867 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Oct 31 01:33:23.718936 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Oct 31 01:33:23.719018 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Oct 31 01:33:23.719090 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Oct 31 01:33:23.719167 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Oct 31 01:33:23.719381 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Oct 31 01:33:23.719452 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Oct 31 01:33:23.719508 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Oct 31 01:33:23.719565 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Oct 31 01:33:23.719612 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Oct 31 01:33:23.719670 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Oct 31 01:33:23.719729 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Oct 31 01:33:23.719785 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Oct 31 01:33:23.719836 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Oct 31 01:33:23.719893 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Oct 31 01:33:23.719940 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Oct 31 01:33:23.720181 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Oct 31 01:33:23.720260 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Oct 31 01:33:23.720343 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Oct 31 01:33:23.720407 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Oct 31 01:33:23.720466 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Oct 31 01:33:23.720524 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Oct 31 01:33:23.720578 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Oct 31 01:33:23.720636 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Oct 31 01:33:23.720697 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Oct 31 01:33:23.720745 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Oct 31 01:33:23.720800 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Oct 31 01:33:23.720860 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Oct 31 01:33:23.720915 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Oct 31 01:33:23.720967 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Oct 31 01:33:23.721021 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Oct 31 01:33:23.721088 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Oct 31 01:33:23.721332 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Oct 31 01:33:23.721404 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Oct 31 01:33:23.721469 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Oct 31 01:33:23.721883 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Oct 31 01:33:23.721942 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Oct 31 01:33:23.722047 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Oct 31 01:33:23.722415 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Oct 31 01:33:23.722479 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Oct 31 01:33:23.722897 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Oct 31 01:33:23.723061 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Oct 31 01:33:23.723132 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Oct 31 01:33:23.723206 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Oct 31 01:33:23.723566 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Oct 31 01:33:23.723655 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Oct 31 01:33:23.723714 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Oct 31 01:33:23.723770 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Oct 31 01:33:23.723837 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Oct 31 01:33:23.723900 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Oct 31 01:33:23.723972 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Oct 31 01:33:23.724066 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Oct 31 01:33:23.724123 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Oct 31 01:33:23.724188 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Oct 31 01:33:23.724410 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Oct 31 01:33:23.724473 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Oct 31 01:33:23.724538 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Oct 31 01:33:23.724954 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Oct 31 01:33:23.725044 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Oct 31 01:33:23.725100 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Oct 31 01:33:23.725152 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Oct 31 01:33:23.725207 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Oct 31 01:33:23.725253 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Oct 31 01:33:23.725309 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 31 01:33:23.725319 kernel: PCI: CLS 32 bytes, default 64 Oct 31 01:33:23.725328 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 31 01:33:23.725335 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Oct 31 01:33:23.725341 kernel: clocksource: Switched to clocksource tsc Oct 31 01:33:23.725347 kernel: Initialise system trusted keyrings Oct 31 01:33:23.725359 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 31 01:33:23.725368 kernel: Key type asymmetric registered Oct 31 01:33:23.725375 kernel: Asymmetric key parser 'x509' registered Oct 31 01:33:23.725381 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 31 01:33:23.725387 kernel: io scheduler mq-deadline registered Oct 31 01:33:23.725395 kernel: io scheduler kyber registered Oct 31 01:33:23.725401 kernel: io scheduler bfq registered Oct 31 01:33:23.725457 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Oct 31 01:33:23.725509 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.725568 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Oct 31 01:33:23.725619 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.725678 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Oct 31 01:33:23.725765 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.725855 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Oct 31 01:33:23.725927 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.726005 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Oct 31 01:33:23.726093 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.726153 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Oct 31 01:33:23.726217 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.726285 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Oct 31 01:33:23.726336 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.726388 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Oct 31 01:33:23.726439 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.726493 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Oct 31 01:33:23.726546 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.726602 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Oct 31 01:33:23.726654 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.726716 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Oct 31 01:33:23.726767 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.726818 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Oct 31 01:33:23.726868 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.726926 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Oct 31 01:33:23.727373 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.727443 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Oct 31 01:33:23.727523 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.727920 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Oct 31 01:33:23.727987 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.728041 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Oct 31 01:33:23.728412 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.728474 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Oct 31 01:33:23.728526 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.728586 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Oct 31 01:33:23.728859 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.728943 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Oct 31 01:33:23.729017 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.729418 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Oct 31 01:33:23.729485 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.729561 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Oct 31 01:33:23.729621 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.729673 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Oct 31 01:33:23.729724 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.729776 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Oct 31 01:33:23.729831 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.729891 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Oct 31 01:33:23.729951 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.730119 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Oct 31 01:33:23.730209 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.730389 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Oct 31 01:33:23.730459 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.730512 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Oct 31 01:33:23.730571 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.730923 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Oct 31 01:33:23.730993 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.731065 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Oct 31 01:33:23.731126 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.731213 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Oct 31 01:33:23.731281 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.731490 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Oct 31 01:33:23.731550 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.731619 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Oct 31 01:33:23.732018 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:33:23.732031 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 31 01:33:23.732042 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 31 01:33:23.732051 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 31 01:33:23.732058 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Oct 31 01:33:23.732064 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 31 01:33:23.732070 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 31 01:33:23.732139 kernel: rtc_cmos 00:01: registered as rtc0 Oct 31 01:33:23.732155 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 31 01:33:23.732206 kernel: rtc_cmos 00:01: setting system clock to 2025-10-31T01:33:23 UTC (1761874403) Oct 31 01:33:23.732408 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Oct 31 01:33:23.732418 kernel: intel_pstate: CPU model not supported Oct 31 01:33:23.732426 kernel: NET: Registered PF_INET6 protocol family Oct 31 01:33:23.732432 kernel: Segment Routing with IPv6 Oct 31 01:33:23.732438 kernel: In-situ OAM (IOAM) with IPv6 Oct 31 01:33:23.732444 kernel: NET: Registered PF_PACKET protocol family Oct 31 01:33:23.732452 kernel: Key type dns_resolver registered Oct 31 01:33:23.732465 kernel: IPI shorthand broadcast: enabled Oct 31 01:33:23.732472 kernel: sched_clock: Marking stable (1017226649, 245497178)->(1344478955, -81755128) Oct 31 01:33:23.732483 kernel: registered taskstats version 1 Oct 31 01:33:23.732489 kernel: Loading compiled-in X.509 certificates Oct 31 01:33:23.732496 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 8306d4e745b00e76b5fae2596c709096b7f28adc' Oct 31 01:33:23.732502 kernel: Key type .fscrypt registered Oct 31 01:33:23.732511 kernel: Key type fscrypt-provisioning registered Oct 31 01:33:23.732517 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 31 01:33:23.732525 kernel: ima: Allocated hash algorithm: sha1 Oct 31 01:33:23.732531 kernel: ima: No architecture policies found Oct 31 01:33:23.732538 kernel: clk: Disabling unused clocks Oct 31 01:33:23.732549 kernel: Freeing unused kernel image (initmem) memory: 47496K Oct 31 01:33:23.732556 kernel: Write protecting the kernel read-only data: 28672k Oct 31 01:33:23.732853 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 31 01:33:23.732863 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Oct 31 01:33:23.732870 kernel: Run /init as init process Oct 31 01:33:23.732878 kernel: with arguments: Oct 31 01:33:23.732887 kernel: /init Oct 31 01:33:23.732893 kernel: with environment: Oct 31 01:33:23.732899 kernel: HOME=/ Oct 31 01:33:23.732905 kernel: TERM=linux Oct 31 01:33:23.732911 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 31 01:33:23.732919 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 01:33:23.732927 systemd[1]: Detected virtualization vmware. Oct 31 01:33:23.732934 systemd[1]: Detected architecture x86-64. Oct 31 01:33:23.732941 systemd[1]: Running in initrd. Oct 31 01:33:23.732948 systemd[1]: No hostname configured, using default hostname. Oct 31 01:33:23.732954 systemd[1]: Hostname set to . Oct 31 01:33:23.732961 systemd[1]: Initializing machine ID from random generator. Oct 31 01:33:23.732967 systemd[1]: Queued start job for default target initrd.target. Oct 31 01:33:23.732973 systemd[1]: Started systemd-ask-password-console.path. Oct 31 01:33:23.732988 systemd[1]: Reached target cryptsetup.target. Oct 31 01:33:23.732995 systemd[1]: Reached target paths.target. Oct 31 01:33:23.733001 systemd[1]: Reached target slices.target. Oct 31 01:33:23.733009 systemd[1]: Reached target swap.target. Oct 31 01:33:23.733016 systemd[1]: Reached target timers.target. Oct 31 01:33:23.733025 systemd[1]: Listening on iscsid.socket. Oct 31 01:33:23.733031 systemd[1]: Listening on iscsiuio.socket. Oct 31 01:33:23.733041 systemd[1]: Listening on systemd-journald-audit.socket. Oct 31 01:33:23.733048 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 31 01:33:23.733056 systemd[1]: Listening on systemd-journald.socket. Oct 31 01:33:23.733065 systemd[1]: Listening on systemd-networkd.socket. Oct 31 01:33:23.733071 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 01:33:23.733077 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 01:33:23.733084 systemd[1]: Reached target sockets.target. Oct 31 01:33:23.733091 systemd[1]: Starting kmod-static-nodes.service... Oct 31 01:33:23.733099 systemd[1]: Finished network-cleanup.service. Oct 31 01:33:23.733106 systemd[1]: Starting systemd-fsck-usr.service... Oct 31 01:33:23.733112 systemd[1]: Starting systemd-journald.service... Oct 31 01:33:23.733119 systemd[1]: Starting systemd-modules-load.service... Oct 31 01:33:23.733126 systemd[1]: Starting systemd-resolved.service... Oct 31 01:33:23.733135 systemd[1]: Starting systemd-vconsole-setup.service... Oct 31 01:33:23.733145 systemd[1]: Finished kmod-static-nodes.service. Oct 31 01:33:23.733153 systemd[1]: Finished systemd-fsck-usr.service. Oct 31 01:33:23.733162 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 31 01:33:23.733169 systemd[1]: Finished systemd-vconsole-setup.service. Oct 31 01:33:23.733176 kernel: audit: type=1130 audit(1761874403.671:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:23.733182 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 31 01:33:23.733319 kernel: audit: type=1130 audit(1761874403.679:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:23.733331 systemd[1]: Starting dracut-cmdline-ask.service... Oct 31 01:33:23.733338 systemd[1]: Started systemd-resolved.service. Oct 31 01:33:23.733344 kernel: audit: type=1130 audit(1761874403.687:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:23.733350 systemd[1]: Reached target nss-lookup.target. Oct 31 01:33:23.733357 systemd[1]: Finished dracut-cmdline-ask.service. Oct 31 01:33:23.733363 systemd[1]: Starting dracut-cmdline.service... Oct 31 01:33:23.733372 kernel: audit: type=1130 audit(1761874403.704:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:23.733380 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 31 01:33:23.733386 kernel: Bridge firewalling registered Oct 31 01:33:23.733397 systemd-journald[216]: Journal started Oct 31 01:33:23.733437 systemd-journald[216]: Runtime Journal (/run/log/journal/742171bdb02f4118b5bc848829c1e44a) is 4.8M, max 38.8M, 34.0M free. Oct 31 01:33:23.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:23.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:23.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:23.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:23.679342 systemd-modules-load[217]: Inserted module 'overlay' Oct 31 01:33:23.735138 systemd[1]: Started systemd-journald.service. Oct 31 01:33:23.680340 systemd-resolved[218]: Positive Trust Anchors: Oct 31 01:33:23.680348 systemd-resolved[218]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 01:33:23.680368 systemd-resolved[218]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 01:33:23.683561 systemd-resolved[218]: Defaulting to hostname 'linux'. Oct 31 01:33:23.726969 systemd-modules-load[217]: Inserted module 'br_netfilter' Oct 31 01:33:23.736371 dracut-cmdline[233]: dracut-dracut-053 Oct 31 01:33:23.736371 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Oct 31 01:33:23.736371 dracut-cmdline[233]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 01:33:23.739998 kernel: audit: type=1130 audit(1761874403.735:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:23.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:23.745001 kernel: SCSI subsystem initialized Oct 31 01:33:23.755003 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 31 01:33:23.755062 kernel: device-mapper: uevent: version 1.0.3 Oct 31 01:33:23.756760 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 31 01:33:23.759900 systemd-modules-load[217]: Inserted module 'dm_multipath' Oct 31 01:33:23.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:23.760297 systemd[1]: Finished systemd-modules-load.service. Oct 31 01:33:23.760834 systemd[1]: Starting systemd-sysctl.service... Oct 31 01:33:23.763995 kernel: audit: type=1130 audit(1761874403.758:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:23.767377 systemd[1]: Finished systemd-sysctl.service. Oct 31 01:33:23.770124 kernel: audit: type=1130 audit(1761874403.765:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:23.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:23.783998 kernel: Loading iSCSI transport class v2.0-870. Oct 31 01:33:23.796996 kernel: iscsi: registered transport (tcp) Oct 31 01:33:23.814180 kernel: iscsi: registered transport (qla4xxx) Oct 31 01:33:23.814240 kernel: QLogic iSCSI HBA Driver Oct 31 01:33:23.832041 systemd[1]: Finished dracut-cmdline.service. Oct 31 01:33:23.832671 systemd[1]: Starting dracut-pre-udev.service... Oct 31 01:33:23.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:23.836071 kernel: audit: type=1130 audit(1761874403.830:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:23.872002 kernel: raid6: avx2x4 gen() 42199 MB/s Oct 31 01:33:23.888999 kernel: raid6: avx2x4 xor() 17733 MB/s Oct 31 01:33:23.906006 kernel: raid6: avx2x2 gen() 45032 MB/s Oct 31 01:33:23.923008 kernel: raid6: avx2x2 xor() 28225 MB/s Oct 31 01:33:23.940003 kernel: raid6: avx2x1 gen() 39224 MB/s Oct 31 01:33:23.957000 kernel: raid6: avx2x1 xor() 24764 MB/s Oct 31 01:33:23.974004 kernel: raid6: sse2x4 gen() 20794 MB/s Oct 31 01:33:23.990998 kernel: raid6: sse2x4 xor() 10947 MB/s Oct 31 01:33:24.008020 kernel: raid6: sse2x2 gen() 20452 MB/s Oct 31 01:33:24.025010 kernel: raid6: sse2x2 xor() 11957 MB/s Oct 31 01:33:24.042011 kernel: raid6: sse2x1 gen() 16382 MB/s Oct 31 01:33:24.059235 kernel: raid6: sse2x1 xor() 8696 MB/s Oct 31 01:33:24.059291 kernel: raid6: using algorithm avx2x2 gen() 45032 MB/s Oct 31 01:33:24.059305 kernel: raid6: .... xor() 28225 MB/s, rmw enabled Oct 31 01:33:24.060511 kernel: raid6: using avx2x2 recovery algorithm Oct 31 01:33:24.070006 kernel: xor: automatically using best checksumming function avx Oct 31 01:33:24.134996 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 31 01:33:24.139306 systemd[1]: Finished dracut-pre-udev.service. Oct 31 01:33:24.139967 systemd[1]: Starting systemd-udevd.service... Oct 31 01:33:24.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:24.137000 audit: BPF prog-id=7 op=LOAD Oct 31 01:33:24.137000 audit: BPF prog-id=8 op=LOAD Oct 31 01:33:24.144996 kernel: audit: type=1130 audit(1761874404.137:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:24.150490 systemd-udevd[416]: Using default interface naming scheme 'v252'. Oct 31 01:33:24.153223 systemd[1]: Started systemd-udevd.service. Oct 31 01:33:24.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:24.153796 systemd[1]: Starting dracut-pre-trigger.service... Oct 31 01:33:24.163026 dracut-pre-trigger[417]: rd.md=0: removing MD RAID activation Oct 31 01:33:24.182184 systemd[1]: Finished dracut-pre-trigger.service. Oct 31 01:33:24.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:24.182844 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 01:33:24.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:24.265345 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 01:33:24.323993 kernel: VMware PVSCSI driver - version 1.0.7.0-k Oct 31 01:33:24.327180 kernel: vmw_pvscsi: using 64bit dma Oct 31 01:33:24.327202 kernel: vmw_pvscsi: max_id: 16 Oct 31 01:33:24.327210 kernel: vmw_pvscsi: setting ring_pages to 8 Oct 31 01:33:24.342179 kernel: vmw_pvscsi: enabling reqCallThreshold Oct 31 01:33:24.342209 kernel: vmw_pvscsi: driver-based request coalescing enabled Oct 31 01:33:24.342217 kernel: vmw_pvscsi: using MSI-X Oct 31 01:33:24.343549 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Oct 31 01:33:24.343646 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Oct 31 01:33:24.345444 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Oct 31 01:33:24.353259 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Oct 31 01:33:24.353290 kernel: cryptd: max_cpu_qlen set to 1000 Oct 31 01:33:24.359993 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Oct 31 01:33:24.369557 kernel: AVX2 version of gcm_enc/dec engaged. Oct 31 01:33:24.369569 kernel: AES CTR mode by8 optimization enabled Oct 31 01:33:24.369577 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Oct 31 01:33:24.372706 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Oct 31 01:33:24.405036 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Oct 31 01:33:24.405142 kernel: sd 0:0:0:0: [sda] Write Protect is off Oct 31 01:33:24.405231 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Oct 31 01:33:24.405313 kernel: sd 0:0:0:0: [sda] Cache data unavailable Oct 31 01:33:24.405394 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Oct 31 01:33:24.405473 kernel: libata version 3.00 loaded. Oct 31 01:33:24.405484 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 31 01:33:24.405494 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Oct 31 01:33:24.409471 kernel: ata_piix 0000:00:07.1: version 2.13 Oct 31 01:33:24.412536 kernel: scsi host1: ata_piix Oct 31 01:33:24.412634 kernel: scsi host2: ata_piix Oct 31 01:33:24.412701 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Oct 31 01:33:24.412710 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Oct 31 01:33:24.583048 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Oct 31 01:33:24.588988 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Oct 31 01:33:24.615003 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Oct 31 01:33:24.632886 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 31 01:33:24.632898 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Oct 31 01:33:24.724395 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 31 01:33:24.747003 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (468) Oct 31 01:33:24.754664 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 01:33:24.765315 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 31 01:33:24.779374 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 31 01:33:24.779520 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 31 01:33:24.780208 systemd[1]: Starting disk-uuid.service... Oct 31 01:33:25.148997 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 31 01:33:25.165996 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 31 01:33:26.236912 disk-uuid[550]: The operation has completed successfully. Oct 31 01:33:26.237212 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 31 01:33:26.463965 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 31 01:33:26.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:26.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:26.464051 systemd[1]: Finished disk-uuid.service. Oct 31 01:33:26.464651 systemd[1]: Starting verity-setup.service... Oct 31 01:33:26.476013 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Oct 31 01:33:26.686530 systemd[1]: Found device dev-mapper-usr.device. Oct 31 01:33:26.687464 systemd[1]: Mounting sysusr-usr.mount... Oct 31 01:33:26.688401 systemd[1]: Finished verity-setup.service. Oct 31 01:33:26.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:26.770957 systemd[1]: Mounted sysusr-usr.mount. Oct 31 01:33:26.771236 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 31 01:33:26.771795 systemd[1]: Starting afterburn-network-kargs.service... Oct 31 01:33:26.772431 systemd[1]: Starting ignition-setup.service... Oct 31 01:33:26.882756 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 31 01:33:26.882808 kernel: BTRFS info (device sda6): using free space tree Oct 31 01:33:26.882822 kernel: BTRFS info (device sda6): has skinny extents Oct 31 01:33:26.890001 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 31 01:33:26.899444 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 31 01:33:26.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:26.945543 systemd[1]: Finished ignition-setup.service. Oct 31 01:33:26.946652 systemd[1]: Starting ignition-fetch-offline.service... Oct 31 01:33:27.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:27.164456 systemd[1]: Finished afterburn-network-kargs.service. Oct 31 01:33:27.165519 systemd[1]: Starting parse-ip-for-networkd.service... Oct 31 01:33:27.234050 systemd[1]: Finished parse-ip-for-networkd.service. Oct 31 01:33:27.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:27.232000 audit: BPF prog-id=9 op=LOAD Oct 31 01:33:27.235395 systemd[1]: Starting systemd-networkd.service... Oct 31 01:33:27.255352 systemd-networkd[735]: lo: Link UP Oct 31 01:33:27.255361 systemd-networkd[735]: lo: Gained carrier Oct 31 01:33:27.255915 systemd-networkd[735]: Enumeration completed Oct 31 01:33:27.261866 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Oct 31 01:33:27.262053 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Oct 31 01:33:27.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:27.256134 systemd[1]: Started systemd-networkd.service. Oct 31 01:33:27.256306 systemd-networkd[735]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Oct 31 01:33:27.256318 systemd[1]: Reached target network.target. Oct 31 01:33:27.257073 systemd[1]: Starting iscsiuio.service... Oct 31 01:33:27.261682 systemd-networkd[735]: ens192: Link UP Oct 31 01:33:27.261685 systemd-networkd[735]: ens192: Gained carrier Oct 31 01:33:27.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:27.263358 systemd[1]: Started iscsiuio.service. Oct 31 01:33:27.264418 systemd[1]: Starting iscsid.service... Oct 31 01:33:27.266794 iscsid[740]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 31 01:33:27.266794 iscsid[740]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 31 01:33:27.266794 iscsid[740]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 31 01:33:27.266794 iscsid[740]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 31 01:33:27.266794 iscsid[740]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 31 01:33:27.266794 iscsid[740]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 31 01:33:27.268156 systemd[1]: Started iscsid.service. Oct 31 01:33:27.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:27.269585 systemd[1]: Starting dracut-initqueue.service... Oct 31 01:33:27.280112 systemd[1]: Finished dracut-initqueue.service. Oct 31 01:33:27.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:27.280505 systemd[1]: Reached target remote-fs-pre.target. Oct 31 01:33:27.280833 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 01:33:27.281068 systemd[1]: Reached target remote-fs.target. Oct 31 01:33:27.282010 systemd[1]: Starting dracut-pre-mount.service... Oct 31 01:33:27.289253 systemd[1]: Finished dracut-pre-mount.service. Oct 31 01:33:27.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:27.455083 ignition[606]: Ignition 2.14.0 Oct 31 01:33:27.455094 ignition[606]: Stage: fetch-offline Oct 31 01:33:27.455488 ignition[606]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 01:33:27.455523 ignition[606]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 31 01:33:27.498056 ignition[606]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 31 01:33:27.498149 ignition[606]: parsed url from cmdline: "" Oct 31 01:33:27.498152 ignition[606]: no config URL provided Oct 31 01:33:27.498155 ignition[606]: reading system config file "/usr/lib/ignition/user.ign" Oct 31 01:33:27.498160 ignition[606]: no config at "/usr/lib/ignition/user.ign" Oct 31 01:33:27.498539 ignition[606]: config successfully fetched Oct 31 01:33:27.498551 ignition[606]: parsing config with SHA512: 36188f950030fa1cf6485ff726c37fc994a99a6bd84cb4fa110dee45c56876d338ed329a87ba300b19819819325ee0c560a024d16014024c74dd3c8bc8da4fa4 Oct 31 01:33:27.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:27.517077 ignition[606]: fetch-offline: fetch-offline passed Oct 31 01:33:27.516838 unknown[606]: fetched base config from "system" Oct 31 01:33:27.517116 ignition[606]: Ignition finished successfully Oct 31 01:33:27.516846 unknown[606]: fetched user config from "vmware" Oct 31 01:33:27.517665 systemd[1]: Finished ignition-fetch-offline.service. Oct 31 01:33:27.517888 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Oct 31 01:33:27.518398 systemd[1]: Starting ignition-kargs.service... Oct 31 01:33:27.524184 ignition[754]: Ignition 2.14.0 Oct 31 01:33:27.524473 ignition[754]: Stage: kargs Oct 31 01:33:27.524656 ignition[754]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 01:33:27.524823 ignition[754]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 31 01:33:27.526150 ignition[754]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 31 01:33:27.527689 ignition[754]: kargs: kargs passed Oct 31 01:33:27.527732 ignition[754]: Ignition finished successfully Oct 31 01:33:27.528661 systemd[1]: Finished ignition-kargs.service. Oct 31 01:33:27.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:27.529304 systemd[1]: Starting ignition-disks.service... Oct 31 01:33:27.534266 ignition[760]: Ignition 2.14.0 Oct 31 01:33:27.534531 ignition[760]: Stage: disks Oct 31 01:33:27.534715 ignition[760]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 01:33:27.534873 ignition[760]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 31 01:33:27.536195 ignition[760]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 31 01:33:27.537645 ignition[760]: disks: disks passed Oct 31 01:33:27.537804 ignition[760]: Ignition finished successfully Oct 31 01:33:27.538476 systemd[1]: Finished ignition-disks.service. Oct 31 01:33:27.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:27.538675 systemd[1]: Reached target initrd-root-device.target. Oct 31 01:33:27.538791 systemd[1]: Reached target local-fs-pre.target. Oct 31 01:33:27.538986 systemd[1]: Reached target local-fs.target. Oct 31 01:33:27.539154 systemd[1]: Reached target sysinit.target. Oct 31 01:33:27.539321 systemd[1]: Reached target basic.target. Oct 31 01:33:27.540032 systemd[1]: Starting systemd-fsck-root.service... Oct 31 01:33:27.626097 systemd-fsck[768]: ROOT: clean, 637/1628000 files, 124069/1617920 blocks Oct 31 01:33:27.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:27.626944 systemd[1]: Finished systemd-fsck-root.service. Oct 31 01:33:27.632335 kernel: kauditd_printk_skb: 20 callbacks suppressed Oct 31 01:33:27.632356 kernel: audit: type=1130 audit(1761874407.625:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:27.627513 systemd[1]: Mounting sysroot.mount... Oct 31 01:33:27.679994 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 31 01:33:27.680370 systemd[1]: Mounted sysroot.mount. Oct 31 01:33:27.680727 systemd[1]: Reached target initrd-root-fs.target. Oct 31 01:33:27.682222 systemd[1]: Mounting sysroot-usr.mount... Oct 31 01:33:27.682870 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 31 01:33:27.683078 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 31 01:33:27.683274 systemd[1]: Reached target ignition-diskful.target. Oct 31 01:33:27.684437 systemd[1]: Mounted sysroot-usr.mount. Oct 31 01:33:27.685321 systemd[1]: Starting initrd-setup-root.service... Oct 31 01:33:27.688717 initrd-setup-root[778]: cut: /sysroot/etc/passwd: No such file or directory Oct 31 01:33:27.692625 initrd-setup-root[786]: cut: /sysroot/etc/group: No such file or directory Oct 31 01:33:27.695360 initrd-setup-root[794]: cut: /sysroot/etc/shadow: No such file or directory Oct 31 01:33:27.698074 initrd-setup-root[802]: cut: /sysroot/etc/gshadow: No such file or directory Oct 31 01:33:27.703125 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 31 01:33:27.715973 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (810) Oct 31 01:33:27.716030 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 31 01:33:27.716044 kernel: BTRFS info (device sda6): using free space tree Oct 31 01:33:27.716816 kernel: BTRFS info (device sda6): has skinny extents Oct 31 01:33:27.723014 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 31 01:33:27.724788 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 31 01:33:27.738411 systemd[1]: Finished initrd-setup-root.service. Oct 31 01:33:27.742169 kernel: audit: type=1130 audit(1761874407.736:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:27.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:27.739096 systemd[1]: Starting ignition-mount.service... Oct 31 01:33:27.742752 systemd[1]: Starting sysroot-boot.service... Oct 31 01:33:27.746322 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 31 01:33:27.746393 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 31 01:33:27.754517 ignition[839]: INFO : Ignition 2.14.0 Oct 31 01:33:27.754778 ignition[839]: INFO : Stage: mount Oct 31 01:33:27.754959 ignition[839]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 01:33:27.755130 ignition[839]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 31 01:33:27.756625 ignition[839]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 31 01:33:27.758090 ignition[839]: INFO : mount: mount passed Oct 31 01:33:27.758207 ignition[839]: INFO : Ignition finished successfully Oct 31 01:33:27.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:27.758762 systemd[1]: Finished ignition-mount.service. Oct 31 01:33:27.762241 kernel: audit: type=1130 audit(1761874407.756:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:27.759345 systemd[1]: Starting ignition-files.service... Oct 31 01:33:27.764368 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 31 01:33:27.796996 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by mount (846) Oct 31 01:33:27.799506 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 31 01:33:27.799533 kernel: BTRFS info (device sda6): using free space tree Oct 31 01:33:27.799548 kernel: BTRFS info (device sda6): has skinny extents Oct 31 01:33:27.801467 systemd[1]: Finished sysroot-boot.service. Oct 31 01:33:27.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:27.804992 kernel: audit: type=1130 audit(1761874407.799:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:27.806992 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 31 01:33:27.808646 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 31 01:33:27.815585 ignition[868]: INFO : Ignition 2.14.0 Oct 31 01:33:27.815902 ignition[868]: INFO : Stage: files Oct 31 01:33:27.816141 ignition[868]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 01:33:27.816315 ignition[868]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 31 01:33:27.818025 ignition[868]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 31 01:33:27.820588 ignition[868]: DEBUG : files: compiled without relabeling support, skipping Oct 31 01:33:27.821217 ignition[868]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 31 01:33:27.821400 ignition[868]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 31 01:33:27.823528 ignition[868]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 31 01:33:27.823845 ignition[868]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 31 01:33:27.824887 unknown[868]: wrote ssh authorized keys file for user: core Oct 31 01:33:27.825166 ignition[868]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 31 01:33:27.825916 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Oct 31 01:33:27.826215 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Oct 31 01:33:27.826605 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 01:33:27.826858 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 01:33:27.827077 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Oct 31 01:33:27.827372 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Oct 31 01:33:27.827759 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Oct 31 01:33:27.827972 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Oct 31 01:33:27.832174 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1688372594" Oct 31 01:33:27.832470 ignition[868]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1688372594": device or resource busy Oct 31 01:33:27.832470 ignition[868]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1688372594", trying btrfs: device or resource busy Oct 31 01:33:27.832470 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1688372594" Oct 31 01:33:27.833103 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1688372594" Oct 31 01:33:27.833323 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem1688372594" Oct 31 01:33:27.833323 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem1688372594" Oct 31 01:33:27.833647 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Oct 31 01:33:27.833647 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Oct 31 01:33:27.833647 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 Oct 31 01:33:28.315360 systemd-networkd[735]: ens192: Gained IPv6LL Oct 31 01:33:28.422257 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Oct 31 01:33:28.670061 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Oct 31 01:33:28.680986 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Oct 31 01:33:28.681323 ignition[868]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Oct 31 01:33:28.681323 ignition[868]: INFO : files: op(c): [started] processing unit "vmtoolsd.service" Oct 31 01:33:28.681323 ignition[868]: INFO : files: op(c): [finished] processing unit "vmtoolsd.service" Oct 31 01:33:28.681323 ignition[868]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Oct 31 01:33:28.681323 ignition[868]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 31 01:33:28.681323 ignition[868]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 31 01:33:28.681323 ignition[868]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Oct 31 01:33:28.681323 ignition[868]: INFO : files: op(f): [started] setting preset to enabled for "vmtoolsd.service" Oct 31 01:33:28.681323 ignition[868]: INFO : files: op(f): [finished] setting preset to enabled for "vmtoolsd.service" Oct 31 01:33:28.681323 ignition[868]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Oct 31 01:33:28.681323 ignition[868]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Oct 31 01:33:28.914699 ignition[868]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Oct 31 01:33:28.915075 ignition[868]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Oct 31 01:33:28.915075 ignition[868]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 31 01:33:28.915075 ignition[868]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 31 01:33:28.915075 ignition[868]: INFO : files: files passed Oct 31 01:33:28.915075 ignition[868]: INFO : Ignition finished successfully Oct 31 01:33:28.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.917275 systemd[1]: Finished ignition-files.service. Oct 31 01:33:28.921673 kernel: audit: type=1130 audit(1761874408.915:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.917906 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 31 01:33:28.920464 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 31 01:33:28.921184 systemd[1]: Starting ignition-quench.service... Oct 31 01:33:28.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.923947 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 31 01:33:28.929393 kernel: audit: type=1130 audit(1761874408.922:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.929410 kernel: audit: type=1131 audit(1761874408.922:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.929419 kernel: audit: type=1130 audit(1761874408.928:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.929471 initrd-setup-root-after-ignition[894]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 31 01:33:28.924026 systemd[1]: Finished ignition-quench.service. Oct 31 01:33:28.928062 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 31 01:33:28.929338 systemd[1]: Reached target ignition-complete.target. Oct 31 01:33:28.932471 systemd[1]: Starting initrd-parse-etc.service... Oct 31 01:33:28.941665 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 31 01:33:28.941720 systemd[1]: Finished initrd-parse-etc.service. Oct 31 01:33:28.942164 systemd[1]: Reached target initrd-fs.target. Oct 31 01:33:28.942376 systemd[1]: Reached target initrd.target. Oct 31 01:33:28.942599 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 31 01:33:28.943204 systemd[1]: Starting dracut-pre-pivot.service... Oct 31 01:33:28.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.945986 kernel: audit: type=1130 audit(1761874408.940:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.948998 kernel: audit: type=1131 audit(1761874408.940:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.949622 systemd[1]: Finished dracut-pre-pivot.service. Oct 31 01:33:28.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.950240 systemd[1]: Starting initrd-cleanup.service... Oct 31 01:33:28.955828 systemd[1]: Stopped target nss-lookup.target. Oct 31 01:33:28.956148 systemd[1]: Stopped target remote-cryptsetup.target. Oct 31 01:33:28.956432 systemd[1]: Stopped target timers.target. Oct 31 01:33:28.956688 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 31 01:33:28.956897 systemd[1]: Stopped dracut-pre-pivot.service. Oct 31 01:33:28.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.957276 systemd[1]: Stopped target initrd.target. Oct 31 01:33:28.957534 systemd[1]: Stopped target basic.target. Oct 31 01:33:28.957787 systemd[1]: Stopped target ignition-complete.target. Oct 31 01:33:28.958074 systemd[1]: Stopped target ignition-diskful.target. Oct 31 01:33:28.958339 systemd[1]: Stopped target initrd-root-device.target. Oct 31 01:33:28.958610 systemd[1]: Stopped target remote-fs.target. Oct 31 01:33:28.958863 systemd[1]: Stopped target remote-fs-pre.target. Oct 31 01:33:28.959138 systemd[1]: Stopped target sysinit.target. Oct 31 01:33:28.959397 systemd[1]: Stopped target local-fs.target. Oct 31 01:33:28.959657 systemd[1]: Stopped target local-fs-pre.target. Oct 31 01:33:28.959917 systemd[1]: Stopped target swap.target. Oct 31 01:33:28.960155 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 31 01:33:28.960360 systemd[1]: Stopped dracut-pre-mount.service. Oct 31 01:33:28.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.960706 systemd[1]: Stopped target cryptsetup.target. Oct 31 01:33:28.960949 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 31 01:33:28.961163 systemd[1]: Stopped dracut-initqueue.service. Oct 31 01:33:28.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.961486 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 31 01:33:28.961696 systemd[1]: Stopped ignition-fetch-offline.service. Oct 31 01:33:28.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.962058 systemd[1]: Stopped target paths.target. Oct 31 01:33:28.962288 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 31 01:33:28.967018 systemd[1]: Stopped systemd-ask-password-console.path. Oct 31 01:33:28.967336 systemd[1]: Stopped target slices.target. Oct 31 01:33:28.967597 systemd[1]: Stopped target sockets.target. Oct 31 01:33:28.967851 systemd[1]: iscsid.socket: Deactivated successfully. Oct 31 01:33:28.968053 systemd[1]: Closed iscsid.socket. Oct 31 01:33:28.968300 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 31 01:33:28.968480 systemd[1]: Closed iscsiuio.socket. Oct 31 01:33:28.968738 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 31 01:33:28.968953 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 31 01:33:28.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.969309 systemd[1]: ignition-files.service: Deactivated successfully. Oct 31 01:33:28.969506 systemd[1]: Stopped ignition-files.service. Oct 31 01:33:28.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.970352 systemd[1]: Stopping ignition-mount.service... Oct 31 01:33:28.970644 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 31 01:33:28.970844 systemd[1]: Stopped kmod-static-nodes.service. Oct 31 01:33:28.971567 systemd[1]: Stopping sysroot-boot.service... Oct 31 01:33:28.971802 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 31 01:33:28.972029 systemd[1]: Stopped systemd-udev-trigger.service. Oct 31 01:33:28.972388 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 31 01:33:28.972603 systemd[1]: Stopped dracut-pre-trigger.service. Oct 31 01:33:28.975124 ignition[907]: INFO : Ignition 2.14.0 Oct 31 01:33:28.975124 ignition[907]: INFO : Stage: umount Oct 31 01:33:28.975698 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 31 01:33:28.975919 systemd[1]: Finished initrd-cleanup.service. Oct 31 01:33:28.976431 ignition[907]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 01:33:28.976431 ignition[907]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 31 01:33:28.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.979122 ignition[907]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 31 01:33:28.983452 ignition[907]: INFO : umount: umount passed Oct 31 01:33:28.983452 ignition[907]: INFO : Ignition finished successfully Oct 31 01:33:28.985689 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 31 01:33:28.986250 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 31 01:33:28.986488 systemd[1]: Stopped ignition-mount.service. Oct 31 01:33:28.986791 systemd[1]: Stopped target network.target. Oct 31 01:33:28.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.987045 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 31 01:33:28.987418 systemd[1]: Stopped ignition-disks.service. Oct 31 01:33:28.987664 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 31 01:33:28.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.987883 systemd[1]: Stopped ignition-kargs.service. Oct 31 01:33:28.988166 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 31 01:33:28.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.988362 systemd[1]: Stopped ignition-setup.service. Oct 31 01:33:28.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.988706 systemd[1]: Stopping systemd-networkd.service... Oct 31 01:33:28.989018 systemd[1]: Stopping systemd-resolved.service... Oct 31 01:33:28.992646 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 31 01:33:28.992713 systemd[1]: Stopped systemd-networkd.service. Oct 31 01:33:28.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.993032 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 31 01:33:28.993050 systemd[1]: Closed systemd-networkd.socket. Oct 31 01:33:28.993990 systemd[1]: Stopping network-cleanup.service... Oct 31 01:33:28.994105 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 31 01:33:28.994135 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 31 01:33:28.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.994319 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Oct 31 01:33:28.994344 systemd[1]: Stopped afterburn-network-kargs.service. Oct 31 01:33:28.994473 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 31 01:33:28.994497 systemd[1]: Stopped systemd-sysctl.service. Oct 31 01:33:28.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.995522 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 31 01:33:28.995550 systemd[1]: Stopped systemd-modules-load.service. Oct 31 01:33:28.995808 systemd[1]: Stopping systemd-udevd.service... Oct 31 01:33:28.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:28.994000 audit: BPF prog-id=9 op=UNLOAD Oct 31 01:33:28.999682 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 31 01:33:29.000296 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 31 01:33:29.000365 systemd[1]: Stopped systemd-resolved.service. Oct 31 01:33:28.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:29.001256 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 31 01:33:29.001345 systemd[1]: Stopped systemd-udevd.service. Oct 31 01:33:28.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:29.001798 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 31 01:33:29.001826 systemd[1]: Closed systemd-udevd-control.socket. Oct 31 01:33:29.002182 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 31 01:33:29.002199 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 31 01:33:29.000000 audit: BPF prog-id=6 op=UNLOAD Oct 31 01:33:29.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:29.002333 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 31 01:33:29.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:29.002358 systemd[1]: Stopped dracut-pre-udev.service. Oct 31 01:33:29.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:29.002536 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 31 01:33:29.002559 systemd[1]: Stopped dracut-cmdline.service. Oct 31 01:33:29.002757 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 31 01:33:29.002778 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 31 01:33:29.003398 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 31 01:33:29.005466 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 31 01:33:29.005640 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 31 01:33:29.006104 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 31 01:33:29.006304 systemd[1]: Stopped network-cleanup.service. Oct 31 01:33:29.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:29.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:29.006929 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 31 01:33:29.007286 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 31 01:33:29.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:29.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:29.129134 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 31 01:33:29.129195 systemd[1]: Stopped sysroot-boot.service. Oct 31 01:33:29.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:29.129488 systemd[1]: Reached target initrd-switch-root.target. Oct 31 01:33:29.129605 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 31 01:33:29.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:29.129631 systemd[1]: Stopped initrd-setup-root.service. Oct 31 01:33:29.130231 systemd[1]: Starting initrd-switch-root.service... Oct 31 01:33:29.137489 systemd[1]: Switching root. Oct 31 01:33:29.153274 systemd-journald[216]: Journal stopped Oct 31 01:33:31.908269 systemd-journald[216]: Received SIGTERM from PID 1 (systemd). Oct 31 01:33:31.908289 kernel: SELinux: Class mctp_socket not defined in policy. Oct 31 01:33:31.908297 kernel: SELinux: Class anon_inode not defined in policy. Oct 31 01:33:31.908304 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 31 01:33:31.908310 kernel: SELinux: policy capability network_peer_controls=1 Oct 31 01:33:31.908317 kernel: SELinux: policy capability open_perms=1 Oct 31 01:33:31.908323 kernel: SELinux: policy capability extended_socket_class=1 Oct 31 01:33:31.908329 kernel: SELinux: policy capability always_check_network=0 Oct 31 01:33:31.908335 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 31 01:33:31.908340 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 31 01:33:31.908346 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 31 01:33:31.908351 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 31 01:33:31.908359 systemd[1]: Successfully loaded SELinux policy in 73.233ms. Oct 31 01:33:31.908366 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.989ms. Oct 31 01:33:31.908374 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 01:33:31.908381 systemd[1]: Detected virtualization vmware. Oct 31 01:33:31.908388 systemd[1]: Detected architecture x86-64. Oct 31 01:33:31.908394 systemd[1]: Detected first boot. Oct 31 01:33:31.908401 systemd[1]: Initializing machine ID from random generator. Oct 31 01:33:31.908407 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Oct 31 01:33:31.908414 systemd[1]: Populated /etc with preset unit settings. Oct 31 01:33:31.908421 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:33:31.908428 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:33:31.908436 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:33:31.908444 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 31 01:33:31.908451 systemd[1]: Stopped iscsiuio.service. Oct 31 01:33:31.908457 systemd[1]: iscsid.service: Deactivated successfully. Oct 31 01:33:31.908464 systemd[1]: Stopped iscsid.service. Oct 31 01:33:31.908471 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 31 01:33:31.908477 systemd[1]: Stopped initrd-switch-root.service. Oct 31 01:33:31.908484 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 31 01:33:31.908491 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 31 01:33:31.908498 systemd[1]: Created slice system-addon\x2drun.slice. Oct 31 01:33:31.908504 systemd[1]: Created slice system-getty.slice. Oct 31 01:33:31.908511 systemd[1]: Created slice system-modprobe.slice. Oct 31 01:33:31.908517 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 31 01:33:31.908524 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 31 01:33:31.908530 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 31 01:33:31.908537 systemd[1]: Created slice user.slice. Oct 31 01:33:31.908545 systemd[1]: Started systemd-ask-password-console.path. Oct 31 01:33:31.908552 systemd[1]: Started systemd-ask-password-wall.path. Oct 31 01:33:31.908560 systemd[1]: Set up automount boot.automount. Oct 31 01:33:31.908567 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 31 01:33:31.908574 systemd[1]: Stopped target initrd-switch-root.target. Oct 31 01:33:31.908580 systemd[1]: Stopped target initrd-fs.target. Oct 31 01:33:31.908588 systemd[1]: Stopped target initrd-root-fs.target. Oct 31 01:33:31.908595 systemd[1]: Reached target integritysetup.target. Oct 31 01:33:31.908602 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 01:33:31.908610 systemd[1]: Reached target remote-fs.target. Oct 31 01:33:31.908617 systemd[1]: Reached target slices.target. Oct 31 01:33:31.908623 systemd[1]: Reached target swap.target. Oct 31 01:33:31.908631 systemd[1]: Reached target torcx.target. Oct 31 01:33:31.908638 systemd[1]: Reached target veritysetup.target. Oct 31 01:33:31.908645 systemd[1]: Listening on systemd-coredump.socket. Oct 31 01:33:31.908670 systemd[1]: Listening on systemd-initctl.socket. Oct 31 01:33:31.908678 systemd[1]: Listening on systemd-networkd.socket. Oct 31 01:33:31.908685 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 01:33:31.908692 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 01:33:31.908699 systemd[1]: Listening on systemd-userdbd.socket. Oct 31 01:33:31.908706 systemd[1]: Mounting dev-hugepages.mount... Oct 31 01:33:31.908713 systemd[1]: Mounting dev-mqueue.mount... Oct 31 01:33:31.908721 systemd[1]: Mounting media.mount... Oct 31 01:33:31.908729 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:33:31.908736 systemd[1]: Mounting sys-kernel-debug.mount... Oct 31 01:33:31.908743 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 31 01:33:31.908759 systemd[1]: Mounting tmp.mount... Oct 31 01:33:31.908766 systemd[1]: Starting flatcar-tmpfiles.service... Oct 31 01:33:31.908773 systemd[1]: Starting ignition-delete-config.service... Oct 31 01:33:31.908780 systemd[1]: Starting kmod-static-nodes.service... Oct 31 01:33:31.908787 systemd[1]: Starting modprobe@configfs.service... Oct 31 01:33:31.908795 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:33:31.908802 systemd[1]: Starting modprobe@drm.service... Oct 31 01:33:31.908809 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:33:31.908816 systemd[1]: Starting modprobe@fuse.service... Oct 31 01:33:31.908823 systemd[1]: Starting modprobe@loop.service... Oct 31 01:33:31.908830 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 31 01:33:31.908837 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 31 01:33:31.908844 systemd[1]: Stopped systemd-fsck-root.service. Oct 31 01:33:31.908851 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 31 01:33:31.908859 systemd[1]: Stopped systemd-fsck-usr.service. Oct 31 01:33:31.908867 systemd[1]: Stopped systemd-journald.service. Oct 31 01:33:31.908874 systemd[1]: Starting systemd-journald.service... Oct 31 01:33:31.908881 systemd[1]: Starting systemd-modules-load.service... Oct 31 01:33:31.908888 systemd[1]: Starting systemd-network-generator.service... Oct 31 01:33:31.908894 systemd[1]: Starting systemd-remount-fs.service... Oct 31 01:33:31.908901 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 01:33:31.908909 systemd[1]: verity-setup.service: Deactivated successfully. Oct 31 01:33:31.908916 systemd[1]: Stopped verity-setup.service. Oct 31 01:33:31.908925 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:33:31.908932 systemd[1]: Mounted dev-hugepages.mount. Oct 31 01:33:31.908939 systemd[1]: Mounted dev-mqueue.mount. Oct 31 01:33:31.908946 systemd[1]: Mounted media.mount. Oct 31 01:33:31.908952 systemd[1]: Mounted sys-kernel-debug.mount. Oct 31 01:33:31.908959 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 31 01:33:31.908966 systemd[1]: Mounted tmp.mount. Oct 31 01:33:31.908973 systemd[1]: Finished kmod-static-nodes.service. Oct 31 01:33:31.908985 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 31 01:33:31.908994 systemd[1]: Finished modprobe@configfs.service. Oct 31 01:33:31.909003 systemd-journald[1028]: Journal started Oct 31 01:33:31.909031 systemd-journald[1028]: Runtime Journal (/run/log/journal/ff205e9d93fd4d3aaf8c3f45a4317ada) is 4.8M, max 38.8M, 34.0M free. Oct 31 01:33:29.343000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 31 01:33:29.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 01:33:29.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 01:33:29.464000 audit: BPF prog-id=10 op=LOAD Oct 31 01:33:29.464000 audit: BPF prog-id=10 op=UNLOAD Oct 31 01:33:29.464000 audit: BPF prog-id=11 op=LOAD Oct 31 01:33:29.464000 audit: BPF prog-id=11 op=UNLOAD Oct 31 01:33:29.609000 audit[940]: AVC avc: denied { associate } for pid=940 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Oct 31 01:33:29.609000 audit[940]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001878d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=923 pid=940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:29.609000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 01:33:29.611000 audit[940]: AVC avc: denied { associate } for pid=940 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Oct 31 01:33:29.611000 audit[940]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001879a9 a2=1ed a3=0 items=2 ppid=923 pid=940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:29.611000 audit: CWD cwd="/" Oct 31 01:33:29.611000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:29.611000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:29.611000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 01:33:31.782000 audit: BPF prog-id=12 op=LOAD Oct 31 01:33:31.782000 audit: BPF prog-id=3 op=UNLOAD Oct 31 01:33:31.782000 audit: BPF prog-id=13 op=LOAD Oct 31 01:33:31.782000 audit: BPF prog-id=14 op=LOAD Oct 31 01:33:31.782000 audit: BPF prog-id=4 op=UNLOAD Oct 31 01:33:31.782000 audit: BPF prog-id=5 op=UNLOAD Oct 31 01:33:31.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.794000 audit: BPF prog-id=12 op=UNLOAD Oct 31 01:33:31.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.865000 audit: BPF prog-id=15 op=LOAD Oct 31 01:33:31.865000 audit: BPF prog-id=16 op=LOAD Oct 31 01:33:31.865000 audit: BPF prog-id=17 op=LOAD Oct 31 01:33:31.867000 audit: BPF prog-id=13 op=UNLOAD Oct 31 01:33:31.867000 audit: BPF prog-id=14 op=UNLOAD Oct 31 01:33:31.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.901000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 31 01:33:31.901000 audit[1028]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffc6c239900 a2=4000 a3=7ffc6c23999c items=0 ppid=1 pid=1028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:31.901000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 31 01:33:31.781475 systemd[1]: Queued start job for default target multi-user.target. Oct 31 01:33:29.587898 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:33:31.781485 systemd[1]: Unnecessary job was removed for dev-sda6.device. Oct 31 01:33:29.598651 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:29Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 01:33:31.785934 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 31 01:33:29.598668 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:29Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 01:33:29.598689 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:29Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 31 01:33:29.598695 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:29Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 31 01:33:29.598720 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:29Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 31 01:33:29.598728 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:29Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 31 01:33:29.598860 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:29Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 31 01:33:31.910295 jq[1007]: true Oct 31 01:33:31.910370 systemd[1]: Started systemd-journald.service. Oct 31 01:33:31.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:29.598883 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:29Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 01:33:29.598890 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:29Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 01:33:29.610497 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:29Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 31 01:33:29.610526 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:29Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 31 01:33:29.610539 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:29Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Oct 31 01:33:29.610548 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:29Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 31 01:33:29.610559 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:29Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Oct 31 01:33:31.910786 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:33:31.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:29.610566 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:29Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 31 01:33:31.910875 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:33:31.539948 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:31Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:33:31.911197 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 01:33:31.540141 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:31Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:33:31.911288 systemd[1]: Finished modprobe@drm.service. Oct 31 01:33:31.540213 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:31Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:33:31.911518 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:33:31.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.540317 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:31Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:33:31.911605 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:33:31.540350 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:31Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 31 01:33:31.911862 systemd[1]: Finished systemd-network-generator.service. Oct 31 01:33:31.540394 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-31T01:33:31Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 31 01:33:31.912286 systemd[1]: Finished systemd-remount-fs.service. Oct 31 01:33:31.912711 systemd[1]: Reached target network-pre.target. Oct 31 01:33:31.913807 systemd[1]: Mounting sys-kernel-config.mount... Oct 31 01:33:31.915510 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 31 01:33:31.919101 systemd[1]: Starting systemd-hwdb-update.service... Oct 31 01:33:31.920039 systemd[1]: Starting systemd-journal-flush.service... Oct 31 01:33:31.920170 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:33:31.921463 jq[1037]: true Oct 31 01:33:31.926735 systemd-journald[1028]: Time spent on flushing to /var/log/journal/ff205e9d93fd4d3aaf8c3f45a4317ada is 47.006ms for 1961 entries. Oct 31 01:33:31.926735 systemd-journald[1028]: System Journal (/var/log/journal/ff205e9d93fd4d3aaf8c3f45a4317ada) is 8.0M, max 584.8M, 576.8M free. Oct 31 01:33:31.983918 systemd-journald[1028]: Received client request to flush runtime journal. Oct 31 01:33:31.983950 kernel: fuse: init (API version 7.34) Oct 31 01:33:31.983966 kernel: loop: module loaded Oct 31 01:33:31.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.928595 systemd[1]: Starting systemd-random-seed.service... Oct 31 01:33:31.929600 systemd[1]: Finished systemd-modules-load.service. Oct 31 01:33:31.930235 systemd[1]: Mounted sys-kernel-config.mount. Oct 31 01:33:31.952216 systemd[1]: Starting systemd-sysctl.service... Oct 31 01:33:31.957299 systemd[1]: Finished systemd-random-seed.service. Oct 31 01:33:31.957565 systemd[1]: Finished flatcar-tmpfiles.service. Oct 31 01:33:31.957699 systemd[1]: Reached target first-boot-complete.target. Oct 31 01:33:31.958585 systemd[1]: Starting systemd-sysusers.service... Oct 31 01:33:31.961334 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 31 01:33:31.961414 systemd[1]: Finished modprobe@fuse.service. Oct 31 01:33:31.962601 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 31 01:33:31.964744 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 31 01:33:31.969699 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:33:31.969780 systemd[1]: Finished modprobe@loop.service. Oct 31 01:33:31.970097 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:33:31.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:31.989507 systemd[1]: Finished systemd-journal-flush.service. Oct 31 01:33:31.996538 systemd[1]: Finished systemd-sysctl.service. Oct 31 01:33:32.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:32.023056 systemd[1]: Finished systemd-sysusers.service. Oct 31 01:33:32.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:32.056677 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 01:33:32.057647 systemd[1]: Starting systemd-udev-settle.service... Oct 31 01:33:32.065972 udevadm[1071]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 31 01:33:32.122901 ignition[1054]: Ignition 2.14.0 Oct 31 01:33:32.123293 ignition[1054]: deleting config from guestinfo properties Oct 31 01:33:32.126262 ignition[1054]: Successfully deleted config Oct 31 01:33:32.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:32.126940 systemd[1]: Finished ignition-delete-config.service. Oct 31 01:33:32.375154 systemd[1]: Finished systemd-hwdb-update.service. Oct 31 01:33:32.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:32.374000 audit: BPF prog-id=18 op=LOAD Oct 31 01:33:32.374000 audit: BPF prog-id=19 op=LOAD Oct 31 01:33:32.374000 audit: BPF prog-id=7 op=UNLOAD Oct 31 01:33:32.374000 audit: BPF prog-id=8 op=UNLOAD Oct 31 01:33:32.376674 systemd[1]: Starting systemd-udevd.service... Oct 31 01:33:32.389072 systemd-udevd[1072]: Using default interface naming scheme 'v252'. Oct 31 01:33:32.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:32.424000 audit: BPF prog-id=20 op=LOAD Oct 31 01:33:32.425469 systemd[1]: Started systemd-udevd.service. Oct 31 01:33:32.427058 systemd[1]: Starting systemd-networkd.service... Oct 31 01:33:32.436000 audit: BPF prog-id=21 op=LOAD Oct 31 01:33:32.436000 audit: BPF prog-id=22 op=LOAD Oct 31 01:33:32.436000 audit: BPF prog-id=23 op=LOAD Oct 31 01:33:32.438671 systemd[1]: Starting systemd-userdbd.service... Oct 31 01:33:32.456669 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 31 01:33:32.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:32.464698 systemd[1]: Started systemd-userdbd.service. Oct 31 01:33:32.496017 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 31 01:33:32.500470 kernel: ACPI: button: Power Button [PWRF] Oct 31 01:33:32.532219 systemd-networkd[1082]: lo: Link UP Oct 31 01:33:32.532226 systemd-networkd[1082]: lo: Gained carrier Oct 31 01:33:32.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:32.532961 systemd-networkd[1082]: Enumeration completed Oct 31 01:33:32.533032 systemd[1]: Started systemd-networkd.service. Oct 31 01:33:32.533928 systemd-networkd[1082]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Oct 31 01:33:32.538520 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Oct 31 01:33:32.538659 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Oct 31 01:33:32.539988 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Oct 31 01:33:32.540153 systemd-networkd[1082]: ens192: Link UP Oct 31 01:33:32.540293 systemd-networkd[1082]: ens192: Gained carrier Oct 31 01:33:32.559331 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 01:33:32.585999 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Oct 31 01:33:32.586252 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Oct 31 01:33:32.586335 kernel: Guest personality initialized and is active Oct 31 01:33:32.587723 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Oct 31 01:33:32.587749 kernel: Initialized host personality Oct 31 01:33:32.587000 audit[1075]: AVC avc: denied { confidentiality } for pid=1075 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 31 01:33:32.587000 audit[1075]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55cdc5d56da0 a1=338ec a2=7fa25ba9dbc5 a3=5 items=110 ppid=1072 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:32.587000 audit: CWD cwd="/" Oct 31 01:33:32.587000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=1 name=(null) inode=16985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=2 name=(null) inode=16985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=3 name=(null) inode=16986 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=4 name=(null) inode=16985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=5 name=(null) inode=16987 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=6 name=(null) inode=16985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=7 name=(null) inode=16988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=8 name=(null) inode=16988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=9 name=(null) inode=16989 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=10 name=(null) inode=16988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=11 name=(null) inode=16990 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=12 name=(null) inode=16988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=13 name=(null) inode=16991 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=14 name=(null) inode=16988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=15 name=(null) inode=16992 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=16 name=(null) inode=16988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=17 name=(null) inode=16993 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=18 name=(null) inode=16985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=19 name=(null) inode=16994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=20 name=(null) inode=16994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=21 name=(null) inode=16995 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=22 name=(null) inode=16994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=23 name=(null) inode=16996 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=24 name=(null) inode=16994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=25 name=(null) inode=16997 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=26 name=(null) inode=16994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=27 name=(null) inode=16998 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=28 name=(null) inode=16994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=29 name=(null) inode=16999 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=30 name=(null) inode=16985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=31 name=(null) inode=17000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=32 name=(null) inode=17000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=33 name=(null) inode=17001 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=34 name=(null) inode=17000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=35 name=(null) inode=17002 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=36 name=(null) inode=17000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=37 name=(null) inode=17003 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=38 name=(null) inode=17000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=39 name=(null) inode=17004 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=40 name=(null) inode=17000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=41 name=(null) inode=17005 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=42 name=(null) inode=16985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=43 name=(null) inode=17006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=44 name=(null) inode=17006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=45 name=(null) inode=17007 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=46 name=(null) inode=17006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=47 name=(null) inode=17008 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=48 name=(null) inode=17006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=49 name=(null) inode=17009 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=50 name=(null) inode=17006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=51 name=(null) inode=17010 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=52 name=(null) inode=17006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=53 name=(null) inode=17011 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=55 name=(null) inode=17012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=56 name=(null) inode=17012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=57 name=(null) inode=17013 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=58 name=(null) inode=17012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=59 name=(null) inode=17014 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=60 name=(null) inode=17012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=61 name=(null) inode=17015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=62 name=(null) inode=17015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=63 name=(null) inode=17016 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=64 name=(null) inode=17015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=65 name=(null) inode=17017 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=66 name=(null) inode=17015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=67 name=(null) inode=17018 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=68 name=(null) inode=17015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=69 name=(null) inode=17019 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=70 name=(null) inode=17015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=71 name=(null) inode=17020 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=72 name=(null) inode=17012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=73 name=(null) inode=17021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=74 name=(null) inode=17021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=75 name=(null) inode=17022 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=76 name=(null) inode=17021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=77 name=(null) inode=17023 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=78 name=(null) inode=17021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=79 name=(null) inode=17024 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=80 name=(null) inode=17021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=81 name=(null) inode=17025 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=82 name=(null) inode=17021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=83 name=(null) inode=17026 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=84 name=(null) inode=17012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=85 name=(null) inode=17027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=86 name=(null) inode=17027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=87 name=(null) inode=17028 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=88 name=(null) inode=17027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=89 name=(null) inode=17029 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=90 name=(null) inode=17027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=91 name=(null) inode=17030 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=92 name=(null) inode=17027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=93 name=(null) inode=17031 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=94 name=(null) inode=17027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=95 name=(null) inode=17032 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=96 name=(null) inode=17012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=97 name=(null) inode=17033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=98 name=(null) inode=17033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=99 name=(null) inode=17034 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=100 name=(null) inode=17033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=101 name=(null) inode=17035 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=102 name=(null) inode=17033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=103 name=(null) inode=17036 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=104 name=(null) inode=17033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=105 name=(null) inode=17037 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=106 name=(null) inode=17033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=107 name=(null) inode=17038 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PATH item=109 name=(null) inode=17039 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:33:32.587000 audit: PROCTITLE proctitle="(udev-worker)" Oct 31 01:33:32.611998 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Oct 31 01:33:32.637309 kernel: mousedev: PS/2 mouse device common for all mice Oct 31 01:33:32.637365 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Oct 31 01:33:32.637443 (udev-worker)[1087]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Oct 31 01:33:32.655392 systemd[1]: Finished systemd-udev-settle.service. Oct 31 01:33:32.658908 kernel: kauditd_printk_skb: 225 callbacks suppressed Oct 31 01:33:32.658966 kernel: audit: type=1130 audit(1761874412.653:144): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:32.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:32.656727 systemd[1]: Starting lvm2-activation-early.service... Oct 31 01:33:32.713558 lvm[1105]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 01:33:32.738640 systemd[1]: Finished lvm2-activation-early.service. Oct 31 01:33:32.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:32.738840 systemd[1]: Reached target cryptsetup.target. Oct 31 01:33:32.742000 kernel: audit: type=1130 audit(1761874412.736:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:32.742569 systemd[1]: Starting lvm2-activation.service... Oct 31 01:33:32.744988 lvm[1106]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 01:33:32.763565 systemd[1]: Finished lvm2-activation.service. Oct 31 01:33:32.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:32.763827 systemd[1]: Reached target local-fs-pre.target. Oct 31 01:33:32.766992 kernel: audit: type=1130 audit(1761874412.761:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:32.766447 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 31 01:33:32.766470 systemd[1]: Reached target local-fs.target. Oct 31 01:33:32.766589 systemd[1]: Reached target machines.target. Oct 31 01:33:32.767753 systemd[1]: Starting ldconfig.service... Oct 31 01:33:32.768355 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:33:32.768400 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:33:32.769402 systemd[1]: Starting systemd-boot-update.service... Oct 31 01:33:32.770167 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 31 01:33:32.771151 systemd[1]: Starting systemd-machine-id-commit.service... Oct 31 01:33:32.772522 systemd[1]: Starting systemd-sysext.service... Oct 31 01:33:32.774245 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1108 (bootctl) Oct 31 01:33:32.775600 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 31 01:33:32.786564 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 31 01:33:32.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:32.790000 kernel: audit: type=1130 audit(1761874412.784:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:32.796751 systemd[1]: Unmounting usr-share-oem.mount... Oct 31 01:33:32.806685 systemd[1]: usr-share-oem.mount: Deactivated successfully. Oct 31 01:33:32.806806 systemd[1]: Unmounted usr-share-oem.mount. Oct 31 01:33:32.824019 kernel: loop0: detected capacity change from 0 to 229808 Oct 31 01:33:33.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.124748 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 31 01:33:33.125256 systemd[1]: Finished systemd-machine-id-commit.service. Oct 31 01:33:33.128994 kernel: audit: type=1130 audit(1761874413.123:148): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.144947 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Oct 31 01:33:33.163347 kernel: loop1: detected capacity change from 0 to 229808 Oct 31 01:33:33.163423 systemd-fsck[1118]: fsck.fat 4.2 (2021-01-31) Oct 31 01:33:33.163423 systemd-fsck[1118]: /dev/sda1: 790 files, 120772/258078 clusters Oct 31 01:33:33.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.164510 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 31 01:33:33.165580 systemd[1]: Mounting boot.mount... Oct 31 01:33:33.168121 kernel: audit: type=1130 audit(1761874413.162:149): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.176320 systemd[1]: Mounted boot.mount. Oct 31 01:33:33.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.187491 systemd[1]: Finished systemd-boot-update.service. Oct 31 01:33:33.191013 kernel: audit: type=1130 audit(1761874413.185:150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.194072 (sd-sysext)[1122]: Using extensions 'kubernetes'. Oct 31 01:33:33.195215 (sd-sysext)[1122]: Merged extensions into '/usr'. Oct 31 01:33:33.208528 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:33:33.210018 systemd[1]: Mounting usr-share-oem.mount... Oct 31 01:33:33.211077 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:33:33.213363 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:33:33.214958 systemd[1]: Starting modprobe@loop.service... Oct 31 01:33:33.215164 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:33:33.215262 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:33:33.215343 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:33:33.218881 systemd[1]: Mounted usr-share-oem.mount. Oct 31 01:33:33.219185 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:33:33.219424 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:33:33.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.222479 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:33:33.222612 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:33:33.225063 kernel: audit: type=1130 audit(1761874413.217:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.225133 kernel: audit: type=1131 audit(1761874413.220:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.225574 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:33:33.225709 systemd[1]: Finished modprobe@loop.service. Oct 31 01:33:33.229015 kernel: audit: type=1130 audit(1761874413.223:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.229061 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:33:33.229172 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:33:33.230107 systemd[1]: Finished systemd-sysext.service. Oct 31 01:33:33.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.231576 systemd[1]: Starting ensure-sysext.service... Oct 31 01:33:33.232769 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 31 01:33:33.238887 systemd[1]: Reloading. Oct 31 01:33:33.283805 /usr/lib/systemd/system-generators/torcx-generator[1150]: time="2025-10-31T01:33:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:33:33.283832 /usr/lib/systemd/system-generators/torcx-generator[1150]: time="2025-10-31T01:33:33Z" level=info msg="torcx already run" Oct 31 01:33:33.287915 systemd-tmpfiles[1131]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 31 01:33:33.294931 systemd-tmpfiles[1131]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 31 01:33:33.305688 systemd-tmpfiles[1131]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 31 01:33:33.375767 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:33:33.375782 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:33:33.393444 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:33:33.445000 audit: BPF prog-id=24 op=LOAD Oct 31 01:33:33.445000 audit: BPF prog-id=15 op=UNLOAD Oct 31 01:33:33.445000 audit: BPF prog-id=25 op=LOAD Oct 31 01:33:33.445000 audit: BPF prog-id=26 op=LOAD Oct 31 01:33:33.445000 audit: BPF prog-id=16 op=UNLOAD Oct 31 01:33:33.445000 audit: BPF prog-id=17 op=UNLOAD Oct 31 01:33:33.446000 audit: BPF prog-id=27 op=LOAD Oct 31 01:33:33.446000 audit: BPF prog-id=21 op=UNLOAD Oct 31 01:33:33.446000 audit: BPF prog-id=28 op=LOAD Oct 31 01:33:33.446000 audit: BPF prog-id=29 op=LOAD Oct 31 01:33:33.446000 audit: BPF prog-id=22 op=UNLOAD Oct 31 01:33:33.446000 audit: BPF prog-id=23 op=UNLOAD Oct 31 01:33:33.447000 audit: BPF prog-id=30 op=LOAD Oct 31 01:33:33.447000 audit: BPF prog-id=20 op=UNLOAD Oct 31 01:33:33.447000 audit: BPF prog-id=31 op=LOAD Oct 31 01:33:33.447000 audit: BPF prog-id=32 op=LOAD Oct 31 01:33:33.448000 audit: BPF prog-id=18 op=UNLOAD Oct 31 01:33:33.448000 audit: BPF prog-id=19 op=UNLOAD Oct 31 01:33:33.458763 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 31 01:33:33.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.465469 systemd[1]: Starting audit-rules.service... Oct 31 01:33:33.468554 systemd[1]: Starting clean-ca-certificates.service... Oct 31 01:33:33.472033 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 31 01:33:33.474000 audit: BPF prog-id=33 op=LOAD Oct 31 01:33:33.477126 systemd[1]: Starting systemd-resolved.service... Oct 31 01:33:33.476000 audit: BPF prog-id=34 op=LOAD Oct 31 01:33:33.478852 systemd[1]: Starting systemd-timesyncd.service... Oct 31 01:33:33.480132 systemd[1]: Starting systemd-update-utmp.service... Oct 31 01:33:33.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.481395 systemd[1]: Finished clean-ca-certificates.service. Oct 31 01:33:33.485255 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:33:33.486589 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:33:33.488193 systemd[1]: Starting modprobe@loop.service... Oct 31 01:33:33.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.489527 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:33:33.489631 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:33:33.489743 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 01:33:33.490438 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:33:33.490544 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:33:33.490888 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:33:33.490961 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:33:33.492453 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:33:33.492530 systemd[1]: Finished modprobe@loop.service. Oct 31 01:33:33.495286 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:33:33.497518 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:33:33.498663 systemd[1]: Starting modprobe@loop.service... Oct 31 01:33:33.503000 audit[1217]: SYSTEM_BOOT pid=1217 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.499071 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:33:33.499153 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:33:33.499235 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 01:33:33.503545 systemd[1]: Starting modprobe@drm.service... Oct 31 01:33:33.504036 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:33:33.504119 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:33:33.505580 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 31 01:33:33.505987 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 01:33:33.506895 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:33:33.507071 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:33:33.511457 systemd[1]: Finished ensure-sysext.service. Oct 31 01:33:33.511867 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:33:33.511948 systemd[1]: Finished modprobe@loop.service. Oct 31 01:33:33.512799 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:33:33.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.514282 systemd[1]: Finished systemd-update-utmp.service. Oct 31 01:33:33.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.518726 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 01:33:33.518817 systemd[1]: Finished modprobe@drm.service. Oct 31 01:33:33.519110 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:33:33.519186 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:33:33.519357 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:33:33.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:33.528494 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 31 01:33:33.549681 ldconfig[1107]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 31 01:33:33.559652 augenrules[1239]: No rules Oct 31 01:33:33.557000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 31 01:33:33.557000 audit[1239]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd90b1a590 a2=420 a3=0 items=0 ppid=1211 pid=1239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:33.557000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 31 01:33:33.561396 systemd[1]: Finished audit-rules.service. Oct 31 01:33:33.569125 systemd-resolved[1215]: Positive Trust Anchors: Oct 31 01:33:33.569377 systemd[1]: Finished ldconfig.service. Oct 31 01:33:33.570534 systemd[1]: Starting systemd-update-done.service... Oct 31 01:33:33.571042 systemd-resolved[1215]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 01:33:33.571077 systemd-resolved[1215]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 01:33:33.576281 systemd[1]: Finished systemd-update-done.service. Oct 31 01:33:33.591915 systemd-resolved[1215]: Defaulting to hostname 'linux'. Oct 31 01:33:33.593050 systemd[1]: Started systemd-resolved.service. Oct 31 01:33:33.593218 systemd[1]: Reached target network.target. Oct 31 01:33:33.593309 systemd[1]: Reached target nss-lookup.target. Oct 31 01:33:33.599186 systemd[1]: Started systemd-timesyncd.service. Oct 31 01:33:33.599378 systemd[1]: Reached target sysinit.target. Oct 31 01:33:33.599531 systemd[1]: Started motdgen.path. Oct 31 01:33:33.599638 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 31 01:33:33.599751 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 31 01:33:33.599848 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 31 01:33:33.599866 systemd[1]: Reached target paths.target. Oct 31 01:33:33.599954 systemd[1]: Reached target time-set.target. Oct 31 01:33:33.600145 systemd[1]: Started logrotate.timer. Oct 31 01:33:33.600311 systemd[1]: Started mdadm.timer. Oct 31 01:33:33.600393 systemd[1]: Reached target timers.target. Oct 31 01:33:33.600676 systemd[1]: Listening on dbus.socket. Oct 31 01:33:33.601602 systemd[1]: Starting docker.socket... Oct 31 01:33:33.603591 systemd[1]: Listening on sshd.socket. Oct 31 01:33:33.603762 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:33:33.604070 systemd[1]: Listening on docker.socket. Oct 31 01:33:33.604204 systemd[1]: Reached target sockets.target. Oct 31 01:33:33.604297 systemd[1]: Reached target basic.target. Oct 31 01:33:33.604414 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 01:33:33.604433 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 01:33:33.605299 systemd[1]: Starting containerd.service... Oct 31 01:33:33.606278 systemd[1]: Starting dbus.service... Oct 31 01:33:33.607535 systemd[1]: Starting enable-oem-cloudinit.service... Oct 31 01:33:33.608693 systemd[1]: Starting extend-filesystems.service... Oct 31 01:33:33.612555 jq[1250]: false Oct 31 01:33:33.609085 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 31 01:33:33.610777 systemd[1]: Starting motdgen.service... Oct 31 01:33:33.612445 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 31 01:33:33.614385 systemd[1]: Starting sshd-keygen.service... Oct 31 01:33:33.618105 systemd[1]: Starting systemd-logind.service... Oct 31 01:33:33.618241 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:33:33.618288 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 31 01:33:33.619306 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 31 01:33:33.620190 systemd[1]: Starting update-engine.service... Oct 31 01:33:33.621945 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 31 01:33:33.624655 systemd[1]: Starting vmtoolsd.service... Oct 31 01:33:33.626780 jq[1260]: true Oct 31 01:33:33.626391 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 31 01:33:33.626532 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 31 01:33:33.626950 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 31 01:33:33.627070 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 31 01:33:33.634863 jq[1263]: true Oct 31 01:33:33.642689 systemd[1]: Started vmtoolsd.service. Oct 31 01:33:33.646417 extend-filesystems[1251]: Found loop1 Oct 31 01:33:33.655720 extend-filesystems[1251]: Found sda Oct 31 01:33:33.656120 extend-filesystems[1251]: Found sda1 Oct 31 01:33:33.656307 extend-filesystems[1251]: Found sda2 Oct 31 01:33:33.657708 extend-filesystems[1251]: Found sda3 Oct 31 01:33:33.660801 extend-filesystems[1251]: Found usr Oct 31 01:33:33.661067 extend-filesystems[1251]: Found sda4 Oct 31 01:33:33.661257 extend-filesystems[1251]: Found sda6 Oct 31 01:33:33.661407 extend-filesystems[1251]: Found sda7 Oct 31 01:33:33.661547 extend-filesystems[1251]: Found sda9 Oct 31 01:33:33.661684 extend-filesystems[1251]: Checking size of /dev/sda9 Oct 31 01:35:11.761408 systemd-resolved[1215]: Clock change detected. Flushing caches. Oct 31 01:35:11.761606 systemd-timesyncd[1216]: Contacted time server 15.204.87.223:123 (0.flatcar.pool.ntp.org). Oct 31 01:35:11.761645 systemd-timesyncd[1216]: Initial clock synchronization to Fri 2025-10-31 01:35:11.761374 UTC. Oct 31 01:35:11.767220 extend-filesystems[1251]: Old size kept for /dev/sda9 Oct 31 01:35:11.767468 extend-filesystems[1251]: Found sr0 Oct 31 01:35:11.768115 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 31 01:35:11.768229 systemd[1]: Finished extend-filesystems.service. Oct 31 01:35:11.771972 systemd[1]: motdgen.service: Deactivated successfully. Oct 31 01:35:11.772086 systemd[1]: Finished motdgen.service. Oct 31 01:35:11.778737 dbus-daemon[1249]: [system] SELinux support is enabled Oct 31 01:35:11.778843 systemd[1]: Started dbus.service. Oct 31 01:35:11.780151 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 31 01:35:11.780169 systemd[1]: Reached target system-config.target. Oct 31 01:35:11.780295 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 31 01:35:11.780310 systemd[1]: Reached target user-config.target. Oct 31 01:35:11.794073 env[1264]: time="2025-10-31T01:35:11.794039964Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 31 01:35:11.802554 bash[1295]: Updated "/home/core/.ssh/authorized_keys" Oct 31 01:35:11.803031 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 31 01:35:11.810620 kernel: NET: Registered PF_VSOCK protocol family Oct 31 01:35:11.813779 systemd-logind[1258]: Watching system buttons on /dev/input/event1 (Power Button) Oct 31 01:35:11.813980 systemd-logind[1258]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 31 01:35:11.814130 systemd-logind[1258]: New seat seat0. Oct 31 01:35:11.814992 env[1264]: time="2025-10-31T01:35:11.814969857Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 31 01:35:11.815385 env[1264]: time="2025-10-31T01:35:11.815371653Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:35:11.816272 env[1264]: time="2025-10-31T01:35:11.816253369Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 31 01:35:11.816329 env[1264]: time="2025-10-31T01:35:11.816318434Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:35:11.816525 env[1264]: time="2025-10-31T01:35:11.816498823Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 01:35:11.816609 env[1264]: time="2025-10-31T01:35:11.816598836Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 31 01:35:11.816659 env[1264]: time="2025-10-31T01:35:11.816648278Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 31 01:35:11.816700 env[1264]: time="2025-10-31T01:35:11.816690870Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 31 01:35:11.816784 env[1264]: time="2025-10-31T01:35:11.816774236Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:35:11.816990 env[1264]: time="2025-10-31T01:35:11.816980002Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:35:11.817154 env[1264]: time="2025-10-31T01:35:11.817141525Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 01:35:11.817205 env[1264]: time="2025-10-31T01:35:11.817195264Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 31 01:35:11.817280 env[1264]: time="2025-10-31T01:35:11.817270639Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 31 01:35:11.817325 env[1264]: time="2025-10-31T01:35:11.817314765Z" level=info msg="metadata content store policy set" policy=shared Oct 31 01:35:11.819472 systemd[1]: Started systemd-logind.service. Oct 31 01:35:11.846058 env[1264]: time="2025-10-31T01:35:11.844181423Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 31 01:35:11.846058 env[1264]: time="2025-10-31T01:35:11.844213272Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 31 01:35:11.846058 env[1264]: time="2025-10-31T01:35:11.844223103Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 31 01:35:11.846058 env[1264]: time="2025-10-31T01:35:11.844245601Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 31 01:35:11.846058 env[1264]: time="2025-10-31T01:35:11.844255261Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 31 01:35:11.846058 env[1264]: time="2025-10-31T01:35:11.844264124Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 31 01:35:11.846058 env[1264]: time="2025-10-31T01:35:11.844274400Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 31 01:35:11.846058 env[1264]: time="2025-10-31T01:35:11.844282490Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 31 01:35:11.846058 env[1264]: time="2025-10-31T01:35:11.844291156Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 31 01:35:11.846058 env[1264]: time="2025-10-31T01:35:11.844303557Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 31 01:35:11.846058 env[1264]: time="2025-10-31T01:35:11.844310852Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 31 01:35:11.846058 env[1264]: time="2025-10-31T01:35:11.844318140Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 31 01:35:11.846058 env[1264]: time="2025-10-31T01:35:11.844405906Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 31 01:35:11.846058 env[1264]: time="2025-10-31T01:35:11.844458188Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 31 01:35:11.845892 systemd[1]: Started containerd.service. Oct 31 01:35:11.846421 env[1264]: time="2025-10-31T01:35:11.844619063Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 31 01:35:11.846421 env[1264]: time="2025-10-31T01:35:11.844638131Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 31 01:35:11.846421 env[1264]: time="2025-10-31T01:35:11.844646466Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 31 01:35:11.846421 env[1264]: time="2025-10-31T01:35:11.844678512Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 31 01:35:11.846421 env[1264]: time="2025-10-31T01:35:11.844686489Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 31 01:35:11.846421 env[1264]: time="2025-10-31T01:35:11.844694091Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 31 01:35:11.846421 env[1264]: time="2025-10-31T01:35:11.844704736Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 31 01:35:11.846421 env[1264]: time="2025-10-31T01:35:11.844715999Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 31 01:35:11.846421 env[1264]: time="2025-10-31T01:35:11.844726831Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 31 01:35:11.846421 env[1264]: time="2025-10-31T01:35:11.844733938Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 31 01:35:11.846421 env[1264]: time="2025-10-31T01:35:11.844740473Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 31 01:35:11.846421 env[1264]: time="2025-10-31T01:35:11.844749825Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 31 01:35:11.846421 env[1264]: time="2025-10-31T01:35:11.844830459Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 31 01:35:11.846421 env[1264]: time="2025-10-31T01:35:11.844840035Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 31 01:35:11.846421 env[1264]: time="2025-10-31T01:35:11.844846738Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 31 01:35:11.846705 env[1264]: time="2025-10-31T01:35:11.844853208Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 31 01:35:11.846705 env[1264]: time="2025-10-31T01:35:11.844861653Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 31 01:35:11.846705 env[1264]: time="2025-10-31T01:35:11.844867928Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 31 01:35:11.846705 env[1264]: time="2025-10-31T01:35:11.844878049Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 31 01:35:11.846705 env[1264]: time="2025-10-31T01:35:11.844900698Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 31 01:35:11.846795 env[1264]: time="2025-10-31T01:35:11.845031848Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 31 01:35:11.846795 env[1264]: time="2025-10-31T01:35:11.845076204Z" level=info msg="Connect containerd service" Oct 31 01:35:11.846795 env[1264]: time="2025-10-31T01:35:11.845105098Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 31 01:35:11.846795 env[1264]: time="2025-10-31T01:35:11.845449827Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 01:35:11.846795 env[1264]: time="2025-10-31T01:35:11.845662931Z" level=info msg="Start subscribing containerd event" Oct 31 01:35:11.846795 env[1264]: time="2025-10-31T01:35:11.845690835Z" level=info msg="Start recovering state" Oct 31 01:35:11.846795 env[1264]: time="2025-10-31T01:35:11.845778776Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 31 01:35:11.846795 env[1264]: time="2025-10-31T01:35:11.845815916Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 31 01:35:11.846795 env[1264]: time="2025-10-31T01:35:11.845846475Z" level=info msg="containerd successfully booted in 0.057602s" Oct 31 01:35:11.863141 env[1264]: time="2025-10-31T01:35:11.850365878Z" level=info msg="Start event monitor" Oct 31 01:35:11.863141 env[1264]: time="2025-10-31T01:35:11.850394826Z" level=info msg="Start snapshots syncer" Oct 31 01:35:11.863141 env[1264]: time="2025-10-31T01:35:11.850402270Z" level=info msg="Start cni network conf syncer for default" Oct 31 01:35:11.863141 env[1264]: time="2025-10-31T01:35:11.850406709Z" level=info msg="Start streaming server" Oct 31 01:35:11.871061 update_engine[1259]: I1031 01:35:11.863318 1259 main.cc:92] Flatcar Update Engine starting Oct 31 01:35:11.877652 systemd[1]: Started update-engine.service. Oct 31 01:35:11.877823 update_engine[1259]: I1031 01:35:11.877683 1259 update_check_scheduler.cc:74] Next update check in 10m30s Oct 31 01:35:11.879149 systemd[1]: Started locksmithd.service. Oct 31 01:35:11.980340 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:35:11.980386 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:35:12.056069 locksmithd[1308]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 31 01:35:12.103685 systemd-networkd[1082]: ens192: Gained IPv6LL Oct 31 01:35:12.104615 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 31 01:35:12.104901 systemd[1]: Reached target network-online.target. Oct 31 01:35:12.106184 systemd[1]: Starting kubelet.service... Oct 31 01:35:12.901944 sshd_keygen[1286]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 31 01:35:12.916594 systemd[1]: Finished sshd-keygen.service. Oct 31 01:35:12.917844 systemd[1]: Starting issuegen.service... Oct 31 01:35:12.921440 systemd[1]: issuegen.service: Deactivated successfully. Oct 31 01:35:12.921552 systemd[1]: Finished issuegen.service. Oct 31 01:35:12.922764 systemd[1]: Starting systemd-user-sessions.service... Oct 31 01:35:12.932516 systemd[1]: Finished systemd-user-sessions.service. Oct 31 01:35:12.933527 systemd[1]: Started getty@tty1.service. Oct 31 01:35:12.934469 systemd[1]: Started serial-getty@ttyS0.service. Oct 31 01:35:12.934679 systemd[1]: Reached target getty.target. Oct 31 01:35:13.350580 systemd[1]: Started kubelet.service. Oct 31 01:35:13.350970 systemd[1]: Reached target multi-user.target. Oct 31 01:35:13.352322 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 31 01:35:13.359012 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 31 01:35:13.359132 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 31 01:35:13.359358 systemd[1]: Startup finished in 1.059s (kernel) + 5.711s (initrd) + 6.005s (userspace) = 12.776s. Oct 31 01:35:13.466834 login[1373]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 31 01:35:13.466929 login[1372]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 31 01:35:13.477350 systemd[1]: Created slice user-500.slice. Oct 31 01:35:13.478397 systemd[1]: Starting user-runtime-dir@500.service... Oct 31 01:35:13.484610 systemd-logind[1258]: New session 1 of user core. Oct 31 01:35:13.487300 systemd-logind[1258]: New session 2 of user core. Oct 31 01:35:13.490332 systemd[1]: Finished user-runtime-dir@500.service. Oct 31 01:35:13.491572 systemd[1]: Starting user@500.service... Oct 31 01:35:13.495412 (systemd)[1379]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:35:13.558220 systemd[1379]: Queued start job for default target default.target. Oct 31 01:35:13.558822 systemd[1379]: Reached target paths.target. Oct 31 01:35:13.558836 systemd[1379]: Reached target sockets.target. Oct 31 01:35:13.558845 systemd[1379]: Reached target timers.target. Oct 31 01:35:13.558852 systemd[1379]: Reached target basic.target. Oct 31 01:35:13.558915 systemd[1]: Started user@500.service. Oct 31 01:35:13.559671 systemd[1]: Started session-1.scope. Oct 31 01:35:13.560195 systemd[1]: Started session-2.scope. Oct 31 01:35:13.565176 systemd[1379]: Reached target default.target. Oct 31 01:35:13.565490 systemd[1379]: Startup finished in 64ms. Oct 31 01:35:14.153676 kubelet[1376]: E1031 01:35:14.153650 1376 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 01:35:14.154872 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 01:35:14.154954 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 01:35:24.279401 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 31 01:35:24.279550 systemd[1]: Stopped kubelet.service. Oct 31 01:35:24.280626 systemd[1]: Starting kubelet.service... Oct 31 01:35:24.355392 systemd[1]: Started kubelet.service. Oct 31 01:35:24.476745 kubelet[1408]: E1031 01:35:24.476708 1408 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 01:35:24.479120 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 01:35:24.479225 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 01:35:34.529488 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 31 01:35:34.529690 systemd[1]: Stopped kubelet.service. Oct 31 01:35:34.530967 systemd[1]: Starting kubelet.service... Oct 31 01:35:34.695544 systemd[1]: Started kubelet.service. Oct 31 01:35:34.741515 kubelet[1417]: E1031 01:35:34.741484 1417 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 01:35:34.743029 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 01:35:34.743126 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 01:35:41.975902 systemd[1]: Created slice system-sshd.slice. Oct 31 01:35:41.976711 systemd[1]: Started sshd@0-139.178.70.110:22-147.75.109.163:47358.service. Oct 31 01:35:42.013513 sshd[1423]: Accepted publickey for core from 147.75.109.163 port 47358 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:35:42.014545 sshd[1423]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:35:42.017230 systemd-logind[1258]: New session 3 of user core. Oct 31 01:35:42.017752 systemd[1]: Started session-3.scope. Oct 31 01:35:42.065929 systemd[1]: Started sshd@1-139.178.70.110:22-147.75.109.163:47364.service. Oct 31 01:35:42.094788 sshd[1428]: Accepted publickey for core from 147.75.109.163 port 47364 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:35:42.095677 sshd[1428]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:35:42.099199 systemd[1]: Started session-4.scope. Oct 31 01:35:42.099991 systemd-logind[1258]: New session 4 of user core. Oct 31 01:35:42.151405 sshd[1428]: pam_unix(sshd:session): session closed for user core Oct 31 01:35:42.154801 systemd[1]: Started sshd@2-139.178.70.110:22-147.75.109.163:47378.service. Oct 31 01:35:42.157311 systemd-logind[1258]: Session 4 logged out. Waiting for processes to exit. Oct 31 01:35:42.158467 systemd[1]: sshd@1-139.178.70.110:22-147.75.109.163:47364.service: Deactivated successfully. Oct 31 01:35:42.158952 systemd[1]: session-4.scope: Deactivated successfully. Oct 31 01:35:42.160106 systemd-logind[1258]: Removed session 4. Oct 31 01:35:42.182395 sshd[1433]: Accepted publickey for core from 147.75.109.163 port 47378 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:35:42.183320 sshd[1433]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:35:42.185710 systemd-logind[1258]: New session 5 of user core. Oct 31 01:35:42.186139 systemd[1]: Started session-5.scope. Oct 31 01:35:42.233238 sshd[1433]: pam_unix(sshd:session): session closed for user core Oct 31 01:35:42.236684 systemd[1]: sshd@2-139.178.70.110:22-147.75.109.163:47378.service: Deactivated successfully. Oct 31 01:35:42.237138 systemd[1]: session-5.scope: Deactivated successfully. Oct 31 01:35:42.237632 systemd-logind[1258]: Session 5 logged out. Waiting for processes to exit. Oct 31 01:35:42.238398 systemd[1]: Started sshd@3-139.178.70.110:22-147.75.109.163:47392.service. Oct 31 01:35:42.239205 systemd-logind[1258]: Removed session 5. Oct 31 01:35:42.267816 sshd[1440]: Accepted publickey for core from 147.75.109.163 port 47392 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:35:42.268882 sshd[1440]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:35:42.272285 systemd-logind[1258]: New session 6 of user core. Oct 31 01:35:42.272846 systemd[1]: Started session-6.scope. Oct 31 01:35:42.325135 sshd[1440]: pam_unix(sshd:session): session closed for user core Oct 31 01:35:42.327321 systemd[1]: Started sshd@4-139.178.70.110:22-147.75.109.163:47398.service. Oct 31 01:35:42.327955 systemd[1]: sshd@3-139.178.70.110:22-147.75.109.163:47392.service: Deactivated successfully. Oct 31 01:35:42.328422 systemd[1]: session-6.scope: Deactivated successfully. Oct 31 01:35:42.329662 systemd-logind[1258]: Session 6 logged out. Waiting for processes to exit. Oct 31 01:35:42.331633 systemd-logind[1258]: Removed session 6. Oct 31 01:35:42.354980 sshd[1445]: Accepted publickey for core from 147.75.109.163 port 47398 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:35:42.355798 sshd[1445]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:35:42.358327 systemd-logind[1258]: New session 7 of user core. Oct 31 01:35:42.358780 systemd[1]: Started session-7.scope. Oct 31 01:35:42.418223 sudo[1449]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 31 01:35:42.418407 sudo[1449]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:35:42.424895 dbus-daemon[1249]: \xd0m\xc5v\xe9U: received setenforce notice (enforcing=-118939488) Oct 31 01:35:42.425015 sudo[1449]: pam_unix(sudo:session): session closed for user root Oct 31 01:35:42.427384 sshd[1445]: pam_unix(sshd:session): session closed for user core Oct 31 01:35:42.429888 systemd[1]: Started sshd@5-139.178.70.110:22-147.75.109.163:47404.service. Oct 31 01:35:42.430758 systemd[1]: sshd@4-139.178.70.110:22-147.75.109.163:47398.service: Deactivated successfully. Oct 31 01:35:42.431321 systemd[1]: session-7.scope: Deactivated successfully. Oct 31 01:35:42.431947 systemd-logind[1258]: Session 7 logged out. Waiting for processes to exit. Oct 31 01:35:42.432933 systemd-logind[1258]: Removed session 7. Oct 31 01:35:42.460548 sshd[1452]: Accepted publickey for core from 147.75.109.163 port 47404 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:35:42.461672 sshd[1452]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:35:42.464520 systemd-logind[1258]: New session 8 of user core. Oct 31 01:35:42.465045 systemd[1]: Started session-8.scope. Oct 31 01:35:42.515485 sudo[1457]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 31 01:35:42.516039 sudo[1457]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:35:42.518357 sudo[1457]: pam_unix(sudo:session): session closed for user root Oct 31 01:35:42.521240 sudo[1456]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 31 01:35:42.521370 sudo[1456]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:35:42.526660 systemd[1]: Stopping audit-rules.service... Oct 31 01:35:42.527000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 01:35:42.527771 auditctl[1460]: No rules Oct 31 01:35:42.530181 kernel: kauditd_printk_skb: 47 callbacks suppressed Oct 31 01:35:42.530221 kernel: audit: type=1305 audit(1761874542.527:199): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 01:35:42.530239 kernel: audit: type=1300 audit(1761874542.527:199): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd2ab904d0 a2=420 a3=0 items=0 ppid=1 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:42.527000 audit[1460]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd2ab904d0 a2=420 a3=0 items=0 ppid=1 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:42.527992 systemd[1]: audit-rules.service: Deactivated successfully. Oct 31 01:35:42.528082 systemd[1]: Stopped audit-rules.service. Oct 31 01:35:42.530075 systemd[1]: Starting audit-rules.service... Oct 31 01:35:42.527000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 31 01:35:42.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:42.538335 kernel: audit: type=1327 audit(1761874542.527:199): proctitle=2F7362696E2F617564697463746C002D44 Oct 31 01:35:42.538358 kernel: audit: type=1131 audit(1761874542.527:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:42.546166 augenrules[1477]: No rules Oct 31 01:35:42.546596 systemd[1]: Finished audit-rules.service. Oct 31 01:35:42.547160 sudo[1456]: pam_unix(sudo:session): session closed for user root Oct 31 01:35:42.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:42.550662 kernel: audit: type=1130 audit(1761874542.546:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:42.550596 sshd[1452]: pam_unix(sshd:session): session closed for user core Oct 31 01:35:42.546000 audit[1456]: USER_END pid=1456 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:35:42.552493 systemd[1]: Started sshd@6-139.178.70.110:22-147.75.109.163:47414.service. Oct 31 01:35:42.558577 kernel: audit: type=1106 audit(1761874542.546:202): pid=1456 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:35:42.558615 kernel: audit: type=1104 audit(1761874542.546:203): pid=1456 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:35:42.558633 kernel: audit: type=1130 audit(1761874542.550:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.110:22-147.75.109.163:47414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:42.546000 audit[1456]: CRED_DISP pid=1456 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:35:42.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.110:22-147.75.109.163:47414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:42.561292 systemd[1]: sshd@5-139.178.70.110:22-147.75.109.163:47404.service: Deactivated successfully. Oct 31 01:35:42.561697 systemd[1]: session-8.scope: Deactivated successfully. Oct 31 01:35:42.559000 audit[1452]: USER_END pid=1452 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:42.560000 audit[1452]: CRED_DISP pid=1452 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:42.569350 kernel: audit: type=1106 audit(1761874542.559:205): pid=1452 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:42.569386 kernel: audit: type=1104 audit(1761874542.560:206): pid=1452 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:42.569473 systemd-logind[1258]: Session 8 logged out. Waiting for processes to exit. Oct 31 01:35:42.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.110:22-147.75.109.163:47404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:42.570445 systemd-logind[1258]: Removed session 8. Oct 31 01:35:42.582684 sshd[1482]: Accepted publickey for core from 147.75.109.163 port 47414 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:35:42.582000 audit[1482]: USER_ACCT pid=1482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:42.582000 audit[1482]: CRED_ACQ pid=1482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:42.582000 audit[1482]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd75e285d0 a2=3 a3=0 items=0 ppid=1 pid=1482 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:42.582000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:35:42.583732 sshd[1482]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:35:42.586517 systemd[1]: Started session-9.scope. Oct 31 01:35:42.586730 systemd-logind[1258]: New session 9 of user core. Oct 31 01:35:42.588000 audit[1482]: USER_START pid=1482 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:42.589000 audit[1485]: CRED_ACQ pid=1485 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:42.635000 audit[1486]: USER_ACCT pid=1486 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:35:42.635838 sudo[1486]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 31 01:35:42.635981 sudo[1486]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:35:42.635000 audit[1486]: CRED_REFR pid=1486 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:35:42.636000 audit[1486]: USER_START pid=1486 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:35:42.642334 systemd[1]: /etc/systemd/system/coreos-metadata.service:11: Ignoring unknown escape sequences: "echo "COREOS_CUSTOM_PRIVATE_IPV4=$(ip addr show ens192 | grep "inet 10." | grep -Po "inet \K[\d.]+") Oct 31 01:35:42.644027 systemd[1]: Starting coreos-metadata.service... Oct 31 01:35:42.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:42.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:42.657953 systemd[1]: coreos-metadata.service: Deactivated successfully. Oct 31 01:35:42.658061 systemd[1]: Finished coreos-metadata.service. Oct 31 01:35:43.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:43.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:43.121551 systemd[1]: Stopped kubelet.service. Oct 31 01:35:43.123612 systemd[1]: Starting kubelet.service... Oct 31 01:35:43.142150 systemd[1]: Reloading. Oct 31 01:35:43.211854 /usr/lib/systemd/system-generators/torcx-generator[1549]: time="2025-10-31T01:35:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:35:43.211871 /usr/lib/systemd/system-generators/torcx-generator[1549]: time="2025-10-31T01:35:43Z" level=info msg="torcx already run" Oct 31 01:35:43.268843 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:35:43.268858 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:35:43.281028 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:35:43.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit: BPF prog-id=40 op=LOAD Oct 31 01:35:43.321000 audit: BPF prog-id=24 op=UNLOAD Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit: BPF prog-id=41 op=LOAD Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit: BPF prog-id=42 op=LOAD Oct 31 01:35:43.321000 audit: BPF prog-id=25 op=UNLOAD Oct 31 01:35:43.321000 audit: BPF prog-id=26 op=UNLOAD Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.321000 audit: BPF prog-id=43 op=LOAD Oct 31 01:35:43.321000 audit: BPF prog-id=33 op=UNLOAD Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit: BPF prog-id=44 op=LOAD Oct 31 01:35:43.322000 audit: BPF prog-id=34 op=UNLOAD Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit: BPF prog-id=45 op=LOAD Oct 31 01:35:43.322000 audit: BPF prog-id=27 op=UNLOAD Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit: BPF prog-id=46 op=LOAD Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.322000 audit: BPF prog-id=47 op=LOAD Oct 31 01:35:43.322000 audit: BPF prog-id=28 op=UNLOAD Oct 31 01:35:43.322000 audit: BPF prog-id=29 op=UNLOAD Oct 31 01:35:43.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.323000 audit: BPF prog-id=48 op=LOAD Oct 31 01:35:43.323000 audit: BPF prog-id=30 op=UNLOAD Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit: BPF prog-id=49 op=LOAD Oct 31 01:35:43.324000 audit: BPF prog-id=35 op=UNLOAD Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit: BPF prog-id=50 op=LOAD Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.324000 audit: BPF prog-id=51 op=LOAD Oct 31 01:35:43.324000 audit: BPF prog-id=36 op=UNLOAD Oct 31 01:35:43.324000 audit: BPF prog-id=37 op=UNLOAD Oct 31 01:35:43.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.325000 audit: BPF prog-id=52 op=LOAD Oct 31 01:35:43.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.325000 audit: BPF prog-id=53 op=LOAD Oct 31 01:35:43.325000 audit: BPF prog-id=31 op=UNLOAD Oct 31 01:35:43.325000 audit: BPF prog-id=32 op=UNLOAD Oct 31 01:35:43.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:43.326000 audit: BPF prog-id=54 op=LOAD Oct 31 01:35:43.326000 audit: BPF prog-id=38 op=UNLOAD Oct 31 01:35:43.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:43.333689 systemd[1]: Started kubelet.service. Oct 31 01:35:43.335917 systemd[1]: Stopping kubelet.service... Oct 31 01:35:43.336272 systemd[1]: kubelet.service: Deactivated successfully. Oct 31 01:35:43.336448 systemd[1]: Stopped kubelet.service. Oct 31 01:35:43.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:43.338295 systemd[1]: Starting kubelet.service... Oct 31 01:35:43.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:43.735016 systemd[1]: Started kubelet.service. Oct 31 01:35:43.771824 kubelet[1617]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 01:35:43.771824 kubelet[1617]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 31 01:35:43.771824 kubelet[1617]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 01:35:43.772063 kubelet[1617]: I1031 01:35:43.771846 1617 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 31 01:35:44.620137 kubelet[1617]: I1031 01:35:44.620116 1617 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Oct 31 01:35:44.620237 kubelet[1617]: I1031 01:35:44.620228 1617 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 31 01:35:44.620409 kubelet[1617]: I1031 01:35:44.620400 1617 server.go:956] "Client rotation is on, will bootstrap in background" Oct 31 01:35:44.643687 kubelet[1617]: I1031 01:35:44.643666 1617 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 31 01:35:44.649194 kubelet[1617]: E1031 01:35:44.649156 1617 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 31 01:35:44.649194 kubelet[1617]: I1031 01:35:44.649181 1617 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Oct 31 01:35:44.651726 kubelet[1617]: I1031 01:35:44.651706 1617 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 31 01:35:44.651869 kubelet[1617]: I1031 01:35:44.651845 1617 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 31 01:35:44.652872 kubelet[1617]: I1031 01:35:44.651871 1617 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.67.124.142","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 31 01:35:44.652959 kubelet[1617]: I1031 01:35:44.652877 1617 topology_manager.go:138] "Creating topology manager with none policy" Oct 31 01:35:44.652959 kubelet[1617]: I1031 01:35:44.652886 1617 container_manager_linux.go:303] "Creating device plugin manager" Oct 31 01:35:44.653007 kubelet[1617]: I1031 01:35:44.652962 1617 state_mem.go:36] "Initialized new in-memory state store" Oct 31 01:35:44.655214 kubelet[1617]: I1031 01:35:44.655199 1617 kubelet.go:480] "Attempting to sync node with API server" Oct 31 01:35:44.655273 kubelet[1617]: I1031 01:35:44.655220 1617 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 31 01:35:44.655273 kubelet[1617]: I1031 01:35:44.655239 1617 kubelet.go:386] "Adding apiserver pod source" Oct 31 01:35:44.655273 kubelet[1617]: I1031 01:35:44.655252 1617 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 31 01:35:44.670905 kubelet[1617]: E1031 01:35:44.670881 1617 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:44.671064 kubelet[1617]: E1031 01:35:44.671052 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:44.671399 kubelet[1617]: I1031 01:35:44.671385 1617 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 31 01:35:44.671754 kubelet[1617]: I1031 01:35:44.671741 1617 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Oct 31 01:35:44.672603 kubelet[1617]: W1031 01:35:44.672570 1617 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 31 01:35:44.674005 kubelet[1617]: I1031 01:35:44.673993 1617 watchdog_linux.go:99] "Systemd watchdog is not enabled" Oct 31 01:35:44.674050 kubelet[1617]: I1031 01:35:44.674020 1617 server.go:1289] "Started kubelet" Oct 31 01:35:44.674574 kubelet[1617]: I1031 01:35:44.674533 1617 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 31 01:35:44.675295 kubelet[1617]: I1031 01:35:44.675280 1617 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 31 01:35:44.675399 kubelet[1617]: I1031 01:35:44.675378 1617 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Oct 31 01:35:44.676346 kubelet[1617]: I1031 01:35:44.676333 1617 server.go:317] "Adding debug handlers to kubelet server" Oct 31 01:35:44.677000 audit[1617]: AVC avc: denied { mac_admin } for pid=1617 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:44.677000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:35:44.677000 audit[1617]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00086f530 a1=c000a7f3e0 a2=c00086f500 a3=25 items=0 ppid=1 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:44.677000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:35:44.678058 kubelet[1617]: I1031 01:35:44.678043 1617 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 31 01:35:44.677000 audit[1617]: AVC avc: denied { mac_admin } for pid=1617 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:44.677000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:35:44.677000 audit[1617]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004497e0 a1=c000a7f3f8 a2=c00086f5c0 a3=25 items=0 ppid=1 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:44.677000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:35:44.678277 kubelet[1617]: I1031 01:35:44.678266 1617 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 31 01:35:44.678362 kubelet[1617]: I1031 01:35:44.678355 1617 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 31 01:35:44.685296 kubelet[1617]: E1031 01:35:44.685266 1617 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Oct 31 01:35:44.685433 kubelet[1617]: E1031 01:35:44.685370 1617 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: nodes \"10.67.124.142\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Oct 31 01:35:44.688210 kubelet[1617]: E1031 01:35:44.686348 1617 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.142.18736f904618de7c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.142,UID:10.67.124.142,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.67.124.142,},FirstTimestamp:2025-10-31 01:35:44.674004604 +0000 UTC m=+0.933343937,LastTimestamp:2025-10-31 01:35:44.674004604 +0000 UTC m=+0.933343937,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.142,}" Oct 31 01:35:44.688364 kubelet[1617]: I1031 01:35:44.688338 1617 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 31 01:35:44.691225 kubelet[1617]: E1031 01:35:44.691057 1617 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 31 01:35:44.693691 kubelet[1617]: E1031 01:35:44.691774 1617 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.142\" not found" Oct 31 01:35:44.693691 kubelet[1617]: I1031 01:35:44.691800 1617 volume_manager.go:297] "Starting Kubelet Volume Manager" Oct 31 01:35:44.693691 kubelet[1617]: I1031 01:35:44.691964 1617 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Oct 31 01:35:44.693691 kubelet[1617]: I1031 01:35:44.691991 1617 reconciler.go:26] "Reconciler: start to sync state" Oct 31 01:35:44.693691 kubelet[1617]: I1031 01:35:44.692631 1617 factory.go:223] Registration of the systemd container factory successfully Oct 31 01:35:44.693691 kubelet[1617]: I1031 01:35:44.692704 1617 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 31 01:35:44.693691 kubelet[1617]: I1031 01:35:44.693605 1617 factory.go:223] Registration of the containerd container factory successfully Oct 31 01:35:44.705084 kubelet[1617]: I1031 01:35:44.705069 1617 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 31 01:35:44.705177 kubelet[1617]: I1031 01:35:44.705166 1617 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 31 01:35:44.705231 kubelet[1617]: I1031 01:35:44.705217 1617 state_mem.go:36] "Initialized new in-memory state store" Oct 31 01:35:44.707091 kubelet[1617]: I1031 01:35:44.707080 1617 policy_none.go:49] "None policy: Start" Oct 31 01:35:44.707160 kubelet[1617]: I1031 01:35:44.707152 1617 memory_manager.go:186] "Starting memorymanager" policy="None" Oct 31 01:35:44.707214 kubelet[1617]: I1031 01:35:44.707207 1617 state_mem.go:35] "Initializing new in-memory state store" Oct 31 01:35:44.708713 kubelet[1617]: E1031 01:35:44.708692 1617 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Oct 31 01:35:44.708946 kubelet[1617]: E1031 01:35:44.708924 1617 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.124.142\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Oct 31 01:35:44.709162 kubelet[1617]: E1031 01:35:44.709113 1617 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.142.18736f90471cd6f8 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.142,UID:10.67.124.142,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.67.124.142,},FirstTimestamp:2025-10-31 01:35:44.69104204 +0000 UTC m=+0.950381385,LastTimestamp:2025-10-31 01:35:44.69104204 +0000 UTC m=+0.950381385,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.142,}" Oct 31 01:35:44.713346 systemd[1]: Created slice kubepods.slice. Oct 31 01:35:44.713827 kubelet[1617]: E1031 01:35:44.713751 1617 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.142.18736f9047ed0fc9 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.142,UID:10.67.124.142,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.67.124.142 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.67.124.142,},FirstTimestamp:2025-10-31 01:35:44.704688073 +0000 UTC m=+0.964027406,LastTimestamp:2025-10-31 01:35:44.704688073 +0000 UTC m=+0.964027406,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.142,}" Oct 31 01:35:44.716651 systemd[1]: Created slice kubepods-burstable.slice. Oct 31 01:35:44.719217 systemd[1]: Created slice kubepods-besteffort.slice. Oct 31 01:35:44.724327 kubelet[1617]: E1031 01:35:44.724312 1617 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Oct 31 01:35:44.723000 audit[1617]: AVC avc: denied { mac_admin } for pid=1617 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:44.723000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:35:44.723000 audit[1617]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000df5fb0 a1=c000cb6738 a2=c000df5f80 a3=25 items=0 ppid=1 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:44.724724 kubelet[1617]: E1031 01:35:44.724270 1617 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.142.18736f9047ed22c1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.142,UID:10.67.124.142,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.67.124.142 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.67.124.142,},FirstTimestamp:2025-10-31 01:35:44.704692929 +0000 UTC m=+0.964032263,LastTimestamp:2025-10-31 01:35:44.704692929 +0000 UTC m=+0.964032263,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.142,}" Oct 31 01:35:44.723000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:35:44.725712 kubelet[1617]: E1031 01:35:44.725685 1617 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Oct 31 01:35:44.725860 kubelet[1617]: I1031 01:35:44.725850 1617 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 31 01:35:44.725948 kubelet[1617]: I1031 01:35:44.725917 1617 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 31 01:35:44.726177 kubelet[1617]: I1031 01:35:44.726168 1617 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 31 01:35:44.727159 kubelet[1617]: E1031 01:35:44.726985 1617 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 31 01:35:44.727159 kubelet[1617]: E1031 01:35:44.727017 1617 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.124.142\" not found" Oct 31 01:35:44.729262 kubelet[1617]: E1031 01:35:44.729205 1617 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.142.18736f9047ed2e00 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.142,UID:10.67.124.142,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 10.67.124.142 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:10.67.124.142,},FirstTimestamp:2025-10-31 01:35:44.704695808 +0000 UTC m=+0.964035141,LastTimestamp:2025-10-31 01:35:44.704695808 +0000 UTC m=+0.964035141,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.142,}" Oct 31 01:35:44.734811 kubelet[1617]: E1031 01:35:44.734727 1617 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.142.18736f90492f083c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.142,UID:10.67.124.142,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeAllocatableEnforced,Message:Updated Node Allocatable limit across pods,Source:EventSource{Component:kubelet,Host:10.67.124.142,},FirstTimestamp:2025-10-31 01:35:44.725788732 +0000 UTC m=+0.985128068,LastTimestamp:2025-10-31 01:35:44.725788732 +0000 UTC m=+0.985128068,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.142,}" Oct 31 01:35:44.739000 audit[1639]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1639 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:44.739000 audit[1639]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe28f37e70 a2=0 a3=7ffe28f37e5c items=0 ppid=1617 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:44.739000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 01:35:44.741000 audit[1640]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1640 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:44.741000 audit[1640]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffebb98cd80 a2=0 a3=7ffebb98cd6c items=0 ppid=1617 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:44.741000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 01:35:44.742000 audit[1642]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:44.742000 audit[1642]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdeb9d2c00 a2=0 a3=7ffdeb9d2bec items=0 ppid=1617 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:44.742000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:35:44.756000 audit[1647]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:44.756000 audit[1647]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc1b3055a0 a2=0 a3=7ffc1b30558c items=0 ppid=1617 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:44.756000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:35:44.787000 audit[1652]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1652 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:44.787000 audit[1652]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe6edd7ab0 a2=0 a3=7ffe6edd7a9c items=0 ppid=1617 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:44.787000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 31 01:35:44.788359 kubelet[1617]: I1031 01:35:44.788208 1617 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Oct 31 01:35:44.788000 audit[1653]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1653 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:44.788000 audit[1653]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc664fd770 a2=0 a3=7ffc664fd75c items=0 ppid=1617 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:44.788000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 01:35:44.789045 kubelet[1617]: I1031 01:35:44.789035 1617 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Oct 31 01:35:44.789092 kubelet[1617]: I1031 01:35:44.789085 1617 status_manager.go:230] "Starting to sync pod status with apiserver" Oct 31 01:35:44.789206 kubelet[1617]: I1031 01:35:44.789199 1617 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 31 01:35:44.789252 kubelet[1617]: I1031 01:35:44.789245 1617 kubelet.go:2436] "Starting kubelet main sync loop" Oct 31 01:35:44.789360 kubelet[1617]: E1031 01:35:44.789352 1617 kubelet.go:2460] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 31 01:35:44.789000 audit[1654]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1654 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:44.789000 audit[1654]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1d8622b0 a2=0 a3=7ffd1d86229c items=0 ppid=1617 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:44.789000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 01:35:44.790000 audit[1655]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1655 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:44.790000 audit[1655]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe708c0880 a2=0 a3=7ffe708c086c items=0 ppid=1617 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:44.790000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 01:35:44.790000 audit[1657]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1657 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:44.790000 audit[1657]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffde483260 a2=0 a3=7fffde48324c items=0 ppid=1617 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:44.790000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 01:35:44.791000 audit[1658]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1658 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:44.791000 audit[1658]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffed15bc40 a2=0 a3=7fffed15bc2c items=0 ppid=1617 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:44.791000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 01:35:44.791000 audit[1660]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1660 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:44.791000 audit[1659]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1659 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:44.791000 audit[1659]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffff55396f0 a2=0 a3=10e3 items=0 ppid=1617 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:44.791000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 01:35:44.791000 audit[1660]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc79606770 a2=0 a3=7ffc7960675c items=0 ppid=1617 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:44.791000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 01:35:44.797440 kubelet[1617]: E1031 01:35:44.797420 1617 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"runtimeclasses\" in API group \"node.k8s.io\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Oct 31 01:35:44.827405 kubelet[1617]: I1031 01:35:44.827388 1617 kubelet_node_status.go:75] "Attempting to register node" node="10.67.124.142" Oct 31 01:35:44.846425 kubelet[1617]: I1031 01:35:44.846396 1617 kubelet_node_status.go:78] "Successfully registered node" node="10.67.124.142" Oct 31 01:35:44.846425 kubelet[1617]: E1031 01:35:44.846419 1617 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.67.124.142\": node \"10.67.124.142\" not found" Oct 31 01:35:44.853873 kubelet[1617]: E1031 01:35:44.853839 1617 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.142\" not found" Oct 31 01:35:44.954958 kubelet[1617]: E1031 01:35:44.954867 1617 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.142\" not found" Oct 31 01:35:45.055571 kubelet[1617]: E1031 01:35:45.055533 1617 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.142\" not found" Oct 31 01:35:45.156446 kubelet[1617]: E1031 01:35:45.156419 1617 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.142\" not found" Oct 31 01:35:45.257407 kubelet[1617]: E1031 01:35:45.257337 1617 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.142\" not found" Oct 31 01:35:45.358042 kubelet[1617]: E1031 01:35:45.358011 1617 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.142\" not found" Oct 31 01:35:45.458955 kubelet[1617]: E1031 01:35:45.458906 1617 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.142\" not found" Oct 31 01:35:45.559699 kubelet[1617]: E1031 01:35:45.559668 1617 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.142\" not found" Oct 31 01:35:45.621414 kubelet[1617]: I1031 01:35:45.621377 1617 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Oct 31 01:35:45.660737 kubelet[1617]: E1031 01:35:45.660710 1617 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.142\" not found" Oct 31 01:35:45.671250 kubelet[1617]: E1031 01:35:45.671220 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:45.761957 kubelet[1617]: E1031 01:35:45.761921 1617 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.142\" not found" Oct 31 01:35:45.820000 audit[1486]: USER_END pid=1486 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:35:45.820000 audit[1486]: CRED_DISP pid=1486 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:35:45.821082 sudo[1486]: pam_unix(sudo:session): session closed for user root Oct 31 01:35:45.822679 sshd[1482]: pam_unix(sshd:session): session closed for user core Oct 31 01:35:45.823000 audit[1482]: USER_END pid=1482 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:45.823000 audit[1482]: CRED_DISP pid=1482 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:45.825935 systemd-logind[1258]: Session 9 logged out. Waiting for processes to exit. Oct 31 01:35:45.826896 systemd[1]: sshd@6-139.178.70.110:22-147.75.109.163:47414.service: Deactivated successfully. Oct 31 01:35:45.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.110:22-147.75.109.163:47414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:45.827664 systemd[1]: session-9.scope: Deactivated successfully. Oct 31 01:35:45.828135 systemd-logind[1258]: Removed session 9. Oct 31 01:35:45.862465 kubelet[1617]: E1031 01:35:45.862432 1617 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.142\" not found" Oct 31 01:35:45.963033 kubelet[1617]: E1031 01:35:45.963006 1617 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.142\" not found" Oct 31 01:35:46.064007 kubelet[1617]: E1031 01:35:46.063978 1617 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.142\" not found" Oct 31 01:35:46.164641 kubelet[1617]: I1031 01:35:46.164499 1617 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Oct 31 01:35:46.164908 env[1264]: time="2025-10-31T01:35:46.164850951Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 31 01:35:46.165234 kubelet[1617]: I1031 01:35:46.165225 1617 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Oct 31 01:35:46.667241 kubelet[1617]: I1031 01:35:46.667212 1617 apiserver.go:52] "Watching apiserver" Oct 31 01:35:46.672547 kubelet[1617]: E1031 01:35:46.672023 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:46.680209 systemd[1]: Created slice kubepods-besteffort-pod6571b4fd_9ea0_485e_a049_631411b480e0.slice. Oct 31 01:35:46.682610 kubelet[1617]: E1031 01:35:46.682587 1617 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qdjck" podUID="bbcb9b1c-ac58-4050-afb7-2be05d7754ef" Oct 31 01:35:46.691488 systemd[1]: Created slice kubepods-besteffort-pod6a8aa29b_84ba_4e4c_a32e_9b96fd553be2.slice. Oct 31 01:35:46.692221 kubelet[1617]: I1031 01:35:46.692204 1617 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Oct 31 01:35:46.702296 kubelet[1617]: I1031 01:35:46.702264 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6571b4fd-9ea0-485e-a049-631411b480e0-cni-bin-dir\") pod \"calico-node-b5ddh\" (UID: \"6571b4fd-9ea0-485e-a049-631411b480e0\") " pod="calico-system/calico-node-b5ddh" Oct 31 01:35:46.702296 kubelet[1617]: I1031 01:35:46.702301 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6571b4fd-9ea0-485e-a049-631411b480e0-var-lib-calico\") pod \"calico-node-b5ddh\" (UID: \"6571b4fd-9ea0-485e-a049-631411b480e0\") " pod="calico-system/calico-node-b5ddh" Oct 31 01:35:46.702430 kubelet[1617]: I1031 01:35:46.702327 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/bbcb9b1c-ac58-4050-afb7-2be05d7754ef-varrun\") pod \"csi-node-driver-qdjck\" (UID: \"bbcb9b1c-ac58-4050-afb7-2be05d7754ef\") " pod="calico-system/csi-node-driver-qdjck" Oct 31 01:35:46.702430 kubelet[1617]: I1031 01:35:46.702343 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6571b4fd-9ea0-485e-a049-631411b480e0-cni-net-dir\") pod \"calico-node-b5ddh\" (UID: \"6571b4fd-9ea0-485e-a049-631411b480e0\") " pod="calico-system/calico-node-b5ddh" Oct 31 01:35:46.702430 kubelet[1617]: I1031 01:35:46.702356 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6571b4fd-9ea0-485e-a049-631411b480e0-var-run-calico\") pod \"calico-node-b5ddh\" (UID: \"6571b4fd-9ea0-485e-a049-631411b480e0\") " pod="calico-system/calico-node-b5ddh" Oct 31 01:35:46.702430 kubelet[1617]: I1031 01:35:46.702364 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6571b4fd-9ea0-485e-a049-631411b480e0-xtables-lock\") pod \"calico-node-b5ddh\" (UID: \"6571b4fd-9ea0-485e-a049-631411b480e0\") " pod="calico-system/calico-node-b5ddh" Oct 31 01:35:46.702430 kubelet[1617]: I1031 01:35:46.702372 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/bbcb9b1c-ac58-4050-afb7-2be05d7754ef-kubelet-dir\") pod \"csi-node-driver-qdjck\" (UID: \"bbcb9b1c-ac58-4050-afb7-2be05d7754ef\") " pod="calico-system/csi-node-driver-qdjck" Oct 31 01:35:46.702526 kubelet[1617]: I1031 01:35:46.702384 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/bbcb9b1c-ac58-4050-afb7-2be05d7754ef-registration-dir\") pod \"csi-node-driver-qdjck\" (UID: \"bbcb9b1c-ac58-4050-afb7-2be05d7754ef\") " pod="calico-system/csi-node-driver-qdjck" Oct 31 01:35:46.702526 kubelet[1617]: I1031 01:35:46.702406 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6a8aa29b-84ba-4e4c-a32e-9b96fd553be2-xtables-lock\") pod \"kube-proxy-gpg5l\" (UID: \"6a8aa29b-84ba-4e4c-a32e-9b96fd553be2\") " pod="kube-system/kube-proxy-gpg5l" Oct 31 01:35:46.702526 kubelet[1617]: I1031 01:35:46.702416 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gzbmc\" (UniqueName: \"kubernetes.io/projected/6a8aa29b-84ba-4e4c-a32e-9b96fd553be2-kube-api-access-gzbmc\") pod \"kube-proxy-gpg5l\" (UID: \"6a8aa29b-84ba-4e4c-a32e-9b96fd553be2\") " pod="kube-system/kube-proxy-gpg5l" Oct 31 01:35:46.702526 kubelet[1617]: I1031 01:35:46.702430 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6571b4fd-9ea0-485e-a049-631411b480e0-cni-log-dir\") pod \"calico-node-b5ddh\" (UID: \"6571b4fd-9ea0-485e-a049-631411b480e0\") " pod="calico-system/calico-node-b5ddh" Oct 31 01:35:46.702526 kubelet[1617]: I1031 01:35:46.702439 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6571b4fd-9ea0-485e-a049-631411b480e0-flexvol-driver-host\") pod \"calico-node-b5ddh\" (UID: \"6571b4fd-9ea0-485e-a049-631411b480e0\") " pod="calico-system/calico-node-b5ddh" Oct 31 01:35:46.702643 kubelet[1617]: I1031 01:35:46.702450 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6571b4fd-9ea0-485e-a049-631411b480e0-lib-modules\") pod \"calico-node-b5ddh\" (UID: \"6571b4fd-9ea0-485e-a049-631411b480e0\") " pod="calico-system/calico-node-b5ddh" Oct 31 01:35:46.702643 kubelet[1617]: I1031 01:35:46.702463 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6571b4fd-9ea0-485e-a049-631411b480e0-node-certs\") pod \"calico-node-b5ddh\" (UID: \"6571b4fd-9ea0-485e-a049-631411b480e0\") " pod="calico-system/calico-node-b5ddh" Oct 31 01:35:46.702643 kubelet[1617]: I1031 01:35:46.702487 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6571b4fd-9ea0-485e-a049-631411b480e0-policysync\") pod \"calico-node-b5ddh\" (UID: \"6571b4fd-9ea0-485e-a049-631411b480e0\") " pod="calico-system/calico-node-b5ddh" Oct 31 01:35:46.702643 kubelet[1617]: I1031 01:35:46.702496 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6571b4fd-9ea0-485e-a049-631411b480e0-tigera-ca-bundle\") pod \"calico-node-b5ddh\" (UID: \"6571b4fd-9ea0-485e-a049-631411b480e0\") " pod="calico-system/calico-node-b5ddh" Oct 31 01:35:46.702643 kubelet[1617]: I1031 01:35:46.702509 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-74rvw\" (UniqueName: \"kubernetes.io/projected/bbcb9b1c-ac58-4050-afb7-2be05d7754ef-kube-api-access-74rvw\") pod \"csi-node-driver-qdjck\" (UID: \"bbcb9b1c-ac58-4050-afb7-2be05d7754ef\") " pod="calico-system/csi-node-driver-qdjck" Oct 31 01:35:46.702737 kubelet[1617]: I1031 01:35:46.702532 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/6a8aa29b-84ba-4e4c-a32e-9b96fd553be2-kube-proxy\") pod \"kube-proxy-gpg5l\" (UID: \"6a8aa29b-84ba-4e4c-a32e-9b96fd553be2\") " pod="kube-system/kube-proxy-gpg5l" Oct 31 01:35:46.702737 kubelet[1617]: I1031 01:35:46.702542 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wnt5s\" (UniqueName: \"kubernetes.io/projected/6571b4fd-9ea0-485e-a049-631411b480e0-kube-api-access-wnt5s\") pod \"calico-node-b5ddh\" (UID: \"6571b4fd-9ea0-485e-a049-631411b480e0\") " pod="calico-system/calico-node-b5ddh" Oct 31 01:35:46.702737 kubelet[1617]: I1031 01:35:46.702570 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/bbcb9b1c-ac58-4050-afb7-2be05d7754ef-socket-dir\") pod \"csi-node-driver-qdjck\" (UID: \"bbcb9b1c-ac58-4050-afb7-2be05d7754ef\") " pod="calico-system/csi-node-driver-qdjck" Oct 31 01:35:46.702737 kubelet[1617]: I1031 01:35:46.702581 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6a8aa29b-84ba-4e4c-a32e-9b96fd553be2-lib-modules\") pod \"kube-proxy-gpg5l\" (UID: \"6a8aa29b-84ba-4e4c-a32e-9b96fd553be2\") " pod="kube-system/kube-proxy-gpg5l" Oct 31 01:35:46.803839 kubelet[1617]: E1031 01:35:46.803818 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.803839 kubelet[1617]: W1031 01:35:46.803833 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.803958 kubelet[1617]: E1031 01:35:46.803847 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.803998 kubelet[1617]: E1031 01:35:46.803988 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.803998 kubelet[1617]: W1031 01:35:46.803995 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.804060 kubelet[1617]: E1031 01:35:46.804001 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.804106 kubelet[1617]: E1031 01:35:46.804096 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.804106 kubelet[1617]: W1031 01:35:46.804102 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.804106 kubelet[1617]: E1031 01:35:46.804107 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.804197 kubelet[1617]: E1031 01:35:46.804190 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.804197 kubelet[1617]: W1031 01:35:46.804194 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.804249 kubelet[1617]: E1031 01:35:46.804199 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.804301 kubelet[1617]: E1031 01:35:46.804285 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.804301 kubelet[1617]: W1031 01:35:46.804294 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.804301 kubelet[1617]: E1031 01:35:46.804300 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.804399 kubelet[1617]: E1031 01:35:46.804389 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.804399 kubelet[1617]: W1031 01:35:46.804396 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.804487 kubelet[1617]: E1031 01:35:46.804400 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.804487 kubelet[1617]: E1031 01:35:46.804485 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.804528 kubelet[1617]: W1031 01:35:46.804489 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.804528 kubelet[1617]: E1031 01:35:46.804493 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.804598 kubelet[1617]: E1031 01:35:46.804586 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.804598 kubelet[1617]: W1031 01:35:46.804594 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.804598 kubelet[1617]: E1031 01:35:46.804598 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.804704 kubelet[1617]: E1031 01:35:46.804693 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.804737 kubelet[1617]: W1031 01:35:46.804700 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.804737 kubelet[1617]: E1031 01:35:46.804712 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.804829 kubelet[1617]: E1031 01:35:46.804818 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.804853 kubelet[1617]: W1031 01:35:46.804833 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.804853 kubelet[1617]: E1031 01:35:46.804840 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.804932 kubelet[1617]: E1031 01:35:46.804921 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.804932 kubelet[1617]: W1031 01:35:46.804929 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.804991 kubelet[1617]: E1031 01:35:46.804940 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.805047 kubelet[1617]: E1031 01:35:46.805036 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.805074 kubelet[1617]: W1031 01:35:46.805051 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.805074 kubelet[1617]: E1031 01:35:46.805059 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.805182 kubelet[1617]: E1031 01:35:46.805170 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.805208 kubelet[1617]: W1031 01:35:46.805182 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.805208 kubelet[1617]: E1031 01:35:46.805188 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.805284 kubelet[1617]: E1031 01:35:46.805273 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.805308 kubelet[1617]: W1031 01:35:46.805281 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.805308 kubelet[1617]: E1031 01:35:46.805291 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.805384 kubelet[1617]: E1031 01:35:46.805374 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.805409 kubelet[1617]: W1031 01:35:46.805382 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.805409 kubelet[1617]: E1031 01:35:46.805395 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.805490 kubelet[1617]: E1031 01:35:46.805480 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.805514 kubelet[1617]: W1031 01:35:46.805487 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.805514 kubelet[1617]: E1031 01:35:46.805497 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.805634 kubelet[1617]: E1031 01:35:46.805622 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.805634 kubelet[1617]: W1031 01:35:46.805630 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.805692 kubelet[1617]: E1031 01:35:46.805635 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.805736 kubelet[1617]: E1031 01:35:46.805725 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.805736 kubelet[1617]: W1031 01:35:46.805733 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.805736 kubelet[1617]: E1031 01:35:46.805737 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.805838 kubelet[1617]: E1031 01:35:46.805828 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.805838 kubelet[1617]: W1031 01:35:46.805837 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.805893 kubelet[1617]: E1031 01:35:46.805845 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.805958 kubelet[1617]: E1031 01:35:46.805948 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.805958 kubelet[1617]: W1031 01:35:46.805956 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.806014 kubelet[1617]: E1031 01:35:46.805961 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.806050 kubelet[1617]: E1031 01:35:46.806039 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.806050 kubelet[1617]: W1031 01:35:46.806048 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.806104 kubelet[1617]: E1031 01:35:46.806053 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.806151 kubelet[1617]: E1031 01:35:46.806139 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.806151 kubelet[1617]: W1031 01:35:46.806150 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.806204 kubelet[1617]: E1031 01:35:46.806158 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.806318 kubelet[1617]: E1031 01:35:46.806306 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.806318 kubelet[1617]: W1031 01:35:46.806314 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.806376 kubelet[1617]: E1031 01:35:46.806319 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.806416 kubelet[1617]: E1031 01:35:46.806405 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.806416 kubelet[1617]: W1031 01:35:46.806413 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.806471 kubelet[1617]: E1031 01:35:46.806418 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.806497 kubelet[1617]: E1031 01:35:46.806493 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.806524 kubelet[1617]: W1031 01:35:46.806498 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.806524 kubelet[1617]: E1031 01:35:46.806502 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.806593 kubelet[1617]: E1031 01:35:46.806588 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.806593 kubelet[1617]: W1031 01:35:46.806592 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.806644 kubelet[1617]: E1031 01:35:46.806597 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.806694 kubelet[1617]: E1031 01:35:46.806681 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.806694 kubelet[1617]: W1031 01:35:46.806690 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.806767 kubelet[1617]: E1031 01:35:46.806695 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.806790 kubelet[1617]: E1031 01:35:46.806779 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.806790 kubelet[1617]: W1031 01:35:46.806784 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.806790 kubelet[1617]: E1031 01:35:46.806788 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.806867 kubelet[1617]: E1031 01:35:46.806858 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.806867 kubelet[1617]: W1031 01:35:46.806863 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.806903 kubelet[1617]: E1031 01:35:46.806869 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.806962 kubelet[1617]: E1031 01:35:46.806950 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.806962 kubelet[1617]: W1031 01:35:46.806958 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.807021 kubelet[1617]: E1031 01:35:46.806963 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.807055 kubelet[1617]: E1031 01:35:46.807045 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.807055 kubelet[1617]: W1031 01:35:46.807052 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.807107 kubelet[1617]: E1031 01:35:46.807056 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.807147 kubelet[1617]: E1031 01:35:46.807134 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.807147 kubelet[1617]: W1031 01:35:46.807143 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.807147 kubelet[1617]: E1031 01:35:46.807148 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.807241 kubelet[1617]: E1031 01:35:46.807229 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.807241 kubelet[1617]: W1031 01:35:46.807237 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.807295 kubelet[1617]: E1031 01:35:46.807243 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.807331 kubelet[1617]: E1031 01:35:46.807320 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.807331 kubelet[1617]: W1031 01:35:46.807328 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.807385 kubelet[1617]: E1031 01:35:46.807335 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.807422 kubelet[1617]: E1031 01:35:46.807411 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.807422 kubelet[1617]: W1031 01:35:46.807418 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.807474 kubelet[1617]: E1031 01:35:46.807423 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.807520 kubelet[1617]: E1031 01:35:46.807512 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.807520 kubelet[1617]: W1031 01:35:46.807518 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.807600 kubelet[1617]: E1031 01:35:46.807523 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.807645 kubelet[1617]: E1031 01:35:46.807634 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.807645 kubelet[1617]: W1031 01:35:46.807642 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.807700 kubelet[1617]: E1031 01:35:46.807647 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.807734 kubelet[1617]: E1031 01:35:46.807726 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.807734 kubelet[1617]: W1031 01:35:46.807731 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.807784 kubelet[1617]: E1031 01:35:46.807735 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.807820 kubelet[1617]: E1031 01:35:46.807809 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.807820 kubelet[1617]: W1031 01:35:46.807817 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.807888 kubelet[1617]: E1031 01:35:46.807824 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.807920 kubelet[1617]: E1031 01:35:46.807915 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.807941 kubelet[1617]: W1031 01:35:46.807920 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.807941 kubelet[1617]: E1031 01:35:46.807925 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.808016 kubelet[1617]: E1031 01:35:46.808007 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.808016 kubelet[1617]: W1031 01:35:46.808014 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.808071 kubelet[1617]: E1031 01:35:46.808019 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.808102 kubelet[1617]: E1031 01:35:46.808092 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.808102 kubelet[1617]: W1031 01:35:46.808099 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.808102 kubelet[1617]: E1031 01:35:46.808103 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.808197 kubelet[1617]: E1031 01:35:46.808188 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.808197 kubelet[1617]: W1031 01:35:46.808196 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.808251 kubelet[1617]: E1031 01:35:46.808201 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.808294 kubelet[1617]: E1031 01:35:46.808283 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.808294 kubelet[1617]: W1031 01:35:46.808291 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.808345 kubelet[1617]: E1031 01:35:46.808297 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.808385 kubelet[1617]: E1031 01:35:46.808375 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.808385 kubelet[1617]: W1031 01:35:46.808383 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.808444 kubelet[1617]: E1031 01:35:46.808387 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.808477 kubelet[1617]: E1031 01:35:46.808465 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.808477 kubelet[1617]: W1031 01:35:46.808470 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.808477 kubelet[1617]: E1031 01:35:46.808474 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.808596 kubelet[1617]: E1031 01:35:46.808553 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.808641 kubelet[1617]: W1031 01:35:46.808628 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.808641 kubelet[1617]: E1031 01:35:46.808637 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.808740 kubelet[1617]: E1031 01:35:46.808729 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.808740 kubelet[1617]: W1031 01:35:46.808739 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.808794 kubelet[1617]: E1031 01:35:46.808746 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.808841 kubelet[1617]: E1031 01:35:46.808832 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.808876 kubelet[1617]: W1031 01:35:46.808841 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.808876 kubelet[1617]: E1031 01:35:46.808848 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.808933 kubelet[1617]: E1031 01:35:46.808922 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.808933 kubelet[1617]: W1031 01:35:46.808930 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.808986 kubelet[1617]: E1031 01:35:46.808935 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.809016 kubelet[1617]: E1031 01:35:46.809007 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.809016 kubelet[1617]: W1031 01:35:46.809013 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.809068 kubelet[1617]: E1031 01:35:46.809017 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.809101 kubelet[1617]: E1031 01:35:46.809092 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.809101 kubelet[1617]: W1031 01:35:46.809098 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.809154 kubelet[1617]: E1031 01:35:46.809103 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.809199 kubelet[1617]: E1031 01:35:46.809186 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.809236 kubelet[1617]: W1031 01:35:46.809199 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.809236 kubelet[1617]: E1031 01:35:46.809207 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.809293 kubelet[1617]: E1031 01:35:46.809282 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.809293 kubelet[1617]: W1031 01:35:46.809289 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.809293 kubelet[1617]: E1031 01:35:46.809294 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.809374 kubelet[1617]: E1031 01:35:46.809364 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.809374 kubelet[1617]: W1031 01:35:46.809370 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.809374 kubelet[1617]: E1031 01:35:46.809374 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.809453 kubelet[1617]: E1031 01:35:46.809444 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.809453 kubelet[1617]: W1031 01:35:46.809450 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.809505 kubelet[1617]: E1031 01:35:46.809454 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.809540 kubelet[1617]: E1031 01:35:46.809527 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.809540 kubelet[1617]: W1031 01:35:46.809537 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.809625 kubelet[1617]: E1031 01:35:46.809544 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.809649 kubelet[1617]: E1031 01:35:46.809629 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.809649 kubelet[1617]: W1031 01:35:46.809634 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.809649 kubelet[1617]: E1031 01:35:46.809638 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.809713 kubelet[1617]: E1031 01:35:46.809708 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.809713 kubelet[1617]: W1031 01:35:46.809712 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.809762 kubelet[1617]: E1031 01:35:46.809717 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.809794 kubelet[1617]: E1031 01:35:46.809787 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.809794 kubelet[1617]: W1031 01:35:46.809792 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.809844 kubelet[1617]: E1031 01:35:46.809796 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.809874 kubelet[1617]: E1031 01:35:46.809866 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.809874 kubelet[1617]: W1031 01:35:46.809870 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.809874 kubelet[1617]: E1031 01:35:46.809874 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.809971 kubelet[1617]: E1031 01:35:46.809962 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.809971 kubelet[1617]: W1031 01:35:46.809969 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.810030 kubelet[1617]: E1031 01:35:46.809975 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.810202 kubelet[1617]: E1031 01:35:46.810189 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.810202 kubelet[1617]: W1031 01:35:46.810198 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.810257 kubelet[1617]: E1031 01:35:46.810219 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.810309 kubelet[1617]: E1031 01:35:46.810297 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.810309 kubelet[1617]: W1031 01:35:46.810305 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.810360 kubelet[1617]: E1031 01:35:46.810310 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.810425 kubelet[1617]: E1031 01:35:46.810415 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.810425 kubelet[1617]: W1031 01:35:46.810424 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.810489 kubelet[1617]: E1031 01:35:46.810431 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.810538 kubelet[1617]: E1031 01:35:46.810529 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.810538 kubelet[1617]: W1031 01:35:46.810535 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.810615 kubelet[1617]: E1031 01:35:46.810540 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.810687 kubelet[1617]: E1031 01:35:46.810676 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.810687 kubelet[1617]: W1031 01:35:46.810685 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.810753 kubelet[1617]: E1031 01:35:46.810693 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.810811 kubelet[1617]: E1031 01:35:46.810801 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.810811 kubelet[1617]: W1031 01:35:46.810809 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.810865 kubelet[1617]: E1031 01:35:46.810815 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.810996 kubelet[1617]: E1031 01:35:46.810982 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.810996 kubelet[1617]: W1031 01:35:46.810993 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.811067 kubelet[1617]: E1031 01:35:46.811000 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.811108 kubelet[1617]: E1031 01:35:46.811090 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.811108 kubelet[1617]: W1031 01:35:46.811097 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.811108 kubelet[1617]: E1031 01:35:46.811103 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.811197 kubelet[1617]: E1031 01:35:46.811184 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.811197 kubelet[1617]: W1031 01:35:46.811195 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.811250 kubelet[1617]: E1031 01:35:46.811200 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.811290 kubelet[1617]: E1031 01:35:46.811279 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.811290 kubelet[1617]: W1031 01:35:46.811288 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.811341 kubelet[1617]: E1031 01:35:46.811295 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.811408 kubelet[1617]: E1031 01:35:46.811399 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.811408 kubelet[1617]: W1031 01:35:46.811406 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.811461 kubelet[1617]: E1031 01:35:46.811417 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.811514 kubelet[1617]: E1031 01:35:46.811505 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.811514 kubelet[1617]: W1031 01:35:46.811512 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.811597 kubelet[1617]: E1031 01:35:46.811517 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.811626 kubelet[1617]: E1031 01:35:46.811614 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.811626 kubelet[1617]: W1031 01:35:46.811618 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.811663 kubelet[1617]: E1031 01:35:46.811623 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.811764 kubelet[1617]: E1031 01:35:46.811752 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.811764 kubelet[1617]: W1031 01:35:46.811760 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.811819 kubelet[1617]: E1031 01:35:46.811766 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.811842 kubelet[1617]: E1031 01:35:46.811838 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.811880 kubelet[1617]: W1031 01:35:46.811843 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.811880 kubelet[1617]: E1031 01:35:46.811847 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.811956 kubelet[1617]: E1031 01:35:46.811944 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.811956 kubelet[1617]: W1031 01:35:46.811953 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.812015 kubelet[1617]: E1031 01:35:46.811961 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.812093 kubelet[1617]: E1031 01:35:46.812075 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.812093 kubelet[1617]: W1031 01:35:46.812082 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.812093 kubelet[1617]: E1031 01:35:46.812091 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.812193 kubelet[1617]: E1031 01:35:46.812182 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.812193 kubelet[1617]: W1031 01:35:46.812189 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.812193 kubelet[1617]: E1031 01:35:46.812194 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.812294 kubelet[1617]: E1031 01:35:46.812284 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.812294 kubelet[1617]: W1031 01:35:46.812293 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.812356 kubelet[1617]: E1031 01:35:46.812301 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.812428 kubelet[1617]: E1031 01:35:46.812418 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.812462 kubelet[1617]: W1031 01:35:46.812429 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.812462 kubelet[1617]: E1031 01:35:46.812437 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.812541 kubelet[1617]: E1031 01:35:46.812532 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.812541 kubelet[1617]: W1031 01:35:46.812539 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.812614 kubelet[1617]: E1031 01:35:46.812543 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.812855 kubelet[1617]: E1031 01:35:46.812846 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.812855 kubelet[1617]: W1031 01:35:46.812853 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.812913 kubelet[1617]: E1031 01:35:46.812859 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.813087 kubelet[1617]: E1031 01:35:46.813076 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.813087 kubelet[1617]: W1031 01:35:46.813084 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.813144 kubelet[1617]: E1031 01:35:46.813093 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.813590 kubelet[1617]: E1031 01:35:46.813182 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.813590 kubelet[1617]: W1031 01:35:46.813189 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.813590 kubelet[1617]: E1031 01:35:46.813200 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.813590 kubelet[1617]: E1031 01:35:46.813310 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.813590 kubelet[1617]: W1031 01:35:46.813317 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.813590 kubelet[1617]: E1031 01:35:46.813341 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.813590 kubelet[1617]: E1031 01:35:46.813447 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.813590 kubelet[1617]: W1031 01:35:46.813454 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.813590 kubelet[1617]: E1031 01:35:46.813461 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.813590 kubelet[1617]: E1031 01:35:46.813548 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.813786 kubelet[1617]: W1031 01:35:46.813552 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.813786 kubelet[1617]: E1031 01:35:46.813564 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.813786 kubelet[1617]: E1031 01:35:46.813643 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.813786 kubelet[1617]: W1031 01:35:46.813647 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.813786 kubelet[1617]: E1031 01:35:46.813651 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.813786 kubelet[1617]: E1031 01:35:46.813731 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.813786 kubelet[1617]: W1031 01:35:46.813737 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.813786 kubelet[1617]: E1031 01:35:46.813744 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.813930 kubelet[1617]: E1031 01:35:46.813829 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.813930 kubelet[1617]: W1031 01:35:46.813835 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.813930 kubelet[1617]: E1031 01:35:46.813842 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.817854 kubelet[1617]: I1031 01:35:46.813985 1617 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Oct 31 01:35:46.817854 kubelet[1617]: E1031 01:35:46.814188 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.817854 kubelet[1617]: W1031 01:35:46.814195 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.817854 kubelet[1617]: E1031 01:35:46.814205 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.817854 kubelet[1617]: E1031 01:35:46.817806 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.817854 kubelet[1617]: W1031 01:35:46.817814 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.817854 kubelet[1617]: E1031 01:35:46.817824 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.820294 kubelet[1617]: E1031 01:35:46.819819 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.820294 kubelet[1617]: W1031 01:35:46.819827 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.820294 kubelet[1617]: E1031 01:35:46.819836 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.820777 kubelet[1617]: E1031 01:35:46.820769 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.820831 kubelet[1617]: W1031 01:35:46.820823 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.820883 kubelet[1617]: E1031 01:35:46.820875 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.823430 kubelet[1617]: E1031 01:35:46.823198 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.823430 kubelet[1617]: W1031 01:35:46.823206 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.823430 kubelet[1617]: E1031 01:35:46.823213 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.826834 kubelet[1617]: E1031 01:35:46.826826 1617 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:35:46.826892 kubelet[1617]: W1031 01:35:46.826884 1617 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:35:46.826945 kubelet[1617]: E1031 01:35:46.826936 1617 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:35:46.990510 env[1264]: time="2025-10-31T01:35:46.990449208Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-b5ddh,Uid:6571b4fd-9ea0-485e-a049-631411b480e0,Namespace:calico-system,Attempt:0,}" Oct 31 01:35:46.995232 env[1264]: time="2025-10-31T01:35:46.995024645Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-gpg5l,Uid:6a8aa29b-84ba-4e4c-a32e-9b96fd553be2,Namespace:kube-system,Attempt:0,}" Oct 31 01:35:47.673294 kubelet[1617]: E1031 01:35:47.673260 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:47.704882 env[1264]: time="2025-10-31T01:35:47.704820105Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:47.705405 env[1264]: time="2025-10-31T01:35:47.705390203Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:47.705889 env[1264]: time="2025-10-31T01:35:47.705817923Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:47.706376 env[1264]: time="2025-10-31T01:35:47.706362371Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:47.707684 env[1264]: time="2025-10-31T01:35:47.707668730Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:47.709083 env[1264]: time="2025-10-31T01:35:47.709070122Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:47.710332 env[1264]: time="2025-10-31T01:35:47.710319678Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:47.711052 env[1264]: time="2025-10-31T01:35:47.711029014Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:47.721977 env[1264]: time="2025-10-31T01:35:47.721934262Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:35:47.722080 env[1264]: time="2025-10-31T01:35:47.721962128Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:35:47.722080 env[1264]: time="2025-10-31T01:35:47.721975413Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:35:47.722159 env[1264]: time="2025-10-31T01:35:47.722120555Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f819c7f8adac67fe263e009f26f64518049b20fee3f485f36969f8995011cdbd pid=1778 runtime=io.containerd.runc.v2 Oct 31 01:35:47.722450 env[1264]: time="2025-10-31T01:35:47.722427130Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:35:47.722513 env[1264]: time="2025-10-31T01:35:47.722498768Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:35:47.722585 env[1264]: time="2025-10-31T01:35:47.722571485Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:35:47.722702 env[1264]: time="2025-10-31T01:35:47.722681171Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ae5e32c0415f0d4b04ad42eab5b9d2b33be9b6b48d0bcf0429e3c4f7869e6c0c pid=1781 runtime=io.containerd.runc.v2 Oct 31 01:35:47.731817 systemd[1]: Started cri-containerd-ae5e32c0415f0d4b04ad42eab5b9d2b33be9b6b48d0bcf0429e3c4f7869e6c0c.scope. Oct 31 01:35:47.732734 systemd[1]: Started cri-containerd-f819c7f8adac67fe263e009f26f64518049b20fee3f485f36969f8995011cdbd.scope. Oct 31 01:35:47.744579 kernel: kauditd_printk_skb: 243 callbacks suppressed Oct 31 01:35:47.744648 kernel: audit: type=1400 audit(1761874547.742:415): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.749615 kernel: audit: type=1400 audit(1761874547.742:416): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.758819 kernel: audit: type=1400 audit(1761874547.742:417): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.758897 kernel: audit: type=1400 audit(1761874547.742:418): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.758918 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 31 01:35:47.758931 kernel: audit: type=1400 audit(1761874547.742:419): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.758942 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 31 01:35:47.758953 kernel: audit: type=1400 audit(1761874547.742:420): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.758966 kernel: audit: backlog limit exceeded Oct 31 01:35:47.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.764284 kernel: audit: type=1400 audit(1761874547.742:421): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.743000 audit: BPF prog-id=55 op=LOAD Oct 31 01:35:47.746000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.746000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1781 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:47.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165356533326330343135663064346230346164343265616235623964 Oct 31 01:35:47.746000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.746000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1781 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:47.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165356533326330343135663064346230346164343265616235623964 Oct 31 01:35:47.746000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.746000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.746000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.746000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.746000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.746000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.746000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.746000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.746000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.746000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.746000 audit: BPF prog-id=56 op=LOAD Oct 31 01:35:47.746000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002e3ce0 items=0 ppid=1781 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:47.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165356533326330343135663064346230346164343265616235623964 Oct 31 01:35:47.748000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.748000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.748000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.748000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.748000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.748000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.748000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.748000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.748000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.748000 audit: BPF prog-id=57 op=LOAD Oct 31 01:35:47.748000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002e3d28 items=0 ppid=1781 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:47.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165356533326330343135663064346230346164343265616235623964 Oct 31 01:35:47.748000 audit: BPF prog-id=57 op=UNLOAD Oct 31 01:35:47.748000 audit: BPF prog-id=56 op=UNLOAD Oct 31 01:35:47.748000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.748000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.748000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.748000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.748000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.748000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.748000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.748000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.748000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.748000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.748000 audit: BPF prog-id=58 op=LOAD Oct 31 01:35:47.748000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003cc138 items=0 ppid=1781 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:47.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165356533326330343135663064346230346164343265616235623964 Oct 31 01:35:47.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.766000 audit: BPF prog-id=59 op=LOAD Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1778 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:47.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638313963376638616461633637666532363365303039663236663634 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1778 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:47.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638313963376638616461633637666532363365303039663236663634 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit: BPF prog-id=60 op=LOAD Oct 31 01:35:47.768000 audit[1800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000394d50 items=0 ppid=1778 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:47.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638313963376638616461633637666532363365303039663236663634 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit: BPF prog-id=61 op=LOAD Oct 31 01:35:47.768000 audit[1800]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000394d98 items=0 ppid=1778 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:47.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638313963376638616461633637666532363365303039663236663634 Oct 31 01:35:47.768000 audit: BPF prog-id=61 op=UNLOAD Oct 31 01:35:47.768000 audit: BPF prog-id=60 op=UNLOAD Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:47.768000 audit: BPF prog-id=62 op=LOAD Oct 31 01:35:47.768000 audit[1800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003951a8 items=0 ppid=1778 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:47.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638313963376638616461633637666532363365303039663236663634 Oct 31 01:35:47.774766 env[1264]: time="2025-10-31T01:35:47.774734170Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-b5ddh,Uid:6571b4fd-9ea0-485e-a049-631411b480e0,Namespace:calico-system,Attempt:0,} returns sandbox id \"ae5e32c0415f0d4b04ad42eab5b9d2b33be9b6b48d0bcf0429e3c4f7869e6c0c\"" Oct 31 01:35:47.776157 env[1264]: time="2025-10-31T01:35:47.776131761Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Oct 31 01:35:47.779982 env[1264]: time="2025-10-31T01:35:47.779926487Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-gpg5l,Uid:6a8aa29b-84ba-4e4c-a32e-9b96fd553be2,Namespace:kube-system,Attempt:0,} returns sandbox id \"f819c7f8adac67fe263e009f26f64518049b20fee3f485f36969f8995011cdbd\"" Oct 31 01:35:47.790435 kubelet[1617]: E1031 01:35:47.790399 1617 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qdjck" podUID="bbcb9b1c-ac58-4050-afb7-2be05d7754ef" Oct 31 01:35:47.818231 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4044622515.mount: Deactivated successfully. Oct 31 01:35:48.673911 kubelet[1617]: E1031 01:35:48.673879 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:49.257372 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1674752871.mount: Deactivated successfully. Oct 31 01:35:49.596852 env[1264]: time="2025-10-31T01:35:49.596820709Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:49.597508 env[1264]: time="2025-10-31T01:35:49.597489986Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:49.598399 env[1264]: time="2025-10-31T01:35:49.598383559Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:49.599199 env[1264]: time="2025-10-31T01:35:49.599182490Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:49.599592 env[1264]: time="2025-10-31T01:35:49.599552239Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5\"" Oct 31 01:35:49.601152 env[1264]: time="2025-10-31T01:35:49.601128183Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\"" Oct 31 01:35:49.602485 env[1264]: time="2025-10-31T01:35:49.602457729Z" level=info msg="CreateContainer within sandbox \"ae5e32c0415f0d4b04ad42eab5b9d2b33be9b6b48d0bcf0429e3c4f7869e6c0c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 31 01:35:49.616453 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1862644733.mount: Deactivated successfully. Oct 31 01:35:49.631172 env[1264]: time="2025-10-31T01:35:49.631144636Z" level=info msg="CreateContainer within sandbox \"ae5e32c0415f0d4b04ad42eab5b9d2b33be9b6b48d0bcf0429e3c4f7869e6c0c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"57a7db385a99b3ff5523a9f135e7a98cd4da51dbfda31ae7a39a952887093929\"" Oct 31 01:35:49.631733 env[1264]: time="2025-10-31T01:35:49.631718591Z" level=info msg="StartContainer for \"57a7db385a99b3ff5523a9f135e7a98cd4da51dbfda31ae7a39a952887093929\"" Oct 31 01:35:49.643331 systemd[1]: Started cri-containerd-57a7db385a99b3ff5523a9f135e7a98cd4da51dbfda31ae7a39a952887093929.scope. Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fa938b36118 items=0 ppid=1781 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:49.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537613764623338356139396233666635353233613966313335653761 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit: BPF prog-id=63 op=LOAD Oct 31 01:35:49.656000 audit[1856]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002a06a8 items=0 ppid=1781 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:49.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537613764623338356139396233666635353233613966313335653761 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit: BPF prog-id=64 op=LOAD Oct 31 01:35:49.656000 audit[1856]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002a06f8 items=0 ppid=1781 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:49.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537613764623338356139396233666635353233613966313335653761 Oct 31 01:35:49.656000 audit: BPF prog-id=64 op=UNLOAD Oct 31 01:35:49.656000 audit: BPF prog-id=63 op=UNLOAD Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:49.656000 audit: BPF prog-id=65 op=LOAD Oct 31 01:35:49.656000 audit[1856]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002a0788 items=0 ppid=1781 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:49.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537613764623338356139396233666635353233613966313335653761 Oct 31 01:35:49.666786 env[1264]: time="2025-10-31T01:35:49.666759846Z" level=info msg="StartContainer for \"57a7db385a99b3ff5523a9f135e7a98cd4da51dbfda31ae7a39a952887093929\" returns successfully" Oct 31 01:35:49.674388 systemd[1]: cri-containerd-57a7db385a99b3ff5523a9f135e7a98cd4da51dbfda31ae7a39a952887093929.scope: Deactivated successfully. Oct 31 01:35:49.674795 kubelet[1617]: E1031 01:35:49.674555 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:49.678000 audit: BPF prog-id=65 op=UNLOAD Oct 31 01:35:49.766105 env[1264]: time="2025-10-31T01:35:49.766074594Z" level=info msg="shim disconnected" id=57a7db385a99b3ff5523a9f135e7a98cd4da51dbfda31ae7a39a952887093929 Oct 31 01:35:49.766275 env[1264]: time="2025-10-31T01:35:49.766260283Z" level=warning msg="cleaning up after shim disconnected" id=57a7db385a99b3ff5523a9f135e7a98cd4da51dbfda31ae7a39a952887093929 namespace=k8s.io Oct 31 01:35:49.766342 env[1264]: time="2025-10-31T01:35:49.766332475Z" level=info msg="cleaning up dead shim" Oct 31 01:35:49.771002 env[1264]: time="2025-10-31T01:35:49.770976330Z" level=warning msg="cleanup warnings time=\"2025-10-31T01:35:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1897 runtime=io.containerd.runc.v2\n" Oct 31 01:35:49.789875 kubelet[1617]: E1031 01:35:49.789842 1617 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qdjck" podUID="bbcb9b1c-ac58-4050-afb7-2be05d7754ef" Oct 31 01:35:50.215818 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-57a7db385a99b3ff5523a9f135e7a98cd4da51dbfda31ae7a39a952887093929-rootfs.mount: Deactivated successfully. Oct 31 01:35:50.675023 kubelet[1617]: E1031 01:35:50.674994 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:50.931512 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1720741758.mount: Deactivated successfully. Oct 31 01:35:51.607333 env[1264]: time="2025-10-31T01:35:51.607288836Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:51.624799 env[1264]: time="2025-10-31T01:35:51.624767152Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:51.630623 env[1264]: time="2025-10-31T01:35:51.630603670Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:51.636831 env[1264]: time="2025-10-31T01:35:51.636801775Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:71445ec84ad98bd52a7784865a9d31b1b50b56092d3f7699edc39eefd71befe1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:51.637128 env[1264]: time="2025-10-31T01:35:51.637101011Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\" returns image reference \"sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3\"" Oct 31 01:35:51.638446 env[1264]: time="2025-10-31T01:35:51.638415647Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Oct 31 01:35:51.649798 env[1264]: time="2025-10-31T01:35:51.649754206Z" level=info msg="CreateContainer within sandbox \"f819c7f8adac67fe263e009f26f64518049b20fee3f485f36969f8995011cdbd\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 31 01:35:51.676101 kubelet[1617]: E1031 01:35:51.676063 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:51.688732 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1722466171.mount: Deactivated successfully. Oct 31 01:35:51.692755 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3898513863.mount: Deactivated successfully. Oct 31 01:35:51.708895 env[1264]: time="2025-10-31T01:35:51.708850753Z" level=info msg="CreateContainer within sandbox \"f819c7f8adac67fe263e009f26f64518049b20fee3f485f36969f8995011cdbd\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"80a0d4877e4e946a4dc7f1153a65d2440deeef9492b7d6bf84a2ff59a446f623\"" Oct 31 01:35:51.709274 env[1264]: time="2025-10-31T01:35:51.709258138Z" level=info msg="StartContainer for \"80a0d4877e4e946a4dc7f1153a65d2440deeef9492b7d6bf84a2ff59a446f623\"" Oct 31 01:35:51.724425 systemd[1]: Started cri-containerd-80a0d4877e4e946a4dc7f1153a65d2440deeef9492b7d6bf84a2ff59a446f623.scope. Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f647809fc48 items=0 ppid=1778 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830613064343837376534653934366134646337663131353361363564 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit: BPF prog-id=66 op=LOAD Oct 31 01:35:51.737000 audit[1921]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002e7c58 items=0 ppid=1778 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830613064343837376534653934366134646337663131353361363564 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit: BPF prog-id=67 op=LOAD Oct 31 01:35:51.737000 audit[1921]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002e7ca8 items=0 ppid=1778 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830613064343837376534653934366134646337663131353361363564 Oct 31 01:35:51.737000 audit: BPF prog-id=67 op=UNLOAD Oct 31 01:35:51.737000 audit: BPF prog-id=66 op=UNLOAD Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:51.737000 audit: BPF prog-id=68 op=LOAD Oct 31 01:35:51.737000 audit[1921]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002e7d38 items=0 ppid=1778 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830613064343837376534653934366134646337663131353361363564 Oct 31 01:35:51.752906 env[1264]: time="2025-10-31T01:35:51.752867153Z" level=info msg="StartContainer for \"80a0d4877e4e946a4dc7f1153a65d2440deeef9492b7d6bf84a2ff59a446f623\" returns successfully" Oct 31 01:35:51.790286 kubelet[1617]: E1031 01:35:51.790023 1617 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qdjck" podUID="bbcb9b1c-ac58-4050-afb7-2be05d7754ef" Oct 31 01:35:51.809034 kubelet[1617]: I1031 01:35:51.808972 1617 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-gpg5l" podStartSLOduration=3.95172778 podStartE2EDuration="7.808956232s" podCreationTimestamp="2025-10-31 01:35:44 +0000 UTC" firstStartedPulling="2025-10-31 01:35:47.780710824 +0000 UTC m=+4.040050161" lastFinishedPulling="2025-10-31 01:35:51.637939275 +0000 UTC m=+7.897278613" observedRunningTime="2025-10-31 01:35:51.808248025 +0000 UTC m=+8.067587372" watchObservedRunningTime="2025-10-31 01:35:51.808956232 +0000 UTC m=+8.068295577" Oct 31 01:35:51.841000 audit[1983]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1983 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:51.841000 audit[1983]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffbc83b5c0 a2=0 a3=7fffbc83b5ac items=0 ppid=1932 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.841000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 01:35:51.842000 audit[1985]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1985 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:51.842000 audit[1985]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0d9f07e0 a2=0 a3=7fff0d9f07cc items=0 ppid=1932 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.842000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 01:35:51.843000 audit[1986]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_chain pid=1986 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:51.843000 audit[1986]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff00998700 a2=0 a3=7fff009986ec items=0 ppid=1932 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.843000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 01:35:51.844000 audit[1987]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=1987 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:51.844000 audit[1987]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce9678ef0 a2=0 a3=7ffce9678edc items=0 ppid=1932 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.844000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 01:35:51.845000 audit[1989]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1989 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:51.845000 audit[1989]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6f0390d0 a2=0 a3=7ffe6f0390bc items=0 ppid=1932 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.845000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 01:35:51.846000 audit[1991]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1991 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:51.846000 audit[1991]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2ce2ec50 a2=0 a3=7ffc2ce2ec3c items=0 ppid=1932 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.846000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 01:35:51.944000 audit[1992]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:51.944000 audit[1992]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffcd0d75e0 a2=0 a3=7fffcd0d75cc items=0 ppid=1932 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.944000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 01:35:51.947000 audit[1994]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:51.947000 audit[1994]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe75dd7cb0 a2=0 a3=7ffe75dd7c9c items=0 ppid=1932 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.947000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 31 01:35:51.949000 audit[1997]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1997 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:51.949000 audit[1997]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc014eff10 a2=0 a3=7ffc014efefc items=0 ppid=1932 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.949000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 31 01:35:51.950000 audit[1998]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1998 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:51.950000 audit[1998]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed95c1740 a2=0 a3=7ffed95c172c items=0 ppid=1932 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.950000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 01:35:51.951000 audit[2000]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2000 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:51.951000 audit[2000]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffa35876d0 a2=0 a3=7fffa35876bc items=0 ppid=1932 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.951000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 01:35:51.952000 audit[2001]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2001 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:51.952000 audit[2001]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc30c2040 a2=0 a3=7fffc30c202c items=0 ppid=1932 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.952000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 01:35:51.953000 audit[2003]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2003 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:51.953000 audit[2003]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffebc7e7c90 a2=0 a3=7ffebc7e7c7c items=0 ppid=1932 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.953000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 31 01:35:51.956000 audit[2006]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2006 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:51.956000 audit[2006]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff7d6c4840 a2=0 a3=7fff7d6c482c items=0 ppid=1932 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.956000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 31 01:35:51.956000 audit[2007]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2007 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:51.956000 audit[2007]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff64f89540 a2=0 a3=7fff64f8952c items=0 ppid=1932 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.956000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 01:35:51.958000 audit[2009]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2009 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:51.958000 audit[2009]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff8d0ca8e0 a2=0 a3=7fff8d0ca8cc items=0 ppid=1932 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.958000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 01:35:51.958000 audit[2010]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2010 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:51.958000 audit[2010]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4331b120 a2=0 a3=7ffc4331b10c items=0 ppid=1932 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.958000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 01:35:51.960000 audit[2012]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2012 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:51.960000 audit[2012]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd9e1dfd90 a2=0 a3=7ffd9e1dfd7c items=0 ppid=1932 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.960000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 01:35:51.962000 audit[2015]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2015 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:51.962000 audit[2015]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd923a6d50 a2=0 a3=7ffd923a6d3c items=0 ppid=1932 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 01:35:51.964000 audit[2018]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2018 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:51.964000 audit[2018]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd24843f60 a2=0 a3=7ffd24843f4c items=0 ppid=1932 pid=2018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.964000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 31 01:35:51.964000 audit[2019]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2019 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:51.964000 audit[2019]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe26a41550 a2=0 a3=7ffe26a4153c items=0 ppid=1932 pid=2019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.964000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 01:35:51.966000 audit[2021]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2021 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:51.966000 audit[2021]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe2b238c70 a2=0 a3=7ffe2b238c5c items=0 ppid=1932 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:51.966000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:35:52.024000 audit[2025]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2025 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:52.024000 audit[2025]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe40a1be50 a2=0 a3=7ffe40a1be3c items=0 ppid=1932 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.024000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:35:52.026000 audit[2026]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2026 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:52.026000 audit[2026]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffedb8b2940 a2=0 a3=7ffedb8b292c items=0 ppid=1932 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.026000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 01:35:52.027000 audit[2028]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2028 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:35:52.027000 audit[2028]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff2858ea10 a2=0 a3=7fff2858e9fc items=0 ppid=1932 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.027000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 01:35:52.093000 audit[2034]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=2034 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:52.093000 audit[2034]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fffedc64020 a2=0 a3=7fffedc6400c items=0 ppid=1932 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:52.143000 audit[2034]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=2034 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:52.143000 audit[2034]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7fffedc64020 a2=0 a3=7fffedc6400c items=0 ppid=1932 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.143000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:52.156000 audit[2043]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2043 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.156000 audit[2043]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcb57b1000 a2=0 a3=7ffcb57b0fec items=0 ppid=1932 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.156000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 01:35:52.158000 audit[2045]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2045 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.158000 audit[2045]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc6a5eb890 a2=0 a3=7ffc6a5eb87c items=0 ppid=1932 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.158000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 31 01:35:52.162000 audit[2048]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2048 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.162000 audit[2048]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe052bc920 a2=0 a3=7ffe052bc90c items=0 ppid=1932 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.162000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 31 01:35:52.163000 audit[2049]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2049 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.163000 audit[2049]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd947b1c70 a2=0 a3=7ffd947b1c5c items=0 ppid=1932 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.163000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 01:35:52.165000 audit[2051]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2051 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.165000 audit[2051]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff7ee5e130 a2=0 a3=7fff7ee5e11c items=0 ppid=1932 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 01:35:52.165000 audit[2052]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2052 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.165000 audit[2052]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2a635ef0 a2=0 a3=7ffc2a635edc items=0 ppid=1932 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 01:35:52.167000 audit[2054]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2054 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.167000 audit[2054]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe6f725410 a2=0 a3=7ffe6f7253fc items=0 ppid=1932 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.167000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 31 01:35:52.170000 audit[2057]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2057 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.170000 audit[2057]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff9c067190 a2=0 a3=7fff9c06717c items=0 ppid=1932 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 31 01:35:52.171000 audit[2058]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2058 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.171000 audit[2058]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffab3bf160 a2=0 a3=7fffab3bf14c items=0 ppid=1932 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.171000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 01:35:52.173000 audit[2060]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2060 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.173000 audit[2060]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc5ae404d0 a2=0 a3=7ffc5ae404bc items=0 ppid=1932 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.173000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 01:35:52.174000 audit[2061]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2061 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.174000 audit[2061]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcef205940 a2=0 a3=7ffcef20592c items=0 ppid=1932 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.174000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 01:35:52.176000 audit[2063]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2063 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.176000 audit[2063]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc876293f0 a2=0 a3=7ffc876293dc items=0 ppid=1932 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.176000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 01:35:52.179000 audit[2066]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2066 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.179000 audit[2066]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc186a74e0 a2=0 a3=7ffc186a74cc items=0 ppid=1932 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 31 01:35:52.182000 audit[2069]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2069 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.182000 audit[2069]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2e0e8750 a2=0 a3=7ffd2e0e873c items=0 ppid=1932 pid=2069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.182000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 31 01:35:52.183000 audit[2070]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2070 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.183000 audit[2070]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffde1d5a6e0 a2=0 a3=7ffde1d5a6cc items=0 ppid=1932 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 01:35:52.185000 audit[2072]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2072 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.185000 audit[2072]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe3b64da70 a2=0 a3=7ffe3b64da5c items=0 ppid=1932 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.185000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:35:52.189000 audit[2075]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2075 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.189000 audit[2075]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc91ddd790 a2=0 a3=7ffc91ddd77c items=0 ppid=1932 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.189000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:35:52.190000 audit[2076]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2076 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.190000 audit[2076]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc5b30ca0 a2=0 a3=7ffcc5b30c8c items=0 ppid=1932 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.190000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 01:35:52.192000 audit[2078]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2078 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.192000 audit[2078]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd21597e70 a2=0 a3=7ffd21597e5c items=0 ppid=1932 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 01:35:52.193000 audit[2079]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2079 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.193000 audit[2079]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe880da760 a2=0 a3=7ffe880da74c items=0 ppid=1932 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.193000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 01:35:52.195000 audit[2081]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2081 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.195000 audit[2081]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd9fdcea60 a2=0 a3=7ffd9fdcea4c items=0 ppid=1932 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.195000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:35:52.200000 audit[2084]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2084 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:35:52.200000 audit[2084]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd874267b0 a2=0 a3=7ffd8742679c items=0 ppid=1932 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.200000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:35:52.203000 audit[2086]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2086 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 01:35:52.203000 audit[2086]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff0ef9dc70 a2=0 a3=7fff0ef9dc5c items=0 ppid=1932 pid=2086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.203000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:52.203000 audit[2086]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2086 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 01:35:52.203000 audit[2086]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff0ef9dc70 a2=0 a3=7fff0ef9dc5c items=0 ppid=1932 pid=2086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.203000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:52.676350 kubelet[1617]: E1031 01:35:52.676328 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:53.677480 kubelet[1617]: E1031 01:35:53.677459 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:53.790365 kubelet[1617]: E1031 01:35:53.790135 1617 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qdjck" podUID="bbcb9b1c-ac58-4050-afb7-2be05d7754ef" Oct 31 01:35:54.678307 kubelet[1617]: E1031 01:35:54.678265 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:55.679173 kubelet[1617]: E1031 01:35:55.679145 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:55.790574 kubelet[1617]: E1031 01:35:55.790460 1617 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qdjck" podUID="bbcb9b1c-ac58-4050-afb7-2be05d7754ef" Oct 31 01:35:56.510951 env[1264]: time="2025-10-31T01:35:56.510917940Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:56.516492 env[1264]: time="2025-10-31T01:35:56.516464758Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:56.517950 env[1264]: time="2025-10-31T01:35:56.517926908Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:56.521206 env[1264]: time="2025-10-31T01:35:56.521163909Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:56.521862 env[1264]: time="2025-10-31T01:35:56.521833936Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd\"" Oct 31 01:35:56.532658 env[1264]: time="2025-10-31T01:35:56.532622439Z" level=info msg="CreateContainer within sandbox \"ae5e32c0415f0d4b04ad42eab5b9d2b33be9b6b48d0bcf0429e3c4f7869e6c0c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 31 01:35:56.564225 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1876813393.mount: Deactivated successfully. Oct 31 01:35:56.596298 env[1264]: time="2025-10-31T01:35:56.596251583Z" level=info msg="CreateContainer within sandbox \"ae5e32c0415f0d4b04ad42eab5b9d2b33be9b6b48d0bcf0429e3c4f7869e6c0c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c5be7def748b2ec9545cb12f97e46a4b65a5edae3ea3c781c9591cbec02c60a2\"" Oct 31 01:35:56.596887 env[1264]: time="2025-10-31T01:35:56.596872153Z" level=info msg="StartContainer for \"c5be7def748b2ec9545cb12f97e46a4b65a5edae3ea3c781c9591cbec02c60a2\"" Oct 31 01:35:56.612111 systemd[1]: Started cri-containerd-c5be7def748b2ec9545cb12f97e46a4b65a5edae3ea3c781c9591cbec02c60a2.scope. Oct 31 01:35:56.621000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.631063 kernel: kauditd_printk_skb: 346 callbacks suppressed Oct 31 01:35:56.631142 kernel: audit: type=1400 audit(1761874556.621:514): avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.621000 audit[2095]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f426c366578 items=0 ppid=1781 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:56.637221 kernel: audit: type=1300 audit(1761874556.621:514): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f426c366578 items=0 ppid=1781 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:56.637287 kernel: audit: type=1327 audit(1761874556.621:514): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335626537646566373438623265633935343563623132663937653436 Oct 31 01:35:56.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335626537646566373438623265633935343563623132663937653436 Oct 31 01:35:56.641320 kernel: audit: type=1400 audit(1761874556.624:515): avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.624000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.644332 kernel: audit: type=1400 audit(1761874556.624:515): avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.624000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.624000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.650197 kernel: audit: type=1400 audit(1761874556.624:515): avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.650275 kernel: audit: type=1400 audit(1761874556.624:515): avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.624000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.624000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.655331 kernel: audit: type=1400 audit(1761874556.624:515): avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.624000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.624000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.661599 kernel: audit: type=1400 audit(1761874556.624:515): avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.661661 kernel: audit: type=1400 audit(1761874556.624:515): avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.624000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.624000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.624000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.624000 audit: BPF prog-id=69 op=LOAD Oct 31 01:35:56.624000 audit[2095]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003254c8 items=0 ppid=1781 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:56.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335626537646566373438623265633935343563623132663937653436 Oct 31 01:35:56.633000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.633000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.633000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.633000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.633000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.633000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.633000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.633000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.633000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.633000 audit: BPF prog-id=70 op=LOAD Oct 31 01:35:56.633000 audit[2095]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000325518 items=0 ppid=1781 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:56.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335626537646566373438623265633935343563623132663937653436 Oct 31 01:35:56.640000 audit: BPF prog-id=70 op=UNLOAD Oct 31 01:35:56.640000 audit: BPF prog-id=69 op=UNLOAD Oct 31 01:35:56.640000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.640000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.640000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.640000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.640000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.640000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.640000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.640000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.640000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.640000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:56.640000 audit: BPF prog-id=71 op=LOAD Oct 31 01:35:56.640000 audit[2095]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003255a8 items=0 ppid=1781 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:56.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335626537646566373438623265633935343563623132663937653436 Oct 31 01:35:56.680168 kubelet[1617]: E1031 01:35:56.680131 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:56.681675 env[1264]: time="2025-10-31T01:35:56.681645405Z" level=info msg="StartContainer for \"c5be7def748b2ec9545cb12f97e46a4b65a5edae3ea3c781c9591cbec02c60a2\" returns successfully" Oct 31 01:35:57.562962 systemd[1]: run-containerd-runc-k8s.io-c5be7def748b2ec9545cb12f97e46a4b65a5edae3ea3c781c9591cbec02c60a2-runc.e9JQqL.mount: Deactivated successfully. Oct 31 01:35:57.583655 update_engine[1259]: I1031 01:35:57.583613 1259 update_attempter.cc:509] Updating boot flags... Oct 31 01:35:57.680620 kubelet[1617]: E1031 01:35:57.680556 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:57.790526 kubelet[1617]: E1031 01:35:57.790160 1617 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qdjck" podUID="bbcb9b1c-ac58-4050-afb7-2be05d7754ef" Oct 31 01:35:58.067820 env[1264]: time="2025-10-31T01:35:58.067772051Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 01:35:58.069342 systemd[1]: cri-containerd-c5be7def748b2ec9545cb12f97e46a4b65a5edae3ea3c781c9591cbec02c60a2.scope: Deactivated successfully. Oct 31 01:35:58.073000 audit: BPF prog-id=71 op=UNLOAD Oct 31 01:35:58.081142 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c5be7def748b2ec9545cb12f97e46a4b65a5edae3ea3c781c9591cbec02c60a2-rootfs.mount: Deactivated successfully. Oct 31 01:35:58.115368 kubelet[1617]: I1031 01:35:58.114834 1617 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Oct 31 01:35:58.681293 kubelet[1617]: E1031 01:35:58.681261 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:59.083734 env[1264]: time="2025-10-31T01:35:59.083695427Z" level=info msg="shim disconnected" id=c5be7def748b2ec9545cb12f97e46a4b65a5edae3ea3c781c9591cbec02c60a2 Oct 31 01:35:59.083734 env[1264]: time="2025-10-31T01:35:59.083730650Z" level=warning msg="cleaning up after shim disconnected" id=c5be7def748b2ec9545cb12f97e46a4b65a5edae3ea3c781c9591cbec02c60a2 namespace=k8s.io Oct 31 01:35:59.083734 env[1264]: time="2025-10-31T01:35:59.083738509Z" level=info msg="cleaning up dead shim" Oct 31 01:35:59.088442 env[1264]: time="2025-10-31T01:35:59.088416494Z" level=warning msg="cleanup warnings time=\"2025-10-31T01:35:59Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2150 runtime=io.containerd.runc.v2\n" Oct 31 01:35:59.682155 kubelet[1617]: E1031 01:35:59.682119 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:59.793181 systemd[1]: Created slice kubepods-besteffort-podbbcb9b1c_ac58_4050_afb7_2be05d7754ef.slice. Oct 31 01:35:59.795602 env[1264]: time="2025-10-31T01:35:59.795556311Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qdjck,Uid:bbcb9b1c-ac58-4050-afb7-2be05d7754ef,Namespace:calico-system,Attempt:0,}" Oct 31 01:35:59.808932 env[1264]: time="2025-10-31T01:35:59.808900472Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Oct 31 01:35:59.871936 env[1264]: time="2025-10-31T01:35:59.871865708Z" level=error msg="Failed to destroy network for sandbox \"3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:35:59.873532 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f-shm.mount: Deactivated successfully. Oct 31 01:35:59.874539 env[1264]: time="2025-10-31T01:35:59.874504512Z" level=error msg="encountered an error cleaning up failed sandbox \"3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:35:59.874691 env[1264]: time="2025-10-31T01:35:59.874668439Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qdjck,Uid:bbcb9b1c-ac58-4050-afb7-2be05d7754ef,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:35:59.875336 kubelet[1617]: E1031 01:35:59.874956 1617 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:35:59.875336 kubelet[1617]: E1031 01:35:59.875022 1617 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qdjck" Oct 31 01:35:59.875336 kubelet[1617]: E1031 01:35:59.875044 1617 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qdjck" Oct 31 01:35:59.875477 kubelet[1617]: E1031 01:35:59.875092 1617 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-qdjck_calico-system(bbcb9b1c-ac58-4050-afb7-2be05d7754ef)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-qdjck_calico-system(bbcb9b1c-ac58-4050-afb7-2be05d7754ef)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qdjck" podUID="bbcb9b1c-ac58-4050-afb7-2be05d7754ef" Oct 31 01:36:00.682220 kubelet[1617]: E1031 01:36:00.682181 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:00.810163 kubelet[1617]: I1031 01:36:00.810120 1617 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f" Oct 31 01:36:00.810791 env[1264]: time="2025-10-31T01:36:00.810765420Z" level=info msg="StopPodSandbox for \"3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f\"" Oct 31 01:36:00.830721 env[1264]: time="2025-10-31T01:36:00.830674746Z" level=error msg="StopPodSandbox for \"3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f\" failed" error="failed to destroy network for sandbox \"3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:36:00.831060 kubelet[1617]: E1031 01:36:00.831015 1617 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f" Oct 31 01:36:00.831128 kubelet[1617]: E1031 01:36:00.831094 1617 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f"} Oct 31 01:36:00.831188 kubelet[1617]: E1031 01:36:00.831150 1617 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bbcb9b1c-ac58-4050-afb7-2be05d7754ef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:36:00.831253 kubelet[1617]: E1031 01:36:00.831195 1617 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bbcb9b1c-ac58-4050-afb7-2be05d7754ef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qdjck" podUID="bbcb9b1c-ac58-4050-afb7-2be05d7754ef" Oct 31 01:36:00.838881 systemd[1]: Created slice kubepods-besteffort-podb43b9cb9_2dc3_4445_aac0_24d0484d8674.slice. Oct 31 01:36:00.883855 kubelet[1617]: I1031 01:36:00.883801 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dvlsv\" (UniqueName: \"kubernetes.io/projected/b43b9cb9-2dc3-4445-aac0-24d0484d8674-kube-api-access-dvlsv\") pod \"nginx-deployment-7fcdb87857-mb9k9\" (UID: \"b43b9cb9-2dc3-4445-aac0-24d0484d8674\") " pod="default/nginx-deployment-7fcdb87857-mb9k9" Oct 31 01:36:01.141415 env[1264]: time="2025-10-31T01:36:01.141386094Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-mb9k9,Uid:b43b9cb9-2dc3-4445-aac0-24d0484d8674,Namespace:default,Attempt:0,}" Oct 31 01:36:01.308578 env[1264]: time="2025-10-31T01:36:01.308529265Z" level=error msg="Failed to destroy network for sandbox \"c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:36:01.309817 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d-shm.mount: Deactivated successfully. Oct 31 01:36:01.310507 env[1264]: time="2025-10-31T01:36:01.310473632Z" level=error msg="encountered an error cleaning up failed sandbox \"c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:36:01.310581 env[1264]: time="2025-10-31T01:36:01.310522294Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-mb9k9,Uid:b43b9cb9-2dc3-4445-aac0-24d0484d8674,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:36:01.310987 kubelet[1617]: E1031 01:36:01.310705 1617 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:36:01.310987 kubelet[1617]: E1031 01:36:01.310754 1617 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-mb9k9" Oct 31 01:36:01.310987 kubelet[1617]: E1031 01:36:01.310770 1617 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-mb9k9" Oct 31 01:36:01.311129 kubelet[1617]: E1031 01:36:01.310817 1617 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-mb9k9_default(b43b9cb9-2dc3-4445-aac0-24d0484d8674)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-mb9k9_default(b43b9cb9-2dc3-4445-aac0-24d0484d8674)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-mb9k9" podUID="b43b9cb9-2dc3-4445-aac0-24d0484d8674" Oct 31 01:36:01.701165 kubelet[1617]: E1031 01:36:01.701136 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:02.368119 kubelet[1617]: I1031 01:36:01.848977 1617 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d" Oct 31 01:36:02.368119 kubelet[1617]: E1031 01:36:01.870753 1617 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d" Oct 31 01:36:02.368119 kubelet[1617]: E1031 01:36:01.870790 1617 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d"} Oct 31 01:36:02.368119 kubelet[1617]: E1031 01:36:01.870813 1617 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b43b9cb9-2dc3-4445-aac0-24d0484d8674\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:36:02.368119 kubelet[1617]: E1031 01:36:01.870837 1617 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b43b9cb9-2dc3-4445-aac0-24d0484d8674\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-mb9k9" podUID="b43b9cb9-2dc3-4445-aac0-24d0484d8674" Oct 31 01:36:02.670724 env[1264]: time="2025-10-31T01:36:01.849475758Z" level=info msg="StopPodSandbox for \"c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d\"" Oct 31 01:36:02.670724 env[1264]: time="2025-10-31T01:36:01.870600944Z" level=error msg="StopPodSandbox for \"c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d\" failed" error="failed to destroy network for sandbox \"c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:36:02.702020 kubelet[1617]: E1031 01:36:02.701965 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:03.702092 kubelet[1617]: E1031 01:36:03.702056 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:04.656062 kubelet[1617]: E1031 01:36:04.656034 1617 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:04.702882 kubelet[1617]: E1031 01:36:04.702843 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:05.703204 kubelet[1617]: E1031 01:36:05.703180 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:06.518061 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1466457329.mount: Deactivated successfully. Oct 31 01:36:06.704139 kubelet[1617]: E1031 01:36:06.704096 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:07.069927 env[1264]: time="2025-10-31T01:36:07.069889038Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:36:07.112157 env[1264]: time="2025-10-31T01:36:07.112127039Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:36:07.125703 env[1264]: time="2025-10-31T01:36:07.125677948Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:36:07.143175 env[1264]: time="2025-10-31T01:36:07.143153077Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:36:07.143877 env[1264]: time="2025-10-31T01:36:07.143861368Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9\"" Oct 31 01:36:07.200408 env[1264]: time="2025-10-31T01:36:07.200380136Z" level=info msg="CreateContainer within sandbox \"ae5e32c0415f0d4b04ad42eab5b9d2b33be9b6b48d0bcf0429e3c4f7869e6c0c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 31 01:36:07.229239 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount315091458.mount: Deactivated successfully. Oct 31 01:36:07.249139 env[1264]: time="2025-10-31T01:36:07.249091267Z" level=info msg="CreateContainer within sandbox \"ae5e32c0415f0d4b04ad42eab5b9d2b33be9b6b48d0bcf0429e3c4f7869e6c0c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"a281ac44ebe199e2fd3303dffbb2c4e3bc04ff0a6b44452644eb276fd73b82aa\"" Oct 31 01:36:07.249717 env[1264]: time="2025-10-31T01:36:07.249680393Z" level=info msg="StartContainer for \"a281ac44ebe199e2fd3303dffbb2c4e3bc04ff0a6b44452644eb276fd73b82aa\"" Oct 31 01:36:07.262736 systemd[1]: Started cri-containerd-a281ac44ebe199e2fd3303dffbb2c4e3bc04ff0a6b44452644eb276fd73b82aa.scope. Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.289778 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 31 01:36:07.289883 kernel: audit: type=1400 audit(1761874567.282:521): avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa67456c5a8 items=0 ppid=1781 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:07.296628 kernel: audit: type=1300 audit(1761874567.282:521): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa67456c5a8 items=0 ppid=1781 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:07.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132383161633434656265313939653266643333303364666662623263 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.311569 kernel: audit: type=1327 audit(1761874567.282:521): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132383161633434656265313939653266643333303364666662623263 Oct 31 01:36:07.311622 kernel: audit: type=1400 audit(1761874567.282:522): avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.316550 kernel: audit: type=1400 audit(1761874567.282:522): avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.316599 kernel: audit: type=1400 audit(1761874567.282:522): avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.322836 kernel: audit: type=1400 audit(1761874567.282:522): avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.322904 kernel: audit: type=1400 audit(1761874567.282:522): avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.322922 kernel: audit: type=1400 audit(1761874567.282:522): avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.327299 kernel: audit: type=1400 audit(1761874567.282:522): avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit: BPF prog-id=72 op=LOAD Oct 31 01:36:07.282000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002d7ba8 items=0 ppid=1781 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:07.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132383161633434656265313939653266643333303364666662623263 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit: BPF prog-id=73 op=LOAD Oct 31 01:36:07.282000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002d7bf8 items=0 ppid=1781 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:07.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132383161633434656265313939653266643333303364666662623263 Oct 31 01:36:07.282000 audit: BPF prog-id=73 op=UNLOAD Oct 31 01:36:07.282000 audit: BPF prog-id=72 op=UNLOAD Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:07.282000 audit: BPF prog-id=74 op=LOAD Oct 31 01:36:07.282000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002d7c88 items=0 ppid=1781 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:07.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132383161633434656265313939653266643333303364666662623263 Oct 31 01:36:07.337017 env[1264]: time="2025-10-31T01:36:07.336985346Z" level=info msg="StartContainer for \"a281ac44ebe199e2fd3303dffbb2c4e3bc04ff0a6b44452644eb276fd73b82aa\" returns successfully" Oct 31 01:36:07.542411 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 31 01:36:07.542503 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 31 01:36:07.705188 kubelet[1617]: E1031 01:36:07.705104 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:07.869575 systemd[1]: run-containerd-runc-k8s.io-a281ac44ebe199e2fd3303dffbb2c4e3bc04ff0a6b44452644eb276fd73b82aa-runc.QmoZO5.mount: Deactivated successfully. Oct 31 01:36:07.926886 kubelet[1617]: I1031 01:36:07.926846 1617 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-b5ddh" podStartSLOduration=4.558486898 podStartE2EDuration="23.926834096s" podCreationTimestamp="2025-10-31 01:35:44 +0000 UTC" firstStartedPulling="2025-10-31 01:35:47.775940452 +0000 UTC m=+4.035279785" lastFinishedPulling="2025-10-31 01:36:07.144287646 +0000 UTC m=+23.403626983" observedRunningTime="2025-10-31 01:36:07.895088647 +0000 UTC m=+24.154427992" watchObservedRunningTime="2025-10-31 01:36:07.926834096 +0000 UTC m=+24.186173429" Oct 31 01:36:08.705494 kubelet[1617]: E1031 01:36:08.705468 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:08.868553 systemd[1]: run-containerd-runc-k8s.io-a281ac44ebe199e2fd3303dffbb2c4e3bc04ff0a6b44452644eb276fd73b82aa-runc.Mvzvu9.mount: Deactivated successfully. Oct 31 01:36:09.258000 audit[2398]: AVC avc: denied { write } for pid=2398 comm="tee" name="fd" dev="proc" ino=30951 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:36:09.260000 audit[2388]: AVC avc: denied { write } for pid=2388 comm="tee" name="fd" dev="proc" ino=30957 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:36:09.260000 audit[2388]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffed3b917e9 a2=241 a3=1b6 items=1 ppid=2369 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.260000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 31 01:36:09.260000 audit: PATH item=0 name="/dev/fd/63" inode=30934 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:36:09.260000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:36:09.258000 audit[2398]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb90287eb a2=241 a3=1b6 items=1 ppid=2370 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.258000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 31 01:36:09.258000 audit: PATH item=0 name="/dev/fd/63" inode=30939 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:36:09.258000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:36:09.265000 audit[2409]: AVC avc: denied { write } for pid=2409 comm="tee" name="fd" dev="proc" ino=30968 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:36:09.265000 audit[2409]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3bf6f7da a2=241 a3=1b6 items=1 ppid=2373 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.265000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 31 01:36:09.265000 audit: PATH item=0 name="/dev/fd/63" inode=30944 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:36:09.265000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:36:09.273000 audit[2412]: AVC avc: denied { write } for pid=2412 comm="tee" name="fd" dev="proc" ino=30283 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:36:09.273000 audit[2407]: AVC avc: denied { write } for pid=2407 comm="tee" name="fd" dev="proc" ino=30287 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:36:09.273000 audit[2407]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdbd2707d9 a2=241 a3=1b6 items=1 ppid=2366 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.273000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 31 01:36:09.273000 audit: PATH item=0 name="/dev/fd/63" inode=30268 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:36:09.273000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:36:09.273000 audit[2416]: AVC avc: denied { write } for pid=2416 comm="tee" name="fd" dev="proc" ino=30984 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:36:09.273000 audit[2416]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0dd877e9 a2=241 a3=1b6 items=1 ppid=2371 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.273000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 31 01:36:09.273000 audit: PATH item=0 name="/dev/fd/63" inode=30954 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:36:09.273000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:36:09.273000 audit[2412]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc25df47ea a2=241 a3=1b6 items=1 ppid=2374 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.273000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 31 01:36:09.273000 audit: PATH item=0 name="/dev/fd/63" inode=30273 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:36:09.273000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:36:09.284000 audit[2422]: AVC avc: denied { write } for pid=2422 comm="tee" name="fd" dev="proc" ino=30291 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:36:09.284000 audit[2422]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8c4327e9 a2=241 a3=1b6 items=1 ppid=2365 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.284000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 31 01:36:09.284000 audit: PATH item=0 name="/dev/fd/63" inode=30276 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:36:09.284000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:36:09.706467 kubelet[1617]: E1031 01:36:09.706400 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:09.772000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.772000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.772000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.772000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.772000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.772000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.772000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.772000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.772000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.772000 audit: BPF prog-id=75 op=LOAD Oct 31 01:36:09.772000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce7a7cec0 a2=98 a3=1fffffffffffffff items=0 ppid=2367 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.772000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:36:09.772000 audit: BPF prog-id=75 op=UNLOAD Oct 31 01:36:09.772000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.772000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.772000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.772000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.772000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.772000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.772000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.772000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.772000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.772000 audit: BPF prog-id=76 op=LOAD Oct 31 01:36:09.772000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce7a7cda0 a2=94 a3=3 items=0 ppid=2367 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.772000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:36:09.773000 audit: BPF prog-id=76 op=UNLOAD Oct 31 01:36:09.773000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.773000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.773000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.773000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.773000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.773000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.773000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.773000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.773000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.773000 audit: BPF prog-id=77 op=LOAD Oct 31 01:36:09.773000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce7a7cde0 a2=94 a3=7ffce7a7cfc0 items=0 ppid=2367 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.773000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:36:09.773000 audit: BPF prog-id=77 op=UNLOAD Oct 31 01:36:09.773000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.773000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffce7a7ceb0 a2=50 a3=a000000085 items=0 ppid=2367 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.773000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit: BPF prog-id=78 op=LOAD Oct 31 01:36:09.774000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff09a0500 a2=98 a3=3 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.774000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.774000 audit: BPF prog-id=78 op=UNLOAD Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit: BPF prog-id=79 op=LOAD Oct 31 01:36:09.774000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffff09a02f0 a2=94 a3=54428f items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.774000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.774000 audit: BPF prog-id=79 op=UNLOAD Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.774000 audit: BPF prog-id=80 op=LOAD Oct 31 01:36:09.774000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffff09a0320 a2=94 a3=2 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.774000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.774000 audit: BPF prog-id=80 op=UNLOAD Oct 31 01:36:09.848000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.848000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.848000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.848000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.848000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.848000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.848000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.848000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.848000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.848000 audit: BPF prog-id=81 op=LOAD Oct 31 01:36:09.848000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffff09a01e0 a2=94 a3=1 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.848000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.848000 audit: BPF prog-id=81 op=UNLOAD Oct 31 01:36:09.848000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.848000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffff09a02b0 a2=50 a3=7ffff09a0390 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.848000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff09a01f0 a2=28 a3=0 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff09a0220 a2=28 a3=0 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff09a0130 a2=28 a3=0 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff09a0240 a2=28 a3=0 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff09a0220 a2=28 a3=0 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff09a0210 a2=28 a3=0 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff09a0240 a2=28 a3=0 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff09a0220 a2=28 a3=0 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff09a0240 a2=28 a3=0 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff09a0210 a2=28 a3=0 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff09a0280 a2=28 a3=0 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffff09a0030 a2=50 a3=1 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit: BPF prog-id=82 op=LOAD Oct 31 01:36:09.855000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffff09a0030 a2=94 a3=5 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.855000 audit: BPF prog-id=82 op=UNLOAD Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffff09a00e0 a2=50 a3=1 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffff09a0200 a2=4 a3=38 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.855000 audit[2455]: AVC avc: denied { confidentiality } for pid=2455 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:09.855000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffff09a0250 a2=94 a3=6 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { confidentiality } for pid=2455 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:09.856000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffff099fa00 a2=94 a3=88 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.856000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.856000 audit[2455]: AVC avc: denied { confidentiality } for pid=2455 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:09.856000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffff099fa00 a2=94 a3=88 items=0 ppid=2367 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.856000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:36:09.863000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.863000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.863000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.863000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.863000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.863000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.863000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.863000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.863000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.863000 audit: BPF prog-id=83 op=LOAD Oct 31 01:36:09.863000 audit[2458]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc5abd4850 a2=98 a3=1999999999999999 items=0 ppid=2367 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.863000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 01:36:09.863000 audit: BPF prog-id=83 op=UNLOAD Oct 31 01:36:09.863000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.863000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.863000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.863000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.863000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.863000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.863000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.863000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.863000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.863000 audit: BPF prog-id=84 op=LOAD Oct 31 01:36:09.863000 audit[2458]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc5abd4730 a2=94 a3=ffff items=0 ppid=2367 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.863000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 01:36:09.864000 audit: BPF prog-id=84 op=UNLOAD Oct 31 01:36:09.864000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.864000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.864000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.864000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.864000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.864000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.864000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.864000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.864000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:09.864000 audit: BPF prog-id=85 op=LOAD Oct 31 01:36:09.864000 audit[2458]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc5abd4770 a2=94 a3=7ffc5abd4950 items=0 ppid=2367 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:09.864000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 01:36:09.864000 audit: BPF prog-id=85 op=UNLOAD Oct 31 01:36:10.283525 systemd-networkd[1082]: vxlan.calico: Link UP Oct 31 01:36:10.283530 systemd-networkd[1082]: vxlan.calico: Gained carrier Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit: BPF prog-id=86 op=LOAD Oct 31 01:36:10.337000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc2ba864c0 a2=98 a3=0 items=0 ppid=2367 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.337000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:36:10.337000 audit: BPF prog-id=86 op=UNLOAD Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit: BPF prog-id=87 op=LOAD Oct 31 01:36:10.337000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc2ba862d0 a2=94 a3=54428f items=0 ppid=2367 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.337000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:36:10.337000 audit: BPF prog-id=87 op=UNLOAD Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit: BPF prog-id=88 op=LOAD Oct 31 01:36:10.337000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc2ba86300 a2=94 a3=2 items=0 ppid=2367 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.337000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:36:10.337000 audit: BPF prog-id=88 op=UNLOAD Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc2ba861d0 a2=28 a3=0 items=0 ppid=2367 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.337000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2ba86200 a2=28 a3=0 items=0 ppid=2367 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.337000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2ba86110 a2=28 a3=0 items=0 ppid=2367 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.337000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc2ba86220 a2=28 a3=0 items=0 ppid=2367 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.337000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc2ba86200 a2=28 a3=0 items=0 ppid=2367 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.337000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:36:10.337000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.337000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc2ba861f0 a2=28 a3=0 items=0 ppid=2367 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.337000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc2ba86220 a2=28 a3=0 items=0 ppid=2367 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.338000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2ba86200 a2=28 a3=0 items=0 ppid=2367 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.338000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2ba86220 a2=28 a3=0 items=0 ppid=2367 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.338000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2ba861f0 a2=28 a3=0 items=0 ppid=2367 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.338000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc2ba86260 a2=28 a3=0 items=0 ppid=2367 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.338000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit: BPF prog-id=89 op=LOAD Oct 31 01:36:10.338000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc2ba860d0 a2=94 a3=0 items=0 ppid=2367 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.338000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:36:10.338000 audit: BPF prog-id=89 op=UNLOAD Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc2ba860c0 a2=50 a3=2800 items=0 ppid=2367 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.338000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc2ba860c0 a2=50 a3=2800 items=0 ppid=2367 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.338000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit: BPF prog-id=90 op=LOAD Oct 31 01:36:10.338000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc2ba858e0 a2=94 a3=2 items=0 ppid=2367 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.338000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:36:10.338000 audit: BPF prog-id=90 op=UNLOAD Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.338000 audit: BPF prog-id=91 op=LOAD Oct 31 01:36:10.338000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc2ba859e0 a2=94 a3=30 items=0 ppid=2367 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.338000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit: BPF prog-id=92 op=LOAD Oct 31 01:36:10.342000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8fddf880 a2=98 a3=0 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.342000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.342000 audit: BPF prog-id=92 op=UNLOAD Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit: BPF prog-id=93 op=LOAD Oct 31 01:36:10.342000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc8fddf670 a2=94 a3=54428f items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.342000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.342000 audit: BPF prog-id=93 op=UNLOAD Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.342000 audit: BPF prog-id=94 op=LOAD Oct 31 01:36:10.342000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc8fddf6a0 a2=94 a3=2 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.342000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.342000 audit: BPF prog-id=94 op=UNLOAD Oct 31 01:36:10.419000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.419000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.419000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.419000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.419000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.419000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.419000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.419000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.419000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.419000 audit: BPF prog-id=95 op=LOAD Oct 31 01:36:10.419000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc8fddf560 a2=94 a3=1 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.419000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.420000 audit: BPF prog-id=95 op=UNLOAD Oct 31 01:36:10.420000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.420000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc8fddf630 a2=50 a3=7ffc8fddf710 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.420000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8fddf570 a2=28 a3=0 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.427000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8fddf5a0 a2=28 a3=0 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.427000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8fddf4b0 a2=28 a3=0 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.427000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8fddf5c0 a2=28 a3=0 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.427000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8fddf5a0 a2=28 a3=0 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.427000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8fddf590 a2=28 a3=0 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.427000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8fddf5c0 a2=28 a3=0 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.427000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8fddf5a0 a2=28 a3=0 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.427000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8fddf5c0 a2=28 a3=0 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.427000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8fddf590 a2=28 a3=0 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.427000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8fddf600 a2=28 a3=0 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.427000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc8fddf3b0 a2=50 a3=1 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.427000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.427000 audit: BPF prog-id=96 op=LOAD Oct 31 01:36:10.427000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc8fddf3b0 a2=94 a3=5 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.427000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.428000 audit: BPF prog-id=96 op=UNLOAD Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc8fddf460 a2=50 a3=1 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.428000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc8fddf580 a2=4 a3=38 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.428000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { confidentiality } for pid=2510 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:10.428000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc8fddf5d0 a2=94 a3=6 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.428000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { confidentiality } for pid=2510 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:10.428000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc8fdded80 a2=94 a3=88 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.428000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { confidentiality } for pid=2510 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:10.428000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc8fdded80 a2=94 a3=88 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.428000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8fde07b0 a2=10 a3=f8f00800 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.428000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8fde0650 a2=10 a3=3 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.428000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8fde05f0 a2=10 a3=3 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.428000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.428000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:10.428000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8fde05f0 a2=10 a3=7 items=0 ppid=2367 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.428000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:36:10.449000 audit: BPF prog-id=91 op=UNLOAD Oct 31 01:36:10.622000 audit[2544]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2544 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:36:10.622000 audit[2544]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe872c9b30 a2=0 a3=7ffe872c9b1c items=0 ppid=2367 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.622000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:36:10.650000 audit[2547]: NETFILTER_CFG table=filter:66 family=2 entries=39 op=nft_register_chain pid=2547 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:36:10.650000 audit[2547]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff4157b3e0 a2=0 a3=7fff4157b3cc items=0 ppid=2367 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.650000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:36:10.651000 audit[2546]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=2546 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:36:10.651000 audit[2546]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fffc4b135b0 a2=0 a3=7fffc4b1359c items=0 ppid=2367 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.651000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:36:10.655000 audit[2543]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2543 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:36:10.655000 audit[2543]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe194b2920 a2=0 a3=7ffe194b290c items=0 ppid=2367 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:10.655000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:36:10.707125 kubelet[1617]: E1031 01:36:10.707085 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:11.495722 systemd-networkd[1082]: vxlan.calico: Gained IPv6LL Oct 31 01:36:11.707915 kubelet[1617]: E1031 01:36:11.707882 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:12.707994 kubelet[1617]: E1031 01:36:12.707965 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:12.790774 env[1264]: time="2025-10-31T01:36:12.790743437Z" level=info msg="StopPodSandbox for \"c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d\"" Oct 31 01:36:12.791233 env[1264]: time="2025-10-31T01:36:12.791201901Z" level=info msg="StopPodSandbox for \"3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f\"" Oct 31 01:36:13.709087 kubelet[1617]: E1031 01:36:13.709040 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:14.003893 env[1264]: 2025-10-31 01:36:13.160 [INFO][2580] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d" Oct 31 01:36:14.003893 env[1264]: 2025-10-31 01:36:13.160 [INFO][2580] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d" iface="eth0" netns="/var/run/netns/cni-fcb2af75-bdd5-d4e8-01a1-fc578ec6cf74" Oct 31 01:36:14.003893 env[1264]: 2025-10-31 01:36:13.161 [INFO][2580] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d" iface="eth0" netns="/var/run/netns/cni-fcb2af75-bdd5-d4e8-01a1-fc578ec6cf74" Oct 31 01:36:14.003893 env[1264]: 2025-10-31 01:36:13.162 [INFO][2580] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d" iface="eth0" netns="/var/run/netns/cni-fcb2af75-bdd5-d4e8-01a1-fc578ec6cf74" Oct 31 01:36:14.003893 env[1264]: 2025-10-31 01:36:13.162 [INFO][2580] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d" Oct 31 01:36:14.003893 env[1264]: 2025-10-31 01:36:13.163 [INFO][2580] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d" Oct 31 01:36:14.003893 env[1264]: 2025-10-31 01:36:13.942 [INFO][2592] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d" HandleID="k8s-pod-network.c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d" Workload="10.67.124.142-k8s-nginx--deployment--7fcdb87857--mb9k9-eth0" Oct 31 01:36:14.003893 env[1264]: 2025-10-31 01:36:13.953 [INFO][2592] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:36:14.003893 env[1264]: 2025-10-31 01:36:13.953 [INFO][2592] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:36:14.003893 env[1264]: 2025-10-31 01:36:14.001 [WARNING][2592] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d" HandleID="k8s-pod-network.c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d" Workload="10.67.124.142-k8s-nginx--deployment--7fcdb87857--mb9k9-eth0" Oct 31 01:36:14.003893 env[1264]: 2025-10-31 01:36:14.001 [INFO][2592] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d" HandleID="k8s-pod-network.c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d" Workload="10.67.124.142-k8s-nginx--deployment--7fcdb87857--mb9k9-eth0" Oct 31 01:36:14.003893 env[1264]: 2025-10-31 01:36:14.001 [INFO][2592] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:36:14.003893 env[1264]: 2025-10-31 01:36:14.003 [INFO][2580] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d" Oct 31 01:36:14.005443 systemd[1]: run-netns-cni\x2dfcb2af75\x2dbdd5\x2dd4e8\x2d01a1\x2dfc578ec6cf74.mount: Deactivated successfully. Oct 31 01:36:14.005650 env[1264]: time="2025-10-31T01:36:14.005627970Z" level=info msg="TearDown network for sandbox \"c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d\" successfully" Oct 31 01:36:14.005713 env[1264]: time="2025-10-31T01:36:14.005701145Z" level=info msg="StopPodSandbox for \"c2331afcb8543debb94f6d458ccd3259d13a7020d8a8481d6e3a4b343370337d\" returns successfully" Oct 31 01:36:14.006548 env[1264]: time="2025-10-31T01:36:14.006535581Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-mb9k9,Uid:b43b9cb9-2dc3-4445-aac0-24d0484d8674,Namespace:default,Attempt:1,}" Oct 31 01:36:14.011543 env[1264]: 2025-10-31 01:36:13.165 [INFO][2579] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f" Oct 31 01:36:14.011543 env[1264]: 2025-10-31 01:36:13.166 [INFO][2579] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f" iface="eth0" netns="/var/run/netns/cni-aef1aa3e-d257-19b6-e0f5-c3f9875b013c" Oct 31 01:36:14.011543 env[1264]: 2025-10-31 01:36:13.166 [INFO][2579] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f" iface="eth0" netns="/var/run/netns/cni-aef1aa3e-d257-19b6-e0f5-c3f9875b013c" Oct 31 01:36:14.011543 env[1264]: 2025-10-31 01:36:13.166 [INFO][2579] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f" iface="eth0" netns="/var/run/netns/cni-aef1aa3e-d257-19b6-e0f5-c3f9875b013c" Oct 31 01:36:14.011543 env[1264]: 2025-10-31 01:36:13.166 [INFO][2579] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f" Oct 31 01:36:14.011543 env[1264]: 2025-10-31 01:36:13.166 [INFO][2579] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f" Oct 31 01:36:14.011543 env[1264]: 2025-10-31 01:36:13.942 [INFO][2594] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f" HandleID="k8s-pod-network.3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f" Workload="10.67.124.142-k8s-csi--node--driver--qdjck-eth0" Oct 31 01:36:14.011543 env[1264]: 2025-10-31 01:36:13.953 [INFO][2594] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:36:14.011543 env[1264]: 2025-10-31 01:36:14.001 [INFO][2594] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:36:14.011543 env[1264]: 2025-10-31 01:36:14.008 [WARNING][2594] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f" HandleID="k8s-pod-network.3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f" Workload="10.67.124.142-k8s-csi--node--driver--qdjck-eth0" Oct 31 01:36:14.011543 env[1264]: 2025-10-31 01:36:14.008 [INFO][2594] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f" HandleID="k8s-pod-network.3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f" Workload="10.67.124.142-k8s-csi--node--driver--qdjck-eth0" Oct 31 01:36:14.011543 env[1264]: 2025-10-31 01:36:14.009 [INFO][2594] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:36:14.011543 env[1264]: 2025-10-31 01:36:14.010 [INFO][2579] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f" Oct 31 01:36:14.012646 systemd[1]: run-netns-cni\x2daef1aa3e\x2dd257\x2d19b6\x2de0f5\x2dc3f9875b013c.mount: Deactivated successfully. Oct 31 01:36:14.013386 env[1264]: time="2025-10-31T01:36:14.013360365Z" level=info msg="TearDown network for sandbox \"3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f\" successfully" Oct 31 01:36:14.013420 env[1264]: time="2025-10-31T01:36:14.013384823Z" level=info msg="StopPodSandbox for \"3a6e8153c08d85b0971aa0a4f04760e1404ce1c6d927b6357c05ccbdeb2c539f\" returns successfully" Oct 31 01:36:14.013831 env[1264]: time="2025-10-31T01:36:14.013814469Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qdjck,Uid:bbcb9b1c-ac58-4050-afb7-2be05d7754ef,Namespace:calico-system,Attempt:1,}" Oct 31 01:36:14.330239 systemd-networkd[1082]: cali26543e90ac1: Link UP Oct 31 01:36:14.345375 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:36:14.345454 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali26543e90ac1: link becomes ready Oct 31 01:36:14.345969 systemd-networkd[1082]: cali26543e90ac1: Gained carrier Oct 31 01:36:14.369413 env[1264]: 2025-10-31 01:36:14.211 [INFO][2605] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.142-k8s-nginx--deployment--7fcdb87857--mb9k9-eth0 nginx-deployment-7fcdb87857- default b43b9cb9-2dc3-4445-aac0-24d0484d8674 1422 0 2025-10-31 01:36:00 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.142 nginx-deployment-7fcdb87857-mb9k9 eth0 default [] [] [kns.default ksa.default.default] cali26543e90ac1 [] [] }} ContainerID="9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201" Namespace="default" Pod="nginx-deployment-7fcdb87857-mb9k9" WorkloadEndpoint="10.67.124.142-k8s-nginx--deployment--7fcdb87857--mb9k9-" Oct 31 01:36:14.369413 env[1264]: 2025-10-31 01:36:14.211 [INFO][2605] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201" Namespace="default" Pod="nginx-deployment-7fcdb87857-mb9k9" WorkloadEndpoint="10.67.124.142-k8s-nginx--deployment--7fcdb87857--mb9k9-eth0" Oct 31 01:36:14.369413 env[1264]: 2025-10-31 01:36:14.235 [INFO][2632] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201" HandleID="k8s-pod-network.9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201" Workload="10.67.124.142-k8s-nginx--deployment--7fcdb87857--mb9k9-eth0" Oct 31 01:36:14.369413 env[1264]: 2025-10-31 01:36:14.235 [INFO][2632] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201" HandleID="k8s-pod-network.9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201" Workload="10.67.124.142-k8s-nginx--deployment--7fcdb87857--mb9k9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ccfe0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.142", "pod":"nginx-deployment-7fcdb87857-mb9k9", "timestamp":"2025-10-31 01:36:14.235288883 +0000 UTC"}, Hostname:"10.67.124.142", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:36:14.369413 env[1264]: 2025-10-31 01:36:14.235 [INFO][2632] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:36:14.369413 env[1264]: 2025-10-31 01:36:14.236 [INFO][2632] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:36:14.369413 env[1264]: 2025-10-31 01:36:14.236 [INFO][2632] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.142' Oct 31 01:36:14.369413 env[1264]: 2025-10-31 01:36:14.250 [INFO][2632] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201" host="10.67.124.142" Oct 31 01:36:14.369413 env[1264]: 2025-10-31 01:36:14.287 [INFO][2632] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.142" Oct 31 01:36:14.369413 env[1264]: 2025-10-31 01:36:14.290 [INFO][2632] ipam/ipam.go 511: Trying affinity for 192.168.47.0/26 host="10.67.124.142" Oct 31 01:36:14.369413 env[1264]: 2025-10-31 01:36:14.291 [INFO][2632] ipam/ipam.go 158: Attempting to load block cidr=192.168.47.0/26 host="10.67.124.142" Oct 31 01:36:14.369413 env[1264]: 2025-10-31 01:36:14.293 [INFO][2632] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.47.0/26 host="10.67.124.142" Oct 31 01:36:14.369413 env[1264]: 2025-10-31 01:36:14.293 [INFO][2632] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.47.0/26 handle="k8s-pod-network.9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201" host="10.67.124.142" Oct 31 01:36:14.369413 env[1264]: 2025-10-31 01:36:14.294 [INFO][2632] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201 Oct 31 01:36:14.369413 env[1264]: 2025-10-31 01:36:14.301 [INFO][2632] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.47.0/26 handle="k8s-pod-network.9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201" host="10.67.124.142" Oct 31 01:36:14.369413 env[1264]: 2025-10-31 01:36:14.308 [INFO][2632] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.47.1/26] block=192.168.47.0/26 handle="k8s-pod-network.9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201" host="10.67.124.142" Oct 31 01:36:14.369413 env[1264]: 2025-10-31 01:36:14.308 [INFO][2632] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.47.1/26] handle="k8s-pod-network.9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201" host="10.67.124.142" Oct 31 01:36:14.369413 env[1264]: 2025-10-31 01:36:14.308 [INFO][2632] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:36:14.369413 env[1264]: 2025-10-31 01:36:14.308 [INFO][2632] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.47.1/26] IPv6=[] ContainerID="9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201" HandleID="k8s-pod-network.9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201" Workload="10.67.124.142-k8s-nginx--deployment--7fcdb87857--mb9k9-eth0" Oct 31 01:36:14.370085 env[1264]: 2025-10-31 01:36:14.310 [INFO][2605] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201" Namespace="default" Pod="nginx-deployment-7fcdb87857-mb9k9" WorkloadEndpoint="10.67.124.142-k8s-nginx--deployment--7fcdb87857--mb9k9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.142-k8s-nginx--deployment--7fcdb87857--mb9k9-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"b43b9cb9-2dc3-4445-aac0-24d0484d8674", ResourceVersion:"1422", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 36, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.142", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-mb9k9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.47.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali26543e90ac1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:36:14.370085 env[1264]: 2025-10-31 01:36:14.310 [INFO][2605] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.47.1/32] ContainerID="9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201" Namespace="default" Pod="nginx-deployment-7fcdb87857-mb9k9" WorkloadEndpoint="10.67.124.142-k8s-nginx--deployment--7fcdb87857--mb9k9-eth0" Oct 31 01:36:14.370085 env[1264]: 2025-10-31 01:36:14.310 [INFO][2605] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali26543e90ac1 ContainerID="9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201" Namespace="default" Pod="nginx-deployment-7fcdb87857-mb9k9" WorkloadEndpoint="10.67.124.142-k8s-nginx--deployment--7fcdb87857--mb9k9-eth0" Oct 31 01:36:14.370085 env[1264]: 2025-10-31 01:36:14.346 [INFO][2605] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201" Namespace="default" Pod="nginx-deployment-7fcdb87857-mb9k9" WorkloadEndpoint="10.67.124.142-k8s-nginx--deployment--7fcdb87857--mb9k9-eth0" Oct 31 01:36:14.370085 env[1264]: 2025-10-31 01:36:14.346 [INFO][2605] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201" Namespace="default" Pod="nginx-deployment-7fcdb87857-mb9k9" WorkloadEndpoint="10.67.124.142-k8s-nginx--deployment--7fcdb87857--mb9k9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.142-k8s-nginx--deployment--7fcdb87857--mb9k9-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"b43b9cb9-2dc3-4445-aac0-24d0484d8674", ResourceVersion:"1422", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 36, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.142", ContainerID:"9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201", Pod:"nginx-deployment-7fcdb87857-mb9k9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.47.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali26543e90ac1", MAC:"f6:0b:1e:7c:a0:6b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:36:14.370085 env[1264]: 2025-10-31 01:36:14.368 [INFO][2605] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201" Namespace="default" Pod="nginx-deployment-7fcdb87857-mb9k9" WorkloadEndpoint="10.67.124.142-k8s-nginx--deployment--7fcdb87857--mb9k9-eth0" Oct 31 01:36:14.394663 env[1264]: time="2025-10-31T01:36:14.394603336Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:36:14.394663 env[1264]: time="2025-10-31T01:36:14.394642240Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:36:14.394855 env[1264]: time="2025-10-31T01:36:14.394822000Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:36:14.395091 env[1264]: time="2025-10-31T01:36:14.395041551Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201 pid=2664 runtime=io.containerd.runc.v2 Oct 31 01:36:14.409451 systemd[1]: Started cri-containerd-9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201.scope. Oct 31 01:36:14.393000 audit[2655]: NETFILTER_CFG table=filter:69 family=2 entries=38 op=nft_register_chain pid=2655 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:36:14.418607 kernel: kauditd_printk_skb: 590 callbacks suppressed Oct 31 01:36:14.418649 kernel: audit: type=1325 audit(1761874574.393:636): table=filter:69 family=2 entries=38 op=nft_register_chain pid=2655 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:36:14.393000 audit[2655]: SYSCALL arch=c000003e syscall=46 success=yes exit=21324 a0=3 a1=7fff6b4ebe80 a2=0 a3=7fff6b4ebe6c items=0 ppid=2367 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:14.424353 kernel: audit: type=1300 audit(1761874574.393:636): arch=c000003e syscall=46 success=yes exit=21324 a0=3 a1=7fff6b4ebe80 a2=0 a3=7fff6b4ebe6c items=0 ppid=2367 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:14.393000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:36:14.427604 kernel: audit: type=1327 audit(1761874574.393:636): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:36:14.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.431679 kernel: audit: type=1400 audit(1761874574.428:637): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434569 kernel: audit: type=1400 audit(1761874574.428:638): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.435471 systemd-resolved[1215]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:36:14.440619 kernel: audit: type=1400 audit(1761874574.428:639): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.440654 kernel: audit: type=1400 audit(1761874574.428:640): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.443260 kernel: audit: type=1400 audit(1761874574.428:641): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.446568 kernel: audit: type=1400 audit(1761874574.428:642): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.430000 audit: BPF prog-id=97 op=LOAD Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2664 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:14.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963623030326435623133633363613334356264326362383131643936 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2664 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:14.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963623030326435623133633363613334356264326362383131643936 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit: BPF prog-id=98 op=LOAD Oct 31 01:36:14.434000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003107c0 items=0 ppid=2664 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:14.450610 kernel: audit: type=1400 audit(1761874574.428:643): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963623030326435623133633363613334356264326362383131643936 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit: BPF prog-id=99 op=LOAD Oct 31 01:36:14.434000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000310808 items=0 ppid=2664 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:14.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963623030326435623133633363613334356264326362383131643936 Oct 31 01:36:14.434000 audit: BPF prog-id=99 op=UNLOAD Oct 31 01:36:14.434000 audit: BPF prog-id=98 op=UNLOAD Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.434000 audit: BPF prog-id=100 op=LOAD Oct 31 01:36:14.434000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000310c18 items=0 ppid=2664 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:14.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963623030326435623133633363613334356264326362383131643936 Oct 31 01:36:14.459208 env[1264]: time="2025-10-31T01:36:14.459181271Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-mb9k9,Uid:b43b9cb9-2dc3-4445-aac0-24d0484d8674,Namespace:default,Attempt:1,} returns sandbox id \"9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201\"" Oct 31 01:36:14.460189 env[1264]: time="2025-10-31T01:36:14.460173667Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 31 01:36:14.478447 systemd-networkd[1082]: cali3e1d32aeb01: Link UP Oct 31 01:36:14.480150 systemd-networkd[1082]: cali3e1d32aeb01: Gained carrier Oct 31 01:36:14.480590 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3e1d32aeb01: link becomes ready Oct 31 01:36:14.495577 env[1264]: 2025-10-31 01:36:14.218 [INFO][2614] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.142-k8s-csi--node--driver--qdjck-eth0 csi-node-driver- calico-system bbcb9b1c-ac58-4050-afb7-2be05d7754ef 1421 0 2025-10-31 01:35:44 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:857b56db8f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.67.124.142 csi-node-driver-qdjck eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali3e1d32aeb01 [] [] }} ContainerID="4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37" Namespace="calico-system" Pod="csi-node-driver-qdjck" WorkloadEndpoint="10.67.124.142-k8s-csi--node--driver--qdjck-" Oct 31 01:36:14.495577 env[1264]: 2025-10-31 01:36:14.218 [INFO][2614] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37" Namespace="calico-system" Pod="csi-node-driver-qdjck" WorkloadEndpoint="10.67.124.142-k8s-csi--node--driver--qdjck-eth0" Oct 31 01:36:14.495577 env[1264]: 2025-10-31 01:36:14.245 [INFO][2638] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37" HandleID="k8s-pod-network.4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37" Workload="10.67.124.142-k8s-csi--node--driver--qdjck-eth0" Oct 31 01:36:14.495577 env[1264]: 2025-10-31 01:36:14.245 [INFO][2638] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37" HandleID="k8s-pod-network.4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37" Workload="10.67.124.142-k8s-csi--node--driver--qdjck-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b73a0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.124.142", "pod":"csi-node-driver-qdjck", "timestamp":"2025-10-31 01:36:14.245582118 +0000 UTC"}, Hostname:"10.67.124.142", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:36:14.495577 env[1264]: 2025-10-31 01:36:14.245 [INFO][2638] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:36:14.495577 env[1264]: 2025-10-31 01:36:14.308 [INFO][2638] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:36:14.495577 env[1264]: 2025-10-31 01:36:14.309 [INFO][2638] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.142' Oct 31 01:36:14.495577 env[1264]: 2025-10-31 01:36:14.349 [INFO][2638] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37" host="10.67.124.142" Oct 31 01:36:14.495577 env[1264]: 2025-10-31 01:36:14.412 [INFO][2638] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.142" Oct 31 01:36:14.495577 env[1264]: 2025-10-31 01:36:14.427 [INFO][2638] ipam/ipam.go 511: Trying affinity for 192.168.47.0/26 host="10.67.124.142" Oct 31 01:36:14.495577 env[1264]: 2025-10-31 01:36:14.435 [INFO][2638] ipam/ipam.go 158: Attempting to load block cidr=192.168.47.0/26 host="10.67.124.142" Oct 31 01:36:14.495577 env[1264]: 2025-10-31 01:36:14.443 [INFO][2638] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.47.0/26 host="10.67.124.142" Oct 31 01:36:14.495577 env[1264]: 2025-10-31 01:36:14.443 [INFO][2638] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.47.0/26 handle="k8s-pod-network.4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37" host="10.67.124.142" Oct 31 01:36:14.495577 env[1264]: 2025-10-31 01:36:14.446 [INFO][2638] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37 Oct 31 01:36:14.495577 env[1264]: 2025-10-31 01:36:14.457 [INFO][2638] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.47.0/26 handle="k8s-pod-network.4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37" host="10.67.124.142" Oct 31 01:36:14.495577 env[1264]: 2025-10-31 01:36:14.474 [INFO][2638] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.47.2/26] block=192.168.47.0/26 handle="k8s-pod-network.4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37" host="10.67.124.142" Oct 31 01:36:14.495577 env[1264]: 2025-10-31 01:36:14.474 [INFO][2638] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.47.2/26] handle="k8s-pod-network.4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37" host="10.67.124.142" Oct 31 01:36:14.495577 env[1264]: 2025-10-31 01:36:14.475 [INFO][2638] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:36:14.495577 env[1264]: 2025-10-31 01:36:14.475 [INFO][2638] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.47.2/26] IPv6=[] ContainerID="4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37" HandleID="k8s-pod-network.4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37" Workload="10.67.124.142-k8s-csi--node--driver--qdjck-eth0" Oct 31 01:36:14.498937 env[1264]: 2025-10-31 01:36:14.476 [INFO][2614] cni-plugin/k8s.go 418: Populated endpoint ContainerID="4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37" Namespace="calico-system" Pod="csi-node-driver-qdjck" WorkloadEndpoint="10.67.124.142-k8s-csi--node--driver--qdjck-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.142-k8s-csi--node--driver--qdjck-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bbcb9b1c-ac58-4050-afb7-2be05d7754ef", ResourceVersion:"1421", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 35, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.142", ContainerID:"", Pod:"csi-node-driver-qdjck", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.47.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3e1d32aeb01", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:36:14.498937 env[1264]: 2025-10-31 01:36:14.476 [INFO][2614] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.47.2/32] ContainerID="4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37" Namespace="calico-system" Pod="csi-node-driver-qdjck" WorkloadEndpoint="10.67.124.142-k8s-csi--node--driver--qdjck-eth0" Oct 31 01:36:14.498937 env[1264]: 2025-10-31 01:36:14.476 [INFO][2614] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3e1d32aeb01 ContainerID="4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37" Namespace="calico-system" Pod="csi-node-driver-qdjck" WorkloadEndpoint="10.67.124.142-k8s-csi--node--driver--qdjck-eth0" Oct 31 01:36:14.498937 env[1264]: 2025-10-31 01:36:14.480 [INFO][2614] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37" Namespace="calico-system" Pod="csi-node-driver-qdjck" WorkloadEndpoint="10.67.124.142-k8s-csi--node--driver--qdjck-eth0" Oct 31 01:36:14.498937 env[1264]: 2025-10-31 01:36:14.481 [INFO][2614] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37" Namespace="calico-system" Pod="csi-node-driver-qdjck" WorkloadEndpoint="10.67.124.142-k8s-csi--node--driver--qdjck-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.142-k8s-csi--node--driver--qdjck-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bbcb9b1c-ac58-4050-afb7-2be05d7754ef", ResourceVersion:"1421", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 35, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.142", ContainerID:"4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37", Pod:"csi-node-driver-qdjck", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.47.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3e1d32aeb01", MAC:"e2:f1:3e:4a:b5:98", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:36:14.498937 env[1264]: 2025-10-31 01:36:14.492 [INFO][2614] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37" Namespace="calico-system" Pod="csi-node-driver-qdjck" WorkloadEndpoint="10.67.124.142-k8s-csi--node--driver--qdjck-eth0" Oct 31 01:36:14.502000 audit[2712]: NETFILTER_CFG table=filter:70 family=2 entries=42 op=nft_register_chain pid=2712 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:36:14.502000 audit[2712]: SYSCALL arch=c000003e syscall=46 success=yes exit=22552 a0=3 a1=7ffdf9d8dec0 a2=0 a3=7ffdf9d8deac items=0 ppid=2367 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:14.502000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:36:14.514172 env[1264]: time="2025-10-31T01:36:14.514114020Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:36:14.514299 env[1264]: time="2025-10-31T01:36:14.514150746Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:36:14.514299 env[1264]: time="2025-10-31T01:36:14.514162634Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:36:14.514474 env[1264]: time="2025-10-31T01:36:14.514437692Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37 pid=2721 runtime=io.containerd.runc.v2 Oct 31 01:36:14.524981 systemd[1]: Started cri-containerd-4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37.scope. Oct 31 01:36:14.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.535000 audit: BPF prog-id=101 op=LOAD Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2721 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:14.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466386265643035636365303361636131623865623639613963333337 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2721 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:14.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466386265643035636365303361636131623865623639613963333337 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit: BPF prog-id=102 op=LOAD Oct 31 01:36:14.536000 audit[2729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a14e0 items=0 ppid=2721 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:14.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466386265643035636365303361636131623865623639613963333337 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit: BPF prog-id=103 op=LOAD Oct 31 01:36:14.536000 audit[2729]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a1528 items=0 ppid=2721 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:14.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466386265643035636365303361636131623865623639613963333337 Oct 31 01:36:14.536000 audit: BPF prog-id=103 op=UNLOAD Oct 31 01:36:14.536000 audit: BPF prog-id=102 op=UNLOAD Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:14.536000 audit: BPF prog-id=104 op=LOAD Oct 31 01:36:14.536000 audit[2729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a1938 items=0 ppid=2721 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:14.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466386265643035636365303361636131623865623639613963333337 Oct 31 01:36:14.538443 systemd-resolved[1215]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:36:14.545459 env[1264]: time="2025-10-31T01:36:14.545418121Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qdjck,Uid:bbcb9b1c-ac58-4050-afb7-2be05d7754ef,Namespace:calico-system,Attempt:1,} returns sandbox id \"4f8bed05cce03aca1b8eb69a9c337bfa4a97fa175e3d379f8d7e73b46a59cf37\"" Oct 31 01:36:14.709226 kubelet[1617]: E1031 01:36:14.709137 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:15.591697 systemd-networkd[1082]: cali3e1d32aeb01: Gained IPv6LL Oct 31 01:36:15.709821 kubelet[1617]: E1031 01:36:15.709786 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:15.975770 systemd-networkd[1082]: cali26543e90ac1: Gained IPv6LL Oct 31 01:36:16.710273 kubelet[1617]: E1031 01:36:16.710241 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:17.711178 kubelet[1617]: E1031 01:36:17.711139 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:17.784159 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount729400275.mount: Deactivated successfully. Oct 31 01:36:18.711230 kubelet[1617]: E1031 01:36:18.711199 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:19.712031 kubelet[1617]: E1031 01:36:19.711989 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:20.195083 env[1264]: time="2025-10-31T01:36:20.195049997Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:36:20.218671 env[1264]: time="2025-10-31T01:36:20.218642394Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:36:20.231302 env[1264]: time="2025-10-31T01:36:20.231266009Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:36:20.243551 env[1264]: time="2025-10-31T01:36:20.243519137Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:36:20.244071 env[1264]: time="2025-10-31T01:36:20.244050542Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9\"" Oct 31 01:36:20.245245 env[1264]: time="2025-10-31T01:36:20.245230320Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 01:36:20.307892 env[1264]: time="2025-10-31T01:36:20.307854527Z" level=info msg="CreateContainer within sandbox \"9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Oct 31 01:36:20.358455 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1604523544.mount: Deactivated successfully. Oct 31 01:36:20.361880 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1512071528.mount: Deactivated successfully. Oct 31 01:36:20.566355 env[1264]: time="2025-10-31T01:36:20.566318647Z" level=info msg="CreateContainer within sandbox \"9cb002d5b13c3ca345bd2cb811d96d30c18813f8209ef6766dc297cf530db201\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"8ddcbe297b3929396454b1159fc2fdf64e9faf10cf88eaa64f064b79a398ffa2\"" Oct 31 01:36:20.567048 env[1264]: time="2025-10-31T01:36:20.567029983Z" level=info msg="StartContainer for \"8ddcbe297b3929396454b1159fc2fdf64e9faf10cf88eaa64f064b79a398ffa2\"" Oct 31 01:36:20.580962 systemd[1]: Started cri-containerd-8ddcbe297b3929396454b1159fc2fdf64e9faf10cf88eaa64f064b79a398ffa2.scope. Oct 31 01:36:20.593804 kernel: kauditd_printk_skb: 110 callbacks suppressed Oct 31 01:36:20.593860 kernel: audit: type=1400 audit(1761874580.590:674): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.596420 kernel: audit: type=1400 audit(1761874580.590:675): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598863 kernel: audit: type=1400 audit(1761874580.590:676): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.601459 kernel: audit: type=1400 audit(1761874580.590:677): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.601526 env[1264]: time="2025-10-31T01:36:20.599109076Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:36:20.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.604580 kernel: audit: type=1400 audit(1761874580.590:678): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.607588 kernel: audit: type=1400 audit(1761874580.590:679): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.610937 kernel: audit: type=1400 audit(1761874580.590:680): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.613696 env[1264]: time="2025-10-31T01:36:20.613654855Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 01:36:20.614070 kubelet[1617]: E1031 01:36:20.613798 1617 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:36:20.614070 kubelet[1617]: E1031 01:36:20.613830 1617 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:36:20.614148 kubelet[1617]: E1031 01:36:20.613917 1617 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-74rvw,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-qdjck_calico-system(bbcb9b1c-ac58-4050-afb7-2be05d7754ef): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 01:36:20.616693 kernel: audit: type=1400 audit(1761874580.590:681): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.616736 kernel: audit: type=1400 audit(1761874580.590:682): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.618596 env[1264]: time="2025-10-31T01:36:20.618577221Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 01:36:20.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.621980 kernel: audit: type=1400 audit(1761874580.593:683): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.593000 audit: BPF prog-id=105 op=LOAD Oct 31 01:36:20.595000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.595000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2664 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:20.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864646362653239376233393239333936343534623131353966633266 Oct 31 01:36:20.595000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.595000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2664 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:20.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864646362653239376233393239333936343534623131353966633266 Oct 31 01:36:20.595000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.595000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.595000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.595000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.595000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.595000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.595000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.595000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.595000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.595000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.595000 audit: BPF prog-id=106 op=LOAD Oct 31 01:36:20.595000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003d0ca0 items=0 ppid=2664 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:20.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864646362653239376233393239333936343534623131353966633266 Oct 31 01:36:20.598000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598000 audit: BPF prog-id=107 op=LOAD Oct 31 01:36:20.598000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003d0ce8 items=0 ppid=2664 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:20.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864646362653239376233393239333936343534623131353966633266 Oct 31 01:36:20.598000 audit: BPF prog-id=107 op=UNLOAD Oct 31 01:36:20.598000 audit: BPF prog-id=106 op=UNLOAD Oct 31 01:36:20.598000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:20.598000 audit: BPF prog-id=108 op=LOAD Oct 31 01:36:20.598000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003d10f8 items=0 ppid=2664 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:20.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864646362653239376233393239333936343534623131353966633266 Oct 31 01:36:20.673872 env[1264]: time="2025-10-31T01:36:20.673825575Z" level=info msg="StartContainer for \"8ddcbe297b3929396454b1159fc2fdf64e9faf10cf88eaa64f064b79a398ffa2\" returns successfully" Oct 31 01:36:20.712345 kubelet[1617]: E1031 01:36:20.712301 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:20.882443 kubelet[1617]: I1031 01:36:20.880864 1617 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-mb9k9" podStartSLOduration=15.095944221 podStartE2EDuration="20.880854507s" podCreationTimestamp="2025-10-31 01:36:00 +0000 UTC" firstStartedPulling="2025-10-31 01:36:14.45981309 +0000 UTC m=+30.719152425" lastFinishedPulling="2025-10-31 01:36:20.244723375 +0000 UTC m=+36.504062711" observedRunningTime="2025-10-31 01:36:20.880842097 +0000 UTC m=+37.140181435" watchObservedRunningTime="2025-10-31 01:36:20.880854507 +0000 UTC m=+37.140193847" Oct 31 01:36:20.965908 env[1264]: time="2025-10-31T01:36:20.965867019Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:36:20.970403 env[1264]: time="2025-10-31T01:36:20.970356123Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 01:36:20.970588 kubelet[1617]: E1031 01:36:20.970532 1617 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:36:20.970645 kubelet[1617]: E1031 01:36:20.970596 1617 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:36:20.970724 kubelet[1617]: E1031 01:36:20.970687 1617 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-74rvw,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-qdjck_calico-system(bbcb9b1c-ac58-4050-afb7-2be05d7754ef): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 01:36:20.971841 kubelet[1617]: E1031 01:36:20.971815 1617 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-qdjck" podUID="bbcb9b1c-ac58-4050-afb7-2be05d7754ef" Oct 31 01:36:21.713467 kubelet[1617]: E1031 01:36:21.713413 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:21.876729 kubelet[1617]: E1031 01:36:21.876697 1617 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-qdjck" podUID="bbcb9b1c-ac58-4050-afb7-2be05d7754ef" Oct 31 01:36:22.714505 kubelet[1617]: E1031 01:36:22.714461 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:23.657000 audit[2828]: NETFILTER_CFG table=filter:71 family=2 entries=26 op=nft_register_rule pid=2828 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:36:23.657000 audit[2828]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7fff12f91fb0 a2=0 a3=7fff12f91f9c items=0 ppid=1932 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:23.657000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:36:23.661000 audit[2828]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=2828 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:36:23.661000 audit[2828]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff12f91fb0 a2=0 a3=0 items=0 ppid=1932 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:23.661000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:36:23.715531 kubelet[1617]: E1031 01:36:23.715500 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:23.741000 audit[2830]: NETFILTER_CFG table=filter:73 family=2 entries=38 op=nft_register_rule pid=2830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:36:23.741000 audit[2830]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffdb29da840 a2=0 a3=7ffdb29da82c items=0 ppid=1932 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:23.741000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:36:23.746000 audit[2830]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=2830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:36:23.746000 audit[2830]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdb29da840 a2=0 a3=0 items=0 ppid=1932 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:23.746000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:36:24.130283 systemd[1]: Created slice kubepods-besteffort-pod70406af7_52bf_4acf_ae2a_a026fdaf2e90.slice. Oct 31 01:36:24.213699 kubelet[1617]: I1031 01:36:24.213663 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/70406af7-52bf-4acf-ae2a-a026fdaf2e90-data\") pod \"nfs-server-provisioner-0\" (UID: \"70406af7-52bf-4acf-ae2a-a026fdaf2e90\") " pod="default/nfs-server-provisioner-0" Oct 31 01:36:24.213841 kubelet[1617]: I1031 01:36:24.213716 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7smpm\" (UniqueName: \"kubernetes.io/projected/70406af7-52bf-4acf-ae2a-a026fdaf2e90-kube-api-access-7smpm\") pod \"nfs-server-provisioner-0\" (UID: \"70406af7-52bf-4acf-ae2a-a026fdaf2e90\") " pod="default/nfs-server-provisioner-0" Oct 31 01:36:24.433009 env[1264]: time="2025-10-31T01:36:24.432715175Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:70406af7-52bf-4acf-ae2a-a026fdaf2e90,Namespace:default,Attempt:0,}" Oct 31 01:36:24.660495 kubelet[1617]: E1031 01:36:24.660453 1617 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:24.688882 systemd-networkd[1082]: cali60e51b789ff: Link UP Oct 31 01:36:24.693022 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:36:24.693097 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Oct 31 01:36:24.693250 systemd-networkd[1082]: cali60e51b789ff: Gained carrier Oct 31 01:36:24.709126 env[1264]: 2025-10-31 01:36:24.502 [INFO][2832] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.142-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 70406af7-52bf-4acf-ae2a-a026fdaf2e90 1506 0 2025-10-31 01:36:23 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.124.142 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.142-k8s-nfs--server--provisioner--0-" Oct 31 01:36:24.709126 env[1264]: 2025-10-31 01:36:24.502 [INFO][2832] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.142-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:36:24.709126 env[1264]: 2025-10-31 01:36:24.568 [INFO][2847] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a" HandleID="k8s-pod-network.40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a" Workload="10.67.124.142-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:36:24.709126 env[1264]: 2025-10-31 01:36:24.568 [INFO][2847] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a" HandleID="k8s-pod-network.40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a" Workload="10.67.124.142-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5780), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.142", "pod":"nfs-server-provisioner-0", "timestamp":"2025-10-31 01:36:24.568376216 +0000 UTC"}, Hostname:"10.67.124.142", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:36:24.709126 env[1264]: 2025-10-31 01:36:24.568 [INFO][2847] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:36:24.709126 env[1264]: 2025-10-31 01:36:24.568 [INFO][2847] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:36:24.709126 env[1264]: 2025-10-31 01:36:24.568 [INFO][2847] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.142' Oct 31 01:36:24.709126 env[1264]: 2025-10-31 01:36:24.608 [INFO][2847] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a" host="10.67.124.142" Oct 31 01:36:24.709126 env[1264]: 2025-10-31 01:36:24.618 [INFO][2847] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.142" Oct 31 01:36:24.709126 env[1264]: 2025-10-31 01:36:24.644 [INFO][2847] ipam/ipam.go 511: Trying affinity for 192.168.47.0/26 host="10.67.124.142" Oct 31 01:36:24.709126 env[1264]: 2025-10-31 01:36:24.661 [INFO][2847] ipam/ipam.go 158: Attempting to load block cidr=192.168.47.0/26 host="10.67.124.142" Oct 31 01:36:24.709126 env[1264]: 2025-10-31 01:36:24.662 [INFO][2847] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.47.0/26 host="10.67.124.142" Oct 31 01:36:24.709126 env[1264]: 2025-10-31 01:36:24.662 [INFO][2847] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.47.0/26 handle="k8s-pod-network.40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a" host="10.67.124.142" Oct 31 01:36:24.709126 env[1264]: 2025-10-31 01:36:24.663 [INFO][2847] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a Oct 31 01:36:24.709126 env[1264]: 2025-10-31 01:36:24.672 [INFO][2847] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.47.0/26 handle="k8s-pod-network.40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a" host="10.67.124.142" Oct 31 01:36:24.709126 env[1264]: 2025-10-31 01:36:24.679 [INFO][2847] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.47.3/26] block=192.168.47.0/26 handle="k8s-pod-network.40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a" host="10.67.124.142" Oct 31 01:36:24.709126 env[1264]: 2025-10-31 01:36:24.679 [INFO][2847] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.47.3/26] handle="k8s-pod-network.40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a" host="10.67.124.142" Oct 31 01:36:24.709126 env[1264]: 2025-10-31 01:36:24.679 [INFO][2847] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:36:24.709126 env[1264]: 2025-10-31 01:36:24.679 [INFO][2847] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.47.3/26] IPv6=[] ContainerID="40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a" HandleID="k8s-pod-network.40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a" Workload="10.67.124.142-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:36:24.709688 env[1264]: 2025-10-31 01:36:24.680 [INFO][2832] cni-plugin/k8s.go 418: Populated endpoint ContainerID="40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.142-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.142-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"70406af7-52bf-4acf-ae2a-a026fdaf2e90", ResourceVersion:"1506", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 36, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.142", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.47.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:36:24.709688 env[1264]: 2025-10-31 01:36:24.680 [INFO][2832] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.47.3/32] ContainerID="40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.142-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:36:24.709688 env[1264]: 2025-10-31 01:36:24.680 [INFO][2832] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.142-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:36:24.709688 env[1264]: 2025-10-31 01:36:24.694 [INFO][2832] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.142-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:36:24.709816 env[1264]: 2025-10-31 01:36:24.695 [INFO][2832] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.142-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.142-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"70406af7-52bf-4acf-ae2a-a026fdaf2e90", ResourceVersion:"1506", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 36, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.142", ContainerID:"40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.47.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"da:62:f8:e8:8b:ea", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:36:24.709816 env[1264]: 2025-10-31 01:36:24.708 [INFO][2832] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.142-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:36:24.715811 kubelet[1617]: E1031 01:36:24.715775 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:24.719259 env[1264]: time="2025-10-31T01:36:24.719222711Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:36:24.719351 env[1264]: time="2025-10-31T01:36:24.719247772Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:36:24.719351 env[1264]: time="2025-10-31T01:36:24.719254916Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:36:24.719351 env[1264]: time="2025-10-31T01:36:24.719317677Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a pid=2870 runtime=io.containerd.runc.v2 Oct 31 01:36:24.736354 systemd[1]: Started cri-containerd-40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a.scope. Oct 31 01:36:24.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.749000 audit: BPF prog-id=109 op=LOAD Oct 31 01:36:24.750000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.750000 audit[2880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2870 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:24.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430636164323235353164616263663134343763393635336138356566 Oct 31 01:36:24.750000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.750000 audit[2880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2870 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:24.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430636164323235353164616263663134343763393635336138356566 Oct 31 01:36:24.751000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.751000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.751000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.751000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.751000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.751000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.751000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.751000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.751000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.751000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.751000 audit: BPF prog-id=110 op=LOAD Oct 31 01:36:24.751000 audit[2880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000238250 items=0 ppid=2870 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:24.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430636164323235353164616263663134343763393635336138356566 Oct 31 01:36:24.751000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.751000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.751000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.751000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.751000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.751000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.751000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.751000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.751000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.751000 audit: BPF prog-id=111 op=LOAD Oct 31 01:36:24.751000 audit[2880]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000238298 items=0 ppid=2870 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:24.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430636164323235353164616263663134343763393635336138356566 Oct 31 01:36:24.752000 audit: BPF prog-id=111 op=UNLOAD Oct 31 01:36:24.752000 audit: BPF prog-id=110 op=UNLOAD Oct 31 01:36:24.752000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.752000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.752000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.752000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.752000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.752000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.752000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.752000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.752000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.752000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:24.752000 audit: BPF prog-id=112 op=LOAD Oct 31 01:36:24.752000 audit[2880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002386a8 items=0 ppid=2870 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:24.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430636164323235353164616263663134343763393635336138356566 Oct 31 01:36:24.755531 systemd-resolved[1215]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:36:24.757000 audit[2900]: NETFILTER_CFG table=filter:75 family=2 entries=40 op=nft_register_chain pid=2900 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:36:24.757000 audit[2900]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffc24adbce0 a2=0 a3=7ffc24adbccc items=0 ppid=2367 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:24.757000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:36:24.787766 env[1264]: time="2025-10-31T01:36:24.787740283Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:70406af7-52bf-4acf-ae2a-a026fdaf2e90,Namespace:default,Attempt:0,} returns sandbox id \"40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a\"" Oct 31 01:36:24.788762 env[1264]: time="2025-10-31T01:36:24.788747446Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Oct 31 01:36:25.328468 systemd[1]: run-containerd-runc-k8s.io-40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a-runc.gKENhW.mount: Deactivated successfully. Oct 31 01:36:25.716034 kubelet[1617]: E1031 01:36:25.715951 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:26.215690 systemd-networkd[1082]: cali60e51b789ff: Gained IPv6LL Oct 31 01:36:26.717065 kubelet[1617]: E1031 01:36:26.717038 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:26.972227 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount868054386.mount: Deactivated successfully. Oct 31 01:36:27.718407 kubelet[1617]: E1031 01:36:27.718375 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:28.465109 env[1264]: time="2025-10-31T01:36:28.465070459Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:36:28.465950 env[1264]: time="2025-10-31T01:36:28.465930314Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:36:28.467699 env[1264]: time="2025-10-31T01:36:28.467682420Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:36:28.469116 env[1264]: time="2025-10-31T01:36:28.469097198Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:36:28.469474 env[1264]: time="2025-10-31T01:36:28.469454442Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Oct 31 01:36:28.472180 env[1264]: time="2025-10-31T01:36:28.472162374Z" level=info msg="CreateContainer within sandbox \"40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Oct 31 01:36:28.478741 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1311019270.mount: Deactivated successfully. Oct 31 01:36:28.483956 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount947517334.mount: Deactivated successfully. Oct 31 01:36:28.488481 env[1264]: time="2025-10-31T01:36:28.488454936Z" level=info msg="CreateContainer within sandbox \"40cad22551dabcf1447c9653a85ef76625f470f84d9325ff1a25a4a8dd76051a\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"9050eef6414ecfa2c8293f92bc5772f58df84ce9baa28ff491999e5d9a5ad05d\"" Oct 31 01:36:28.489007 env[1264]: time="2025-10-31T01:36:28.488988304Z" level=info msg="StartContainer for \"9050eef6414ecfa2c8293f92bc5772f58df84ce9baa28ff491999e5d9a5ad05d\"" Oct 31 01:36:28.503402 systemd[1]: Started cri-containerd-9050eef6414ecfa2c8293f92bc5772f58df84ce9baa28ff491999e5d9a5ad05d.scope. Oct 31 01:36:28.518591 kernel: kauditd_printk_skb: 119 callbacks suppressed Oct 31 01:36:28.518673 kernel: audit: type=1400 audit(1761874588.514:715): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.518694 kernel: audit: type=1400 audit(1761874588.514:716): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526859 kernel: audit: type=1400 audit(1761874588.514:717): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526940 kernel: audit: type=1400 audit(1761874588.514:718): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.530174 kernel: audit: type=1400 audit(1761874588.514:719): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.530246 kernel: audit: type=1400 audit(1761874588.514:720): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.534823 kernel: audit: type=1400 audit(1761874588.514:721): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.534890 kernel: audit: type=1400 audit(1761874588.514:722): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.537264 kernel: audit: type=1400 audit(1761874588.514:723): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.542233 kernel: audit: type=1400 audit(1761874588.517:724): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.517000 audit: BPF prog-id=113 op=LOAD Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2870 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:28.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930353065656636343134656366613263383239336639326263353737 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=2870 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:28.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930353065656636343134656366613263383239336639326263353737 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit: BPF prog-id=114 op=LOAD Oct 31 01:36:28.526000 audit[2914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000205e40 items=0 ppid=2870 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:28.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930353065656636343134656366613263383239336639326263353737 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit: BPF prog-id=115 op=LOAD Oct 31 01:36:28.526000 audit[2914]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000205e88 items=0 ppid=2870 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:28.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930353065656636343134656366613263383239336639326263353737 Oct 31 01:36:28.526000 audit: BPF prog-id=115 op=UNLOAD Oct 31 01:36:28.526000 audit: BPF prog-id=114 op=UNLOAD Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:28.526000 audit: BPF prog-id=116 op=LOAD Oct 31 01:36:28.526000 audit[2914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000240298 items=0 ppid=2870 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:28.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930353065656636343134656366613263383239336639326263353737 Oct 31 01:36:28.552676 env[1264]: time="2025-10-31T01:36:28.552640583Z" level=info msg="StartContainer for \"9050eef6414ecfa2c8293f92bc5772f58df84ce9baa28ff491999e5d9a5ad05d\" returns successfully" Oct 31 01:36:28.578000 audit[2942]: AVC avc: denied { search } for pid=2942 comm="rpcbind" name="crypto" dev="proc" ino=34172 scontext=system_u:system_r:svirt_lxc_net_t:s0:c130,c578 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 31 01:36:28.578000 audit[2942]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f1d0d1e90c0 a2=0 a3=0 items=0 ppid=2924 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c130,c578 key=(null) Oct 31 01:36:28.578000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Oct 31 01:36:28.603000 audit[2947]: AVC avc: denied { search } for pid=2947 comm="dbus-daemon" name="crypto" dev="proc" ino=34172 scontext=system_u:system_r:svirt_lxc_net_t:s0:c130,c578 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 31 01:36:28.603000 audit[2947]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f53b45440c0 a2=0 a3=0 items=0 ppid=2924 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c130,c578 key=(null) Oct 31 01:36:28.603000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Oct 31 01:36:28.606000 audit[2948]: AVC avc: denied { watch } for pid=2948 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=529703 scontext=system_u:system_r:svirt_lxc_net_t:s0:c130,c578 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c130,c578 tclass=dir permissive=0 Oct 31 01:36:28.606000 audit[2948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55877ed9c3b0 a2=2c8 a3=7fff57d3496c items=0 ppid=2924 pid=2948 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c130,c578 key=(null) Oct 31 01:36:28.606000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Oct 31 01:36:28.608000 audit[2949]: AVC avc: denied { read } for pid=2949 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=34197 scontext=system_u:system_r:svirt_lxc_net_t:s0:c130,c578 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Oct 31 01:36:28.608000 audit[2949]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f554dc83320 a1=80000 a2=d a3=7ffcfe940890 items=0 ppid=2924 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c130,c578 key=(null) Oct 31 01:36:28.608000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Oct 31 01:36:28.609000 audit[2949]: AVC avc: denied { search } for pid=2949 comm="ganesha.nfsd" name="crypto" dev="proc" ino=34172 scontext=system_u:system_r:svirt_lxc_net_t:s0:c130,c578 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 31 01:36:28.609000 audit[2949]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f554d1d70c0 a2=0 a3=0 items=0 ppid=2924 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c130,c578 key=(null) Oct 31 01:36:28.609000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Oct 31 01:36:28.719089 kubelet[1617]: E1031 01:36:28.718981 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:28.891970 kubelet[1617]: I1031 01:36:28.891932 1617 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.210320645 podStartE2EDuration="5.89191595s" podCreationTimestamp="2025-10-31 01:36:23 +0000 UTC" firstStartedPulling="2025-10-31 01:36:24.788611307 +0000 UTC m=+41.047950641" lastFinishedPulling="2025-10-31 01:36:28.470206613 +0000 UTC m=+44.729545946" observedRunningTime="2025-10-31 01:36:28.891479227 +0000 UTC m=+45.150818572" watchObservedRunningTime="2025-10-31 01:36:28.89191595 +0000 UTC m=+45.151255298" Oct 31 01:36:28.928000 audit[2967]: NETFILTER_CFG table=filter:76 family=2 entries=26 op=nft_register_rule pid=2967 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:36:28.928000 audit[2967]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc5ee66280 a2=0 a3=7ffc5ee6626c items=0 ppid=1932 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:28.928000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:36:28.932000 audit[2967]: NETFILTER_CFG table=nat:77 family=2 entries=104 op=nft_register_chain pid=2967 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:36:28.932000 audit[2967]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffc5ee66280 a2=0 a3=7ffc5ee6626c items=0 ppid=1932 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:28.932000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:36:29.720079 kubelet[1617]: E1031 01:36:29.720038 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:30.721186 kubelet[1617]: E1031 01:36:30.721162 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:31.722311 kubelet[1617]: E1031 01:36:31.722274 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:32.723130 kubelet[1617]: E1031 01:36:32.723100 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:32.791388 env[1264]: time="2025-10-31T01:36:32.791354156Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 01:36:33.132608 env[1264]: time="2025-10-31T01:36:33.132409771Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:36:33.133275 env[1264]: time="2025-10-31T01:36:33.133247863Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 01:36:33.133432 kubelet[1617]: E1031 01:36:33.133395 1617 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:36:33.133432 kubelet[1617]: E1031 01:36:33.133440 1617 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:36:33.133628 kubelet[1617]: E1031 01:36:33.133534 1617 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-74rvw,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-qdjck_calico-system(bbcb9b1c-ac58-4050-afb7-2be05d7754ef): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 01:36:33.136589 env[1264]: time="2025-10-31T01:36:33.136547814Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 01:36:33.478751 env[1264]: time="2025-10-31T01:36:33.478275706Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:36:33.479325 env[1264]: time="2025-10-31T01:36:33.479289114Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 01:36:33.479668 kubelet[1617]: E1031 01:36:33.479502 1617 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:36:33.479668 kubelet[1617]: E1031 01:36:33.479536 1617 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:36:33.479668 kubelet[1617]: E1031 01:36:33.479637 1617 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-74rvw,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-qdjck_calico-system(bbcb9b1c-ac58-4050-afb7-2be05d7754ef): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 01:36:33.481110 kubelet[1617]: E1031 01:36:33.481063 1617 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-qdjck" podUID="bbcb9b1c-ac58-4050-afb7-2be05d7754ef" Oct 31 01:36:33.724044 kubelet[1617]: E1031 01:36:33.724012 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:34.262593 systemd[1]: Created slice kubepods-besteffort-pod84c150a0_9f26_40ed_8ee9_990cc94f670a.slice. Oct 31 01:36:34.369692 kubelet[1617]: I1031 01:36:34.369664 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-9d9047ee-eefe-4fab-a360-890c0d10836f\" (UniqueName: \"kubernetes.io/nfs/84c150a0-9f26-40ed-8ee9-990cc94f670a-pvc-9d9047ee-eefe-4fab-a360-890c0d10836f\") pod \"test-pod-1\" (UID: \"84c150a0-9f26-40ed-8ee9-990cc94f670a\") " pod="default/test-pod-1" Oct 31 01:36:34.369692 kubelet[1617]: I1031 01:36:34.369691 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gmckp\" (UniqueName: \"kubernetes.io/projected/84c150a0-9f26-40ed-8ee9-990cc94f670a-kube-api-access-gmckp\") pod \"test-pod-1\" (UID: \"84c150a0-9f26-40ed-8ee9-990cc94f670a\") " pod="default/test-pod-1" Oct 31 01:36:34.529000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.532959 kernel: Failed to create system directory netfs Oct 31 01:36:34.533012 kernel: kauditd_printk_skb: 68 callbacks suppressed Oct 31 01:36:34.533036 kernel: audit: type=1400 audit(1761874594.529:740): avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.536985 kernel: Failed to create system directory netfs Oct 31 01:36:34.537051 kernel: audit: type=1400 audit(1761874594.529:740): avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.529000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.540767 kernel: Failed to create system directory netfs Oct 31 01:36:34.540812 kernel: audit: type=1400 audit(1761874594.529:740): avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.529000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.544671 kernel: Failed to create system directory netfs Oct 31 01:36:34.544788 kernel: audit: type=1400 audit(1761874594.529:740): avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.529000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.529000 audit[2980]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55bcad0315e0 a1=153bc a2=55bc9276e2b0 a3=5 items=0 ppid=1119 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:34.529000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 01:36:34.556465 kernel: audit: type=1300 audit(1761874594.529:740): arch=c000003e syscall=175 success=yes exit=0 a0=55bcad0315e0 a1=153bc a2=55bc9276e2b0 a3=5 items=0 ppid=1119 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:34.556514 kernel: audit: type=1327 audit(1761874594.529:740): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 01:36:34.557000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.564691 kernel: Failed to create system directory fscache Oct 31 01:36:34.564749 kernel: audit: type=1400 audit(1761874594.557:741): avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.564767 kernel: Failed to create system directory fscache Oct 31 01:36:34.564780 kernel: audit: type=1400 audit(1761874594.557:741): avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.557000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.568647 kernel: Failed to create system directory fscache Oct 31 01:36:34.568714 kernel: audit: type=1400 audit(1761874594.557:741): avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.557000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.571982 kernel: Failed to create system directory fscache Oct 31 01:36:34.572021 kernel: audit: type=1400 audit(1761874594.557:741): avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.557000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.574706 kernel: Failed to create system directory fscache Oct 31 01:36:34.557000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.557000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.575571 kernel: Failed to create system directory fscache Oct 31 01:36:34.557000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.557000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.577165 kernel: Failed to create system directory fscache Oct 31 01:36:34.577195 kernel: Failed to create system directory fscache Oct 31 01:36:34.577440 kernel: Failed to create system directory fscache Oct 31 01:36:34.557000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.557000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.557000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.579021 kernel: Failed to create system directory fscache Oct 31 01:36:34.579049 kernel: Failed to create system directory fscache Oct 31 01:36:34.579289 kernel: Failed to create system directory fscache Oct 31 01:36:34.557000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.557000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.557000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.580895 kernel: Failed to create system directory fscache Oct 31 01:36:34.580918 kernel: Failed to create system directory fscache Oct 31 01:36:34.557000 audit[2980]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55bcad2469c0 a1=4c0fc a2=55bc9276e2b0 a3=5 items=0 ppid=1119 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:34.557000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 01:36:34.582587 kernel: FS-Cache: Loaded Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.609108 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.609142 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.609157 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.609173 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.610949 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.610994 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.611012 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.612163 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.612199 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.612781 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.614001 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.614033 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.615856 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.615928 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.615951 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.617072 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.617099 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.618910 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.618949 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.618964 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.620138 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.620175 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.621975 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.622005 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.622019 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.623796 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.623824 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.623838 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.625022 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.625057 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.626848 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.626886 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.626907 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.628063 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.628091 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.628688 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.629920 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.629963 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.630579 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.631784 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.631810 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.633007 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.633036 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.634832 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.635492 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.635523 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.635550 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.636071 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.637878 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.637906 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.637919 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.639102 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.639152 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.640923 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.640953 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.640966 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.642156 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.642192 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.643968 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.644004 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.644020 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.645788 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.645820 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.645832 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.647012 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.647041 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.648840 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.648871 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.648889 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.650059 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.650084 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.652074 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.652101 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.652118 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.653887 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.653921 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.653939 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.655103 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.655130 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.656927 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.656954 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.656967 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.658158 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.658185 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.659976 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.660016 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.660033 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.661958 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.662002 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.662038 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.663047 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.663091 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.663728 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.664951 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.664997 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.666184 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.666231 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.668121 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.668188 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.668210 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.670027 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.670074 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.670098 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.671993 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.672034 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.672058 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.672605 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.673899 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.673944 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.675144 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.675176 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.675733 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.676959 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.677004 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.677582 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.678858 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.678900 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.680110 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.680147 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.682056 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.682087 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.682101 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.682660 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.683960 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.684000 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.598000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.685201 kernel: Failed to create system directory sunrpc Oct 31 01:36:34.692824 kernel: RPC: Registered named UNIX socket transport module. Oct 31 01:36:34.692907 kernel: RPC: Registered udp transport module. Oct 31 01:36:34.692927 kernel: RPC: Registered tcp transport module. Oct 31 01:36:34.692941 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Oct 31 01:36:34.598000 audit[2980]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55bcad292ad0 a1=1a8274 a2=55bc9276e2b0 a3=5 items=6 ppid=1119 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:34.598000 audit: CWD cwd="/" Oct 31 01:36:34.598000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:36:34.598000 audit: PATH item=1 name=(null) inode=34337 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:36:34.598000 audit: PATH item=2 name=(null) inode=34337 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:36:34.598000 audit: PATH item=3 name=(null) inode=34338 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:36:34.598000 audit: PATH item=4 name=(null) inode=34337 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:36:34.598000 audit: PATH item=5 name=(null) inode=34339 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:36:34.598000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 01:36:34.725077 kubelet[1617]: E1031 01:36:34.725018 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.733253 kernel: Failed to create system directory nfs Oct 31 01:36:34.733353 kernel: Failed to create system directory nfs Oct 31 01:36:34.733377 kernel: Failed to create system directory nfs Oct 31 01:36:34.733389 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.733718 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.736164 kernel: Failed to create system directory nfs Oct 31 01:36:34.736634 kernel: Failed to create system directory nfs Oct 31 01:36:34.736653 kernel: Failed to create system directory nfs Oct 31 01:36:34.736667 kernel: Failed to create system directory nfs Oct 31 01:36:34.736680 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.737160 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.738931 kernel: Failed to create system directory nfs Oct 31 01:36:34.738963 kernel: Failed to create system directory nfs Oct 31 01:36:34.738979 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.740087 kernel: Failed to create system directory nfs Oct 31 01:36:34.740112 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.742329 kernel: Failed to create system directory nfs Oct 31 01:36:34.742359 kernel: Failed to create system directory nfs Oct 31 01:36:34.742386 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.743159 kernel: Failed to create system directory nfs Oct 31 01:36:34.743194 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.744887 kernel: Failed to create system directory nfs Oct 31 01:36:34.744915 kernel: Failed to create system directory nfs Oct 31 01:36:34.744929 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.746057 kernel: Failed to create system directory nfs Oct 31 01:36:34.746084 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.747805 kernel: Failed to create system directory nfs Oct 31 01:36:34.747832 kernel: Failed to create system directory nfs Oct 31 01:36:34.747847 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.748979 kernel: Failed to create system directory nfs Oct 31 01:36:34.749004 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.750147 kernel: Failed to create system directory nfs Oct 31 01:36:34.750172 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.750746 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.751899 kernel: Failed to create system directory nfs Oct 31 01:36:34.751931 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.753056 kernel: Failed to create system directory nfs Oct 31 01:36:34.753080 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.754827 kernel: Failed to create system directory nfs Oct 31 01:36:34.754854 kernel: Failed to create system directory nfs Oct 31 01:36:34.754869 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.755987 kernel: Failed to create system directory nfs Oct 31 01:36:34.756018 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.757151 kernel: Failed to create system directory nfs Oct 31 01:36:34.757176 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.758907 kernel: Failed to create system directory nfs Oct 31 01:36:34.758934 kernel: Failed to create system directory nfs Oct 31 01:36:34.758948 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.760050 kernel: Failed to create system directory nfs Oct 31 01:36:34.760076 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.762006 kernel: Failed to create system directory nfs Oct 31 01:36:34.762032 kernel: Failed to create system directory nfs Oct 31 01:36:34.762046 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.763168 kernel: Failed to create system directory nfs Oct 31 01:36:34.763200 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.764940 kernel: Failed to create system directory nfs Oct 31 01:36:34.764970 kernel: Failed to create system directory nfs Oct 31 01:36:34.764992 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.766074 kernel: Failed to create system directory nfs Oct 31 01:36:34.766097 kernel: Failed to create system directory nfs Oct 31 01:36:34.720000 audit[2980]: AVC avc: denied { confidentiality } for pid=2980 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.720000 audit[2980]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55bcad4b3c10 a1=16eb2c a2=55bc9276e2b0 a3=5 items=0 ppid=1119 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:34.720000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 01:36:34.780631 kernel: FS-Cache: Netfs 'nfs' registered for caching Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.864172 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.864255 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.864279 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.864308 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.864326 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.864340 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.864366 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.864387 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.864403 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.864415 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.865860 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.865930 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.865949 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.867097 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.867740 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.867781 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.868979 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.869040 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.870818 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.870875 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.870893 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.872049 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.872083 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.873888 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.873940 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.873974 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.875128 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.875167 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.876950 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.877018 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.877060 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.878866 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.878922 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.878965 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.880081 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.880128 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.881930 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.881973 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.881989 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.882595 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.883769 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.883811 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.884988 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.885028 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.886815 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.886858 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.886873 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.888060 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.888097 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.889882 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.889927 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.889941 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.891096 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.891141 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.892941 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.892977 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.893643 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.895115 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.895159 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.895180 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.897089 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.897131 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.897145 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.898911 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.898945 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.898973 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.900141 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.900182 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.901995 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.902037 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.902053 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.903821 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.903866 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.903882 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.905029 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.905067 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.906842 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.906880 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.906901 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.908043 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.908077 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.909884 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.909928 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.909944 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.911109 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.911152 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.912932 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.912975 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.912991 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.914917 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.914961 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.914977 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:34.916149 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.916240 kernel: Failed to create system directory nfs4 Oct 31 01:36:34.848000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.009893 kernel: NFS: Registering the id_resolver key type Oct 31 01:36:35.009959 kernel: Key type id_resolver registered Oct 31 01:36:35.009976 kernel: Key type id_legacy registered Oct 31 01:36:34.848000 audit[2987]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f8399dc8010 a1=2095c4 a2=55aadf6da2b0 a3=5 items=0 ppid=1119 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:34.848000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.081860 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.081900 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.082605 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.083940 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.083967 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.084626 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.085953 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.085977 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.086654 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.087977 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.088009 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.088682 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.090026 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.090052 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.090714 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.092047 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.092072 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.092748 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.094086 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.094114 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.094775 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.096093 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.096117 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.096780 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.098091 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.098117 kernel: Failed to create system directory rpcgss Oct 31 01:36:35.077000 audit[2988]: AVC avc: denied { confidentiality } for pid=2988 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:36:35.077000 audit[2988]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fcee3317010 a1=70bf4 a2=5606fb5432b0 a3=5 items=0 ppid=1119 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:35.077000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Oct 31 01:36:35.165653 nfsidmap[2997]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Oct 31 01:36:35.169542 nfsidmap[2998]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Oct 31 01:36:35.176000 audit[1379]: AVC avc: denied { watch_reads } for pid=1379 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2456 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:36:35.176000 audit[1379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d2a1ba8aa0 a2=10 a3=7f1b37e97d003f5b items=0 ppid=1 pid=1379 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:35.176000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 31 01:36:35.176000 audit[1379]: AVC avc: denied { watch_reads } for pid=1379 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2456 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:36:35.176000 audit[1379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d2a1ba8aa0 a2=10 a3=7f1b37e97d003f5b items=0 ppid=1 pid=1379 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:35.176000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 31 01:36:35.176000 audit[1379]: AVC avc: denied { watch_reads } for pid=1379 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2456 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:36:35.176000 audit[1379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d2a1ba8aa0 a2=10 a3=7f1b37e97d003f5b items=0 ppid=1 pid=1379 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:35.176000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 31 01:36:35.177000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2456 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:36:35.177000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2456 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:36:35.177000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2456 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:36:35.465005 env[1264]: time="2025-10-31T01:36:35.464881080Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:84c150a0-9f26-40ed-8ee9-990cc94f670a,Namespace:default,Attempt:0,}" Oct 31 01:36:35.607655 systemd-networkd[1082]: cali5ec59c6bf6e: Link UP Oct 31 01:36:35.610825 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:36:35.610892 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Oct 31 01:36:35.611013 systemd-networkd[1082]: cali5ec59c6bf6e: Gained carrier Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.538 [INFO][2999] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.142-k8s-test--pod--1-eth0 default 84c150a0-9f26-40ed-8ee9-990cc94f670a 1576 0 2025-10-31 01:36:25 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.142 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.142-k8s-test--pod--1-" Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.538 [INFO][2999] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.142-k8s-test--pod--1-eth0" Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.561 [INFO][3013] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623" HandleID="k8s-pod-network.a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623" Workload="10.67.124.142-k8s-test--pod--1-eth0" Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.562 [INFO][3013] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623" HandleID="k8s-pod-network.a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623" Workload="10.67.124.142-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5180), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.142", "pod":"test-pod-1", "timestamp":"2025-10-31 01:36:35.56188951 +0000 UTC"}, Hostname:"10.67.124.142", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.562 [INFO][3013] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.562 [INFO][3013] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.562 [INFO][3013] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.142' Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.569 [INFO][3013] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623" host="10.67.124.142" Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.575 [INFO][3013] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.142" Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.579 [INFO][3013] ipam/ipam.go 511: Trying affinity for 192.168.47.0/26 host="10.67.124.142" Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.583 [INFO][3013] ipam/ipam.go 158: Attempting to load block cidr=192.168.47.0/26 host="10.67.124.142" Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.585 [INFO][3013] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.47.0/26 host="10.67.124.142" Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.585 [INFO][3013] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.47.0/26 handle="k8s-pod-network.a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623" host="10.67.124.142" Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.588 [INFO][3013] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623 Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.592 [INFO][3013] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.47.0/26 handle="k8s-pod-network.a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623" host="10.67.124.142" Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.598 [INFO][3013] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.47.4/26] block=192.168.47.0/26 handle="k8s-pod-network.a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623" host="10.67.124.142" Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.598 [INFO][3013] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.47.4/26] handle="k8s-pod-network.a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623" host="10.67.124.142" Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.598 [INFO][3013] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.598 [INFO][3013] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.47.4/26] IPv6=[] ContainerID="a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623" HandleID="k8s-pod-network.a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623" Workload="10.67.124.142-k8s-test--pod--1-eth0" Oct 31 01:36:35.618643 env[1264]: 2025-10-31 01:36:35.599 [INFO][2999] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.142-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.142-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"84c150a0-9f26-40ed-8ee9-990cc94f670a", ResourceVersion:"1576", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 36, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.142", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.47.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:36:35.619237 env[1264]: 2025-10-31 01:36:35.600 [INFO][2999] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.47.4/32] ContainerID="a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.142-k8s-test--pod--1-eth0" Oct 31 01:36:35.619237 env[1264]: 2025-10-31 01:36:35.600 [INFO][2999] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.142-k8s-test--pod--1-eth0" Oct 31 01:36:35.619237 env[1264]: 2025-10-31 01:36:35.611 [INFO][2999] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.142-k8s-test--pod--1-eth0" Oct 31 01:36:35.619237 env[1264]: 2025-10-31 01:36:35.611 [INFO][2999] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.142-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.142-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"84c150a0-9f26-40ed-8ee9-990cc94f670a", ResourceVersion:"1576", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 36, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.142", ContainerID:"a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.47.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"d2:f9:ab:c4:6b:00", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:36:35.619237 env[1264]: 2025-10-31 01:36:35.616 [INFO][2999] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.142-k8s-test--pod--1-eth0" Oct 31 01:36:35.630198 env[1264]: time="2025-10-31T01:36:35.629851197Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:36:35.630198 env[1264]: time="2025-10-31T01:36:35.629911467Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:36:35.630198 env[1264]: time="2025-10-31T01:36:35.629936814Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:36:35.630198 env[1264]: time="2025-10-31T01:36:35.630076841Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623 pid=3036 runtime=io.containerd.runc.v2 Oct 31 01:36:35.635000 audit[3046]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=3046 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:36:35.635000 audit[3046]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd0c6fee00 a2=0 a3=7ffd0c6fedec items=0 ppid=2367 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:35.635000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:36:35.650613 systemd[1]: Started cri-containerd-a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623.scope. Oct 31 01:36:35.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit: BPF prog-id=117 op=LOAD Oct 31 01:36:35.673000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[3047]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3036 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:35.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134316539393336346431623064643339396562313862613963396364 Oct 31 01:36:35.673000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[3047]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3036 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:35.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134316539393336346431623064643339396562313862613963396364 Oct 31 01:36:35.673000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.673000 audit: BPF prog-id=118 op=LOAD Oct 31 01:36:35.673000 audit[3047]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000358700 items=0 ppid=3036 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:35.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134316539393336346431623064643339396562313862613963396364 Oct 31 01:36:35.674000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.674000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.674000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.674000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.674000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.674000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.674000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.674000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.674000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.674000 audit: BPF prog-id=119 op=LOAD Oct 31 01:36:35.674000 audit[3047]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000358748 items=0 ppid=3036 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:35.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134316539393336346431623064643339396562313862613963396364 Oct 31 01:36:35.675000 audit: BPF prog-id=119 op=UNLOAD Oct 31 01:36:35.675000 audit: BPF prog-id=118 op=UNLOAD Oct 31 01:36:35.675000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.675000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.675000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.675000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.675000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.675000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.675000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.675000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.675000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.675000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:35.675000 audit: BPF prog-id=120 op=LOAD Oct 31 01:36:35.675000 audit[3047]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000358b58 items=0 ppid=3036 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:35.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134316539393336346431623064643339396562313862613963396364 Oct 31 01:36:35.677110 systemd-resolved[1215]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:36:35.714822 env[1264]: time="2025-10-31T01:36:35.714789763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:84c150a0-9f26-40ed-8ee9-990cc94f670a,Namespace:default,Attempt:0,} returns sandbox id \"a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623\"" Oct 31 01:36:35.715930 env[1264]: time="2025-10-31T01:36:35.715804841Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 31 01:36:35.725552 kubelet[1617]: E1031 01:36:35.725495 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:36.087927 env[1264]: time="2025-10-31T01:36:36.087880062Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:36:36.088907 env[1264]: time="2025-10-31T01:36:36.088888296Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:36:36.090264 env[1264]: time="2025-10-31T01:36:36.090243033Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:36:36.091634 env[1264]: time="2025-10-31T01:36:36.091612565Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:36:36.092148 env[1264]: time="2025-10-31T01:36:36.092127114Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9\"" Oct 31 01:36:36.095846 env[1264]: time="2025-10-31T01:36:36.095818409Z" level=info msg="CreateContainer within sandbox \"a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623\" for container &ContainerMetadata{Name:test,Attempt:0,}" Oct 31 01:36:36.103100 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount353414002.mount: Deactivated successfully. Oct 31 01:36:36.108976 env[1264]: time="2025-10-31T01:36:36.108929942Z" level=info msg="CreateContainer within sandbox \"a41e99364d1b0dd399eb18ba9c9cdeaa3c178d4ccf08476aa48a316a25fa7623\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"5339ce53ee2b79290c8f971fe8b958a42ca51794e8ac204b42bc436d2f53b32c\"" Oct 31 01:36:36.109595 env[1264]: time="2025-10-31T01:36:36.109569061Z" level=info msg="StartContainer for \"5339ce53ee2b79290c8f971fe8b958a42ca51794e8ac204b42bc436d2f53b32c\"" Oct 31 01:36:36.122620 systemd[1]: Started cri-containerd-5339ce53ee2b79290c8f971fe8b958a42ca51794e8ac204b42bc436d2f53b32c.scope. Oct 31 01:36:36.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.136000 audit: BPF prog-id=121 op=LOAD Oct 31 01:36:36.137000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.137000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3036 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:36.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533333963653533656532623739323930633866393731666538623935 Oct 31 01:36:36.138000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.138000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3036 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:36.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533333963653533656532623739323930633866393731666538623935 Oct 31 01:36:36.138000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.138000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.138000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.138000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.138000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.138000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.138000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.138000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.138000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.138000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.138000 audit: BPF prog-id=122 op=LOAD Oct 31 01:36:36.138000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003da0d0 items=0 ppid=3036 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:36.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533333963653533656532623739323930633866393731666538623935 Oct 31 01:36:36.139000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.139000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.139000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.139000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.139000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.139000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.139000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.139000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.139000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.139000 audit: BPF prog-id=123 op=LOAD Oct 31 01:36:36.139000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003da118 items=0 ppid=3036 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:36.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533333963653533656532623739323930633866393731666538623935 Oct 31 01:36:36.139000 audit: BPF prog-id=123 op=UNLOAD Oct 31 01:36:36.139000 audit: BPF prog-id=122 op=UNLOAD Oct 31 01:36:36.139000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.139000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.139000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.139000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.139000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.139000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.139000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.139000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.139000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.139000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:36:36.139000 audit: BPF prog-id=124 op=LOAD Oct 31 01:36:36.139000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003da528 items=0 ppid=3036 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:36.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533333963653533656532623739323930633866393731666538623935 Oct 31 01:36:36.154756 env[1264]: time="2025-10-31T01:36:36.154679947Z" level=info msg="StartContainer for \"5339ce53ee2b79290c8f971fe8b958a42ca51794e8ac204b42bc436d2f53b32c\" returns successfully" Oct 31 01:36:36.726020 kubelet[1617]: E1031 01:36:36.725963 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:36.775697 systemd-networkd[1082]: cali5ec59c6bf6e: Gained IPv6LL Oct 31 01:36:36.921424 kubelet[1617]: I1031 01:36:36.921386 1617 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=11.544044891 podStartE2EDuration="11.92137553s" podCreationTimestamp="2025-10-31 01:36:25 +0000 UTC" firstStartedPulling="2025-10-31 01:36:35.715623491 +0000 UTC m=+51.974962835" lastFinishedPulling="2025-10-31 01:36:36.092954137 +0000 UTC m=+52.352293474" observedRunningTime="2025-10-31 01:36:36.921343116 +0000 UTC m=+53.180682456" watchObservedRunningTime="2025-10-31 01:36:36.92137553 +0000 UTC m=+53.180714870" Oct 31 01:36:37.727030 kubelet[1617]: E1031 01:36:37.726921 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:38.727700 kubelet[1617]: E1031 01:36:38.727663 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:38.869798 systemd[1]: run-containerd-runc-k8s.io-a281ac44ebe199e2fd3303dffbb2c4e3bc04ff0a6b44452644eb276fd73b82aa-runc.yZKBLl.mount: Deactivated successfully. Oct 31 01:36:39.728387 kubelet[1617]: E1031 01:36:39.728329 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:40.729188 kubelet[1617]: E1031 01:36:40.729144 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:36:41.730303 kubelet[1617]: E1031 01:36:41.730250 1617 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"