Oct 31 01:32:19.699754 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Oct 30 23:32:41 -00 2025 Oct 31 01:32:19.699770 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 01:32:19.699776 kernel: Disabled fast string operations Oct 31 01:32:19.699780 kernel: BIOS-provided physical RAM map: Oct 31 01:32:19.699784 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Oct 31 01:32:19.699788 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Oct 31 01:32:19.699794 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Oct 31 01:32:19.699798 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Oct 31 01:32:19.699802 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Oct 31 01:32:19.699806 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Oct 31 01:32:19.699810 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Oct 31 01:32:19.699814 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Oct 31 01:32:19.699818 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Oct 31 01:32:19.699822 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Oct 31 01:32:19.699828 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Oct 31 01:32:19.699833 kernel: NX (Execute Disable) protection: active Oct 31 01:32:19.699837 kernel: SMBIOS 2.7 present. Oct 31 01:32:19.699842 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Oct 31 01:32:19.699846 kernel: vmware: hypercall mode: 0x00 Oct 31 01:32:19.699851 kernel: Hypervisor detected: VMware Oct 31 01:32:19.699856 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Oct 31 01:32:19.699860 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Oct 31 01:32:19.699865 kernel: vmware: using clock offset of 10244607364 ns Oct 31 01:32:19.699870 kernel: tsc: Detected 3408.000 MHz processor Oct 31 01:32:19.699874 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 31 01:32:19.699880 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 31 01:32:19.699885 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Oct 31 01:32:19.699889 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 31 01:32:19.699894 kernel: total RAM covered: 3072M Oct 31 01:32:19.699899 kernel: Found optimal setting for mtrr clean up Oct 31 01:32:19.699905 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Oct 31 01:32:19.699909 kernel: Using GB pages for direct mapping Oct 31 01:32:19.699914 kernel: ACPI: Early table checksum verification disabled Oct 31 01:32:19.699918 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Oct 31 01:32:19.699923 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Oct 31 01:32:19.699927 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Oct 31 01:32:19.699932 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Oct 31 01:32:19.699936 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Oct 31 01:32:19.699941 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Oct 31 01:32:19.699947 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Oct 31 01:32:19.699955 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Oct 31 01:32:19.699962 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Oct 31 01:32:19.699975 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Oct 31 01:32:19.699982 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Oct 31 01:32:19.699992 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Oct 31 01:32:19.699999 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Oct 31 01:32:19.700007 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Oct 31 01:32:19.700014 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Oct 31 01:32:19.700021 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Oct 31 01:32:19.700028 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Oct 31 01:32:19.700035 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Oct 31 01:32:19.700043 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Oct 31 01:32:19.700051 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Oct 31 01:32:19.700060 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Oct 31 01:32:19.700067 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Oct 31 01:32:19.700075 kernel: system APIC only can use physical flat Oct 31 01:32:19.700082 kernel: Setting APIC routing to physical flat. Oct 31 01:32:19.700089 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 31 01:32:19.700096 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Oct 31 01:32:19.700103 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Oct 31 01:32:19.700110 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Oct 31 01:32:19.700118 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Oct 31 01:32:19.700127 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Oct 31 01:32:19.700135 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Oct 31 01:32:19.700143 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Oct 31 01:32:19.700150 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Oct 31 01:32:19.700157 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Oct 31 01:32:19.700165 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Oct 31 01:32:19.700172 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Oct 31 01:32:19.700179 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Oct 31 01:32:19.700188 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Oct 31 01:32:19.700196 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Oct 31 01:32:19.700206 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Oct 31 01:32:19.700215 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Oct 31 01:32:19.700223 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Oct 31 01:32:19.700231 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Oct 31 01:32:19.700239 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Oct 31 01:32:19.700246 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Oct 31 01:32:19.700254 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Oct 31 01:32:19.700262 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Oct 31 01:32:19.700270 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Oct 31 01:32:19.700278 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Oct 31 01:32:19.700288 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Oct 31 01:32:19.700295 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Oct 31 01:32:19.700302 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Oct 31 01:32:19.700310 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Oct 31 01:32:19.700318 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Oct 31 01:32:19.700326 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Oct 31 01:32:19.700334 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Oct 31 01:32:19.700341 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Oct 31 01:32:19.700349 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Oct 31 01:32:19.700356 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Oct 31 01:32:19.700366 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Oct 31 01:32:19.700392 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Oct 31 01:32:19.700400 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Oct 31 01:32:19.700409 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Oct 31 01:32:19.700417 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Oct 31 01:32:19.700425 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Oct 31 01:32:19.700434 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Oct 31 01:32:19.700442 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Oct 31 01:32:19.700451 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Oct 31 01:32:19.700458 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Oct 31 01:32:19.700469 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Oct 31 01:32:19.700477 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Oct 31 01:32:19.700485 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Oct 31 01:32:19.700494 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Oct 31 01:32:19.700502 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Oct 31 01:32:19.700511 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Oct 31 01:32:19.700518 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Oct 31 01:32:19.700526 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Oct 31 01:32:19.700533 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Oct 31 01:32:19.700541 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Oct 31 01:32:19.700551 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Oct 31 01:32:19.700560 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Oct 31 01:32:19.700568 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Oct 31 01:32:19.700577 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Oct 31 01:32:19.700584 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Oct 31 01:32:19.700593 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Oct 31 01:32:19.700608 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Oct 31 01:32:19.700618 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Oct 31 01:32:19.700631 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Oct 31 01:32:19.700640 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Oct 31 01:32:19.700650 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Oct 31 01:32:19.700661 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Oct 31 01:32:19.700669 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Oct 31 01:32:19.700678 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Oct 31 01:32:19.700687 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Oct 31 01:32:19.700696 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Oct 31 01:32:19.700704 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Oct 31 01:32:19.700713 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Oct 31 01:32:19.700723 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Oct 31 01:32:19.700732 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Oct 31 01:32:19.700741 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Oct 31 01:32:19.700750 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Oct 31 01:32:19.700759 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Oct 31 01:32:19.700768 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Oct 31 01:32:19.700777 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Oct 31 01:32:19.700786 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Oct 31 01:32:19.700794 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Oct 31 01:32:19.700804 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Oct 31 01:32:19.700814 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Oct 31 01:32:19.700823 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Oct 31 01:32:19.700832 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Oct 31 01:32:19.700841 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Oct 31 01:32:19.700850 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Oct 31 01:32:19.700859 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Oct 31 01:32:19.700868 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Oct 31 01:32:19.700877 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Oct 31 01:32:19.700885 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Oct 31 01:32:19.700895 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Oct 31 01:32:19.700904 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Oct 31 01:32:19.700913 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Oct 31 01:32:19.700922 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Oct 31 01:32:19.700931 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Oct 31 01:32:19.700939 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Oct 31 01:32:19.700947 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Oct 31 01:32:19.700956 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Oct 31 01:32:19.700964 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Oct 31 01:32:19.700973 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Oct 31 01:32:19.700984 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Oct 31 01:32:19.700993 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Oct 31 01:32:19.701002 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Oct 31 01:32:19.701011 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Oct 31 01:32:19.701020 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Oct 31 01:32:19.701029 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Oct 31 01:32:19.701038 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Oct 31 01:32:19.701047 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Oct 31 01:32:19.701055 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Oct 31 01:32:19.701063 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Oct 31 01:32:19.701073 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Oct 31 01:32:19.701081 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Oct 31 01:32:19.701090 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Oct 31 01:32:19.701100 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Oct 31 01:32:19.701108 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Oct 31 01:32:19.701117 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Oct 31 01:32:19.701125 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Oct 31 01:32:19.701134 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Oct 31 01:32:19.701143 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Oct 31 01:32:19.701151 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Oct 31 01:32:19.701162 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Oct 31 01:32:19.701171 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Oct 31 01:32:19.701180 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Oct 31 01:32:19.701189 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Oct 31 01:32:19.701198 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Oct 31 01:32:19.701207 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Oct 31 01:32:19.701216 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Oct 31 01:32:19.701225 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Oct 31 01:32:19.701234 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Oct 31 01:32:19.701243 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Oct 31 01:32:19.701254 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Oct 31 01:32:19.701264 kernel: Zone ranges: Oct 31 01:32:19.701273 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 31 01:32:19.701282 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Oct 31 01:32:19.701291 kernel: Normal empty Oct 31 01:32:19.701301 kernel: Movable zone start for each node Oct 31 01:32:19.701310 kernel: Early memory node ranges Oct 31 01:32:19.701319 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Oct 31 01:32:19.701328 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Oct 31 01:32:19.701339 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Oct 31 01:32:19.701348 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Oct 31 01:32:19.701357 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 31 01:32:19.701366 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Oct 31 01:32:19.701385 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Oct 31 01:32:19.701395 kernel: ACPI: PM-Timer IO Port: 0x1008 Oct 31 01:32:19.701404 kernel: system APIC only can use physical flat Oct 31 01:32:19.701412 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Oct 31 01:32:19.701421 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Oct 31 01:32:19.701433 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Oct 31 01:32:19.701442 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Oct 31 01:32:19.701451 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Oct 31 01:32:19.701460 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Oct 31 01:32:19.701469 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Oct 31 01:32:19.701478 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Oct 31 01:32:19.701487 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Oct 31 01:32:19.701495 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Oct 31 01:32:19.701504 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Oct 31 01:32:19.701512 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Oct 31 01:32:19.701523 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Oct 31 01:32:19.701531 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Oct 31 01:32:19.701539 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Oct 31 01:32:19.701548 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Oct 31 01:32:19.701557 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Oct 31 01:32:19.701566 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Oct 31 01:32:19.701575 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Oct 31 01:32:19.701584 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Oct 31 01:32:19.701593 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Oct 31 01:32:19.701603 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Oct 31 01:32:19.701611 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Oct 31 01:32:19.701620 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Oct 31 01:32:19.701628 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Oct 31 01:32:19.701634 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Oct 31 01:32:19.701639 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Oct 31 01:32:19.701644 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Oct 31 01:32:19.701650 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Oct 31 01:32:19.701655 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Oct 31 01:32:19.701660 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Oct 31 01:32:19.701666 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Oct 31 01:32:19.701672 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Oct 31 01:32:19.701677 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Oct 31 01:32:19.701682 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Oct 31 01:32:19.701687 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Oct 31 01:32:19.701693 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Oct 31 01:32:19.701698 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Oct 31 01:32:19.701703 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Oct 31 01:32:19.701708 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Oct 31 01:32:19.701714 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Oct 31 01:32:19.701720 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Oct 31 01:32:19.701725 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Oct 31 01:32:19.701730 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Oct 31 01:32:19.701735 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Oct 31 01:32:19.701740 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Oct 31 01:32:19.701745 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Oct 31 01:32:19.701751 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Oct 31 01:32:19.701756 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Oct 31 01:32:19.701761 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Oct 31 01:32:19.701767 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Oct 31 01:32:19.701772 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Oct 31 01:32:19.701777 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Oct 31 01:32:19.701783 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Oct 31 01:32:19.701788 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Oct 31 01:32:19.701793 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Oct 31 01:32:19.701798 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Oct 31 01:32:19.701804 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Oct 31 01:32:19.701809 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Oct 31 01:32:19.701815 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Oct 31 01:32:19.701820 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Oct 31 01:32:19.701826 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Oct 31 01:32:19.701831 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Oct 31 01:32:19.701836 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Oct 31 01:32:19.701842 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Oct 31 01:32:19.701847 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Oct 31 01:32:19.701852 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Oct 31 01:32:19.701857 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Oct 31 01:32:19.701862 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Oct 31 01:32:19.701868 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Oct 31 01:32:19.701874 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Oct 31 01:32:19.701879 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Oct 31 01:32:19.701884 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Oct 31 01:32:19.701890 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Oct 31 01:32:19.701895 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Oct 31 01:32:19.701900 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Oct 31 01:32:19.701905 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Oct 31 01:32:19.701910 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Oct 31 01:32:19.701917 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Oct 31 01:32:19.701922 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Oct 31 01:32:19.701927 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Oct 31 01:32:19.701932 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Oct 31 01:32:19.701937 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Oct 31 01:32:19.701942 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Oct 31 01:32:19.701947 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Oct 31 01:32:19.701952 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Oct 31 01:32:19.701957 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Oct 31 01:32:19.701963 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Oct 31 01:32:19.701968 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Oct 31 01:32:19.701974 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Oct 31 01:32:19.701979 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Oct 31 01:32:19.701984 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Oct 31 01:32:19.701989 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Oct 31 01:32:19.701994 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Oct 31 01:32:19.701999 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Oct 31 01:32:19.702004 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Oct 31 01:32:19.702009 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Oct 31 01:32:19.702016 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Oct 31 01:32:19.702021 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Oct 31 01:32:19.702026 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Oct 31 01:32:19.702031 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Oct 31 01:32:19.702037 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Oct 31 01:32:19.702042 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Oct 31 01:32:19.702047 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Oct 31 01:32:19.702052 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Oct 31 01:32:19.702058 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Oct 31 01:32:19.702064 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Oct 31 01:32:19.702069 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Oct 31 01:32:19.702074 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Oct 31 01:32:19.702079 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Oct 31 01:32:19.702085 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Oct 31 01:32:19.702090 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Oct 31 01:32:19.702095 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Oct 31 01:32:19.702100 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Oct 31 01:32:19.702105 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Oct 31 01:32:19.702111 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Oct 31 01:32:19.702117 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Oct 31 01:32:19.702122 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Oct 31 01:32:19.702127 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Oct 31 01:32:19.702132 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Oct 31 01:32:19.702137 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Oct 31 01:32:19.702143 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Oct 31 01:32:19.702148 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Oct 31 01:32:19.702153 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Oct 31 01:32:19.702158 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Oct 31 01:32:19.702164 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Oct 31 01:32:19.702170 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Oct 31 01:32:19.702175 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Oct 31 01:32:19.702180 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Oct 31 01:32:19.702186 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Oct 31 01:32:19.702191 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 31 01:32:19.702196 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Oct 31 01:32:19.702201 kernel: TSC deadline timer available Oct 31 01:32:19.702207 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Oct 31 01:32:19.702212 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Oct 31 01:32:19.702218 kernel: Booting paravirtualized kernel on VMware hypervisor Oct 31 01:32:19.702224 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 31 01:32:19.702229 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Oct 31 01:32:19.702235 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Oct 31 01:32:19.702240 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Oct 31 01:32:19.702245 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Oct 31 01:32:19.702250 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Oct 31 01:32:19.702255 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Oct 31 01:32:19.702261 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Oct 31 01:32:19.702266 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Oct 31 01:32:19.702271 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Oct 31 01:32:19.702277 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Oct 31 01:32:19.702289 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Oct 31 01:32:19.702296 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Oct 31 01:32:19.702301 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Oct 31 01:32:19.702307 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Oct 31 01:32:19.702312 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Oct 31 01:32:19.702319 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Oct 31 01:32:19.702324 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Oct 31 01:32:19.702330 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Oct 31 01:32:19.702335 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Oct 31 01:32:19.702341 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Oct 31 01:32:19.702347 kernel: Policy zone: DMA32 Oct 31 01:32:19.702353 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 01:32:19.702359 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 31 01:32:19.702365 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Oct 31 01:32:19.702406 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Oct 31 01:32:19.702414 kernel: printk: log_buf_len min size: 262144 bytes Oct 31 01:32:19.702419 kernel: printk: log_buf_len: 1048576 bytes Oct 31 01:32:19.702425 kernel: printk: early log buf free: 239728(91%) Oct 31 01:32:19.702431 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 31 01:32:19.702438 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 31 01:32:19.702444 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 31 01:32:19.702450 kernel: Memory: 1940392K/2096628K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 155976K reserved, 0K cma-reserved) Oct 31 01:32:19.702456 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Oct 31 01:32:19.702462 kernel: ftrace: allocating 34614 entries in 136 pages Oct 31 01:32:19.702467 kernel: ftrace: allocated 136 pages with 2 groups Oct 31 01:32:19.702474 kernel: rcu: Hierarchical RCU implementation. Oct 31 01:32:19.702480 kernel: rcu: RCU event tracing is enabled. Oct 31 01:32:19.702486 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Oct 31 01:32:19.702492 kernel: Rude variant of Tasks RCU enabled. Oct 31 01:32:19.702498 kernel: Tracing variant of Tasks RCU enabled. Oct 31 01:32:19.702503 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 31 01:32:19.702509 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Oct 31 01:32:19.702514 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Oct 31 01:32:19.702520 kernel: random: crng init done Oct 31 01:32:19.702525 kernel: Console: colour VGA+ 80x25 Oct 31 01:32:19.702531 kernel: printk: console [tty0] enabled Oct 31 01:32:19.702537 kernel: printk: console [ttyS0] enabled Oct 31 01:32:19.702543 kernel: ACPI: Core revision 20210730 Oct 31 01:32:19.702549 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Oct 31 01:32:19.702555 kernel: APIC: Switch to symmetric I/O mode setup Oct 31 01:32:19.702560 kernel: x2apic enabled Oct 31 01:32:19.702566 kernel: Switched APIC routing to physical x2apic. Oct 31 01:32:19.702572 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Oct 31 01:32:19.702578 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Oct 31 01:32:19.702584 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Oct 31 01:32:19.702589 kernel: Disabled fast string operations Oct 31 01:32:19.702596 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 31 01:32:19.702602 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 Oct 31 01:32:19.702607 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 31 01:32:19.702613 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Oct 31 01:32:19.702619 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Oct 31 01:32:19.702625 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Oct 31 01:32:19.702630 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Oct 31 01:32:19.702636 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Oct 31 01:32:19.702643 kernel: RETBleed: Mitigation: Enhanced IBRS Oct 31 01:32:19.702648 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 31 01:32:19.702654 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 31 01:32:19.702660 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 31 01:32:19.702665 kernel: SRBDS: Unknown: Dependent on hypervisor status Oct 31 01:32:19.702671 kernel: GDS: Unknown: Dependent on hypervisor status Oct 31 01:32:19.702677 kernel: active return thunk: its_return_thunk Oct 31 01:32:19.702682 kernel: ITS: Mitigation: Aligned branch/return thunks Oct 31 01:32:19.702688 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 31 01:32:19.702695 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 31 01:32:19.702700 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 31 01:32:19.702706 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 31 01:32:19.702712 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Oct 31 01:32:19.702718 kernel: Freeing SMP alternatives memory: 32K Oct 31 01:32:19.702723 kernel: pid_max: default: 131072 minimum: 1024 Oct 31 01:32:19.702729 kernel: LSM: Security Framework initializing Oct 31 01:32:19.702734 kernel: SELinux: Initializing. Oct 31 01:32:19.702740 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 31 01:32:19.702747 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 31 01:32:19.702752 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Oct 31 01:32:19.702758 kernel: Performance Events: Skylake events, core PMU driver. Oct 31 01:32:19.702763 kernel: core: CPUID marked event: 'cpu cycles' unavailable Oct 31 01:32:19.702769 kernel: core: CPUID marked event: 'instructions' unavailable Oct 31 01:32:19.702775 kernel: core: CPUID marked event: 'bus cycles' unavailable Oct 31 01:32:19.702780 kernel: core: CPUID marked event: 'cache references' unavailable Oct 31 01:32:19.702785 kernel: core: CPUID marked event: 'cache misses' unavailable Oct 31 01:32:19.702791 kernel: core: CPUID marked event: 'branch instructions' unavailable Oct 31 01:32:19.702797 kernel: core: CPUID marked event: 'branch misses' unavailable Oct 31 01:32:19.702803 kernel: ... version: 1 Oct 31 01:32:19.702808 kernel: ... bit width: 48 Oct 31 01:32:19.702814 kernel: ... generic registers: 4 Oct 31 01:32:19.702819 kernel: ... value mask: 0000ffffffffffff Oct 31 01:32:19.702826 kernel: ... max period: 000000007fffffff Oct 31 01:32:19.702831 kernel: ... fixed-purpose events: 0 Oct 31 01:32:19.702837 kernel: ... event mask: 000000000000000f Oct 31 01:32:19.702842 kernel: signal: max sigframe size: 1776 Oct 31 01:32:19.702849 kernel: rcu: Hierarchical SRCU implementation. Oct 31 01:32:19.702854 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 31 01:32:19.702860 kernel: smp: Bringing up secondary CPUs ... Oct 31 01:32:19.702865 kernel: x86: Booting SMP configuration: Oct 31 01:32:19.702871 kernel: .... node #0, CPUs: #1 Oct 31 01:32:19.702876 kernel: Disabled fast string operations Oct 31 01:32:19.702882 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Oct 31 01:32:19.702887 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Oct 31 01:32:19.702893 kernel: smp: Brought up 1 node, 2 CPUs Oct 31 01:32:19.702898 kernel: smpboot: Max logical packages: 128 Oct 31 01:32:19.702905 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Oct 31 01:32:19.702910 kernel: devtmpfs: initialized Oct 31 01:32:19.702916 kernel: x86/mm: Memory block size: 128MB Oct 31 01:32:19.702922 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Oct 31 01:32:19.702928 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 31 01:32:19.702934 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Oct 31 01:32:19.702939 kernel: pinctrl core: initialized pinctrl subsystem Oct 31 01:32:19.702945 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 31 01:32:19.702951 kernel: audit: initializing netlink subsys (disabled) Oct 31 01:32:19.702958 kernel: audit: type=2000 audit(1761874338.087:1): state=initialized audit_enabled=0 res=1 Oct 31 01:32:19.702963 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 31 01:32:19.702969 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 31 01:32:19.702974 kernel: cpuidle: using governor menu Oct 31 01:32:19.702980 kernel: Simple Boot Flag at 0x36 set to 0x80 Oct 31 01:32:19.702985 kernel: ACPI: bus type PCI registered Oct 31 01:32:19.702991 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 31 01:32:19.702997 kernel: dca service started, version 1.12.1 Oct 31 01:32:19.703002 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Oct 31 01:32:19.703009 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Oct 31 01:32:19.703015 kernel: PCI: Using configuration type 1 for base access Oct 31 01:32:19.703020 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 31 01:32:19.703026 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 31 01:32:19.703031 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 31 01:32:19.703037 kernel: ACPI: Added _OSI(Module Device) Oct 31 01:32:19.703042 kernel: ACPI: Added _OSI(Processor Device) Oct 31 01:32:19.703048 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 31 01:32:19.703054 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 31 01:32:19.703061 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 31 01:32:19.703066 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 31 01:32:19.703072 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 31 01:32:19.703078 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Oct 31 01:32:19.703083 kernel: ACPI: Interpreter enabled Oct 31 01:32:19.703089 kernel: ACPI: PM: (supports S0 S1 S5) Oct 31 01:32:19.703095 kernel: ACPI: Using IOAPIC for interrupt routing Oct 31 01:32:19.703100 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 31 01:32:19.703106 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Oct 31 01:32:19.703113 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Oct 31 01:32:19.703204 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 31 01:32:19.703257 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Oct 31 01:32:19.703305 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Oct 31 01:32:19.703313 kernel: PCI host bridge to bus 0000:00 Oct 31 01:32:19.703363 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 31 01:32:19.703428 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000dbfff window] Oct 31 01:32:19.703472 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 31 01:32:19.703515 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 31 01:32:19.703560 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Oct 31 01:32:19.703601 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Oct 31 01:32:19.703665 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Oct 31 01:32:19.703719 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Oct 31 01:32:19.703777 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Oct 31 01:32:19.703831 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Oct 31 01:32:19.703879 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Oct 31 01:32:19.703927 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Oct 31 01:32:19.703974 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Oct 31 01:32:19.704022 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Oct 31 01:32:19.704073 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Oct 31 01:32:19.704126 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Oct 31 01:32:19.704180 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Oct 31 01:32:19.704227 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Oct 31 01:32:19.704280 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Oct 31 01:32:19.704328 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Oct 31 01:32:19.717453 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Oct 31 01:32:19.717546 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Oct 31 01:32:19.717600 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Oct 31 01:32:19.717655 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Oct 31 01:32:19.717704 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Oct 31 01:32:19.717751 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Oct 31 01:32:19.717799 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 31 01:32:19.717853 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Oct 31 01:32:19.717912 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.717962 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.718015 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.718067 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.718120 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.718170 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.718224 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.718273 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.718327 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.718407 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.718466 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.718516 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.718571 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.718624 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.718677 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.718725 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.718776 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.718825 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.718879 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.718927 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.718980 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.719028 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.719080 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.719131 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.719182 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.719232 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.719307 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.719359 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.719421 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.719470 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.719525 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.719573 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.719623 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.719671 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.719724 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.719772 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.719825 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.719873 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.719924 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.719971 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.720022 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.720069 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.720126 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.720175 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.720226 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.720275 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.720326 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.720383 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.720438 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.720486 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.720538 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.720587 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.720644 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.720693 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.720745 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.720796 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.720845 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.720893 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.720946 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.720995 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.721050 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.721102 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.721167 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Oct 31 01:32:19.721227 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.721280 kernel: pci_bus 0000:01: extended config space not accessible Oct 31 01:32:19.721331 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 31 01:32:19.730487 kernel: pci_bus 0000:02: extended config space not accessible Oct 31 01:32:19.730525 kernel: acpiphp: Slot [32] registered Oct 31 01:32:19.730532 kernel: acpiphp: Slot [33] registered Oct 31 01:32:19.730538 kernel: acpiphp: Slot [34] registered Oct 31 01:32:19.730544 kernel: acpiphp: Slot [35] registered Oct 31 01:32:19.730550 kernel: acpiphp: Slot [36] registered Oct 31 01:32:19.730555 kernel: acpiphp: Slot [37] registered Oct 31 01:32:19.730561 kernel: acpiphp: Slot [38] registered Oct 31 01:32:19.730567 kernel: acpiphp: Slot [39] registered Oct 31 01:32:19.730573 kernel: acpiphp: Slot [40] registered Oct 31 01:32:19.730580 kernel: acpiphp: Slot [41] registered Oct 31 01:32:19.730585 kernel: acpiphp: Slot [42] registered Oct 31 01:32:19.730591 kernel: acpiphp: Slot [43] registered Oct 31 01:32:19.730597 kernel: acpiphp: Slot [44] registered Oct 31 01:32:19.730603 kernel: acpiphp: Slot [45] registered Oct 31 01:32:19.730610 kernel: acpiphp: Slot [46] registered Oct 31 01:32:19.730619 kernel: acpiphp: Slot [47] registered Oct 31 01:32:19.730625 kernel: acpiphp: Slot [48] registered Oct 31 01:32:19.730634 kernel: acpiphp: Slot [49] registered Oct 31 01:32:19.730642 kernel: acpiphp: Slot [50] registered Oct 31 01:32:19.730650 kernel: acpiphp: Slot [51] registered Oct 31 01:32:19.730658 kernel: acpiphp: Slot [52] registered Oct 31 01:32:19.730663 kernel: acpiphp: Slot [53] registered Oct 31 01:32:19.730669 kernel: acpiphp: Slot [54] registered Oct 31 01:32:19.730675 kernel: acpiphp: Slot [55] registered Oct 31 01:32:19.730681 kernel: acpiphp: Slot [56] registered Oct 31 01:32:19.730687 kernel: acpiphp: Slot [57] registered Oct 31 01:32:19.730692 kernel: acpiphp: Slot [58] registered Oct 31 01:32:19.730698 kernel: acpiphp: Slot [59] registered Oct 31 01:32:19.730705 kernel: acpiphp: Slot [60] registered Oct 31 01:32:19.730710 kernel: acpiphp: Slot [61] registered Oct 31 01:32:19.730716 kernel: acpiphp: Slot [62] registered Oct 31 01:32:19.730722 kernel: acpiphp: Slot [63] registered Oct 31 01:32:19.730795 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Oct 31 01:32:19.730849 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Oct 31 01:32:19.730898 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Oct 31 01:32:19.730960 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Oct 31 01:32:19.731031 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Oct 31 01:32:19.731110 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000dbfff window] (subtractive decode) Oct 31 01:32:19.731185 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Oct 31 01:32:19.731261 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Oct 31 01:32:19.731338 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Oct 31 01:32:19.731431 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Oct 31 01:32:19.731497 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Oct 31 01:32:19.731557 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Oct 31 01:32:19.731611 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Oct 31 01:32:19.731667 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Oct 31 01:32:19.731718 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Oct 31 01:32:19.731768 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Oct 31 01:32:19.731817 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Oct 31 01:32:19.731865 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Oct 31 01:32:19.731936 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Oct 31 01:32:19.731999 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Oct 31 01:32:19.732049 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Oct 31 01:32:19.732098 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Oct 31 01:32:19.732149 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Oct 31 01:32:19.732196 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Oct 31 01:32:19.732244 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Oct 31 01:32:19.732293 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Oct 31 01:32:19.732343 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Oct 31 01:32:19.733449 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Oct 31 01:32:19.733516 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Oct 31 01:32:19.733570 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Oct 31 01:32:19.733622 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Oct 31 01:32:19.733671 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Oct 31 01:32:19.733726 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Oct 31 01:32:19.733775 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Oct 31 01:32:19.733823 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Oct 31 01:32:19.733874 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Oct 31 01:32:19.733923 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Oct 31 01:32:19.733972 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Oct 31 01:32:19.734023 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Oct 31 01:32:19.734074 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Oct 31 01:32:19.734122 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Oct 31 01:32:19.734181 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Oct 31 01:32:19.734232 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Oct 31 01:32:19.734281 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Oct 31 01:32:19.734335 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Oct 31 01:32:19.736528 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Oct 31 01:32:19.736620 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Oct 31 01:32:19.736686 kernel: pci 0000:0b:00.0: supports D1 D2 Oct 31 01:32:19.736764 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 31 01:32:19.736847 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Oct 31 01:32:19.736926 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Oct 31 01:32:19.737004 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Oct 31 01:32:19.737084 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Oct 31 01:32:19.737138 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Oct 31 01:32:19.737193 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Oct 31 01:32:19.737241 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Oct 31 01:32:19.737289 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Oct 31 01:32:19.737340 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Oct 31 01:32:19.737408 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Oct 31 01:32:19.737467 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Oct 31 01:32:19.737517 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Oct 31 01:32:19.737575 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Oct 31 01:32:19.737641 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Oct 31 01:32:19.737698 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Oct 31 01:32:19.737766 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Oct 31 01:32:19.737816 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Oct 31 01:32:19.737874 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Oct 31 01:32:19.737935 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Oct 31 01:32:19.737985 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Oct 31 01:32:19.738033 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Oct 31 01:32:19.738089 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Oct 31 01:32:19.738137 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Oct 31 01:32:19.738185 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Oct 31 01:32:19.738262 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Oct 31 01:32:19.738327 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Oct 31 01:32:19.738404 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Oct 31 01:32:19.738490 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Oct 31 01:32:19.738569 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Oct 31 01:32:19.738650 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Oct 31 01:32:19.738730 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Oct 31 01:32:19.738815 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Oct 31 01:32:19.738896 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Oct 31 01:32:19.738974 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Oct 31 01:32:19.739049 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Oct 31 01:32:19.739114 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Oct 31 01:32:19.739168 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Oct 31 01:32:19.739232 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Oct 31 01:32:19.739304 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Oct 31 01:32:19.739361 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Oct 31 01:32:19.739449 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Oct 31 01:32:19.739498 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Oct 31 01:32:19.739555 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Oct 31 01:32:19.739615 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Oct 31 01:32:19.739676 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Oct 31 01:32:19.739735 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Oct 31 01:32:19.739794 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Oct 31 01:32:19.739843 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Oct 31 01:32:19.739893 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Oct 31 01:32:19.739950 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Oct 31 01:32:19.740007 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Oct 31 01:32:19.740070 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Oct 31 01:32:19.740129 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Oct 31 01:32:19.740179 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Oct 31 01:32:19.740228 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Oct 31 01:32:19.740290 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Oct 31 01:32:19.740347 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Oct 31 01:32:19.740425 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Oct 31 01:32:19.740477 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Oct 31 01:32:19.740527 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Oct 31 01:32:19.740577 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Oct 31 01:32:19.740631 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Oct 31 01:32:19.740683 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Oct 31 01:32:19.740733 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Oct 31 01:32:19.740780 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Oct 31 01:32:19.740839 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Oct 31 01:32:19.740890 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Oct 31 01:32:19.740937 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Oct 31 01:32:19.740990 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Oct 31 01:32:19.741039 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Oct 31 01:32:19.741088 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Oct 31 01:32:19.741140 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Oct 31 01:32:19.741192 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Oct 31 01:32:19.741251 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Oct 31 01:32:19.741303 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Oct 31 01:32:19.741353 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Oct 31 01:32:19.741424 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Oct 31 01:32:19.741479 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Oct 31 01:32:19.741527 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Oct 31 01:32:19.741575 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Oct 31 01:32:19.741584 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Oct 31 01:32:19.741590 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Oct 31 01:32:19.741596 kernel: ACPI: PCI: Interrupt link LNKB disabled Oct 31 01:32:19.741602 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 31 01:32:19.741610 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Oct 31 01:32:19.741616 kernel: iommu: Default domain type: Translated Oct 31 01:32:19.741622 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 31 01:32:19.741673 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Oct 31 01:32:19.741721 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 31 01:32:19.741770 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Oct 31 01:32:19.741778 kernel: vgaarb: loaded Oct 31 01:32:19.741784 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 31 01:32:19.741790 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 31 01:32:19.741798 kernel: PTP clock support registered Oct 31 01:32:19.741804 kernel: PCI: Using ACPI for IRQ routing Oct 31 01:32:19.741809 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 31 01:32:19.741815 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Oct 31 01:32:19.741821 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Oct 31 01:32:19.741827 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Oct 31 01:32:19.741832 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Oct 31 01:32:19.741838 kernel: clocksource: Switched to clocksource tsc-early Oct 31 01:32:19.741844 kernel: VFS: Disk quotas dquot_6.6.0 Oct 31 01:32:19.741851 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 31 01:32:19.741857 kernel: pnp: PnP ACPI init Oct 31 01:32:19.741915 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Oct 31 01:32:19.741961 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Oct 31 01:32:19.742006 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Oct 31 01:32:19.742054 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Oct 31 01:32:19.742102 kernel: pnp 00:06: [dma 2] Oct 31 01:32:19.742152 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Oct 31 01:32:19.742197 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Oct 31 01:32:19.742241 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Oct 31 01:32:19.742249 kernel: pnp: PnP ACPI: found 8 devices Oct 31 01:32:19.742255 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 31 01:32:19.742261 kernel: NET: Registered PF_INET protocol family Oct 31 01:32:19.742267 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 31 01:32:19.742273 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 31 01:32:19.742281 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 31 01:32:19.742286 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 31 01:32:19.742292 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 31 01:32:19.742298 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 31 01:32:19.742304 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 31 01:32:19.742310 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 31 01:32:19.742316 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 31 01:32:19.742321 kernel: NET: Registered PF_XDP protocol family Oct 31 01:32:19.742383 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Oct 31 01:32:19.742437 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Oct 31 01:32:19.742488 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Oct 31 01:32:19.742550 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Oct 31 01:32:19.742601 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Oct 31 01:32:19.742659 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Oct 31 01:32:19.742712 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Oct 31 01:32:19.742764 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Oct 31 01:32:19.742815 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Oct 31 01:32:19.742873 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Oct 31 01:32:19.742923 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Oct 31 01:32:19.742973 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Oct 31 01:32:19.743025 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Oct 31 01:32:19.743076 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Oct 31 01:32:19.743126 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Oct 31 01:32:19.743178 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Oct 31 01:32:19.743229 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Oct 31 01:32:19.743279 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Oct 31 01:32:19.743330 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Oct 31 01:32:19.743389 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Oct 31 01:32:19.743439 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Oct 31 01:32:19.743489 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Oct 31 01:32:19.743541 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Oct 31 01:32:19.743592 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Oct 31 01:32:19.743659 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Oct 31 01:32:19.743729 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.743780 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.743830 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.743878 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.743927 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.743975 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.744025 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.744077 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.744127 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.744175 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.744225 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.744273 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.744324 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.744483 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.744538 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.744600 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.744670 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.744721 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.744770 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.744818 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.744868 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.744916 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.744967 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.745019 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.745070 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.745119 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.745182 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.745231 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.745285 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.745339 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.745443 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.745496 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.745547 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.745595 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.745643 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.745691 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.745740 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.745789 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.745838 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.745889 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.745939 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.745987 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.746035 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.746083 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.746143 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.746216 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.746290 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.746365 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.746469 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.746556 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.746635 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.746717 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.746806 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.746891 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.746979 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.747055 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.747141 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.747205 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.747255 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.747305 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.747354 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.747419 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.747494 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.747572 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.747665 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.747750 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.747826 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.747896 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.747951 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.748012 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.748071 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.748135 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.748209 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.748290 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.748358 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.748453 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.748519 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.748579 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.748655 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.748717 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.748783 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.748851 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.748941 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Oct 31 01:32:19.749009 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:32:19.749079 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 31 01:32:19.749152 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Oct 31 01:32:19.749222 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Oct 31 01:32:19.749299 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Oct 31 01:32:19.749467 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Oct 31 01:32:19.749552 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Oct 31 01:32:19.750453 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Oct 31 01:32:19.750533 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Oct 31 01:32:19.750587 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Oct 31 01:32:19.750652 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Oct 31 01:32:19.750737 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Oct 31 01:32:19.750811 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Oct 31 01:32:19.750860 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Oct 31 01:32:19.750992 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Oct 31 01:32:19.751069 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Oct 31 01:32:19.751118 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Oct 31 01:32:19.751167 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Oct 31 01:32:19.751215 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Oct 31 01:32:19.751264 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Oct 31 01:32:19.751315 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Oct 31 01:32:19.751363 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Oct 31 01:32:19.751426 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Oct 31 01:32:19.751478 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Oct 31 01:32:19.751549 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Oct 31 01:32:19.751627 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Oct 31 01:32:19.756575 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Oct 31 01:32:19.756664 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Oct 31 01:32:19.756725 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Oct 31 01:32:19.756777 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Oct 31 01:32:19.756828 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Oct 31 01:32:19.756879 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Oct 31 01:32:19.756927 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Oct 31 01:32:19.756974 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Oct 31 01:32:19.757026 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Oct 31 01:32:19.757082 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Oct 31 01:32:19.757129 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Oct 31 01:32:19.757176 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Oct 31 01:32:19.757222 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Oct 31 01:32:19.757273 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Oct 31 01:32:19.757320 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Oct 31 01:32:19.757368 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Oct 31 01:32:19.757425 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Oct 31 01:32:19.757474 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Oct 31 01:32:19.757523 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Oct 31 01:32:19.757575 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Oct 31 01:32:19.757622 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Oct 31 01:32:19.757673 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Oct 31 01:32:19.757721 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Oct 31 01:32:19.757768 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Oct 31 01:32:19.757817 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Oct 31 01:32:19.757865 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Oct 31 01:32:19.757918 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Oct 31 01:32:19.757988 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Oct 31 01:32:19.758296 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Oct 31 01:32:19.758364 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Oct 31 01:32:19.758434 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Oct 31 01:32:19.758484 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Oct 31 01:32:19.758781 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Oct 31 01:32:19.758836 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Oct 31 01:32:19.758887 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Oct 31 01:32:19.758961 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Oct 31 01:32:19.759264 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Oct 31 01:32:19.759552 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Oct 31 01:32:19.759611 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Oct 31 01:32:19.759661 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Oct 31 01:32:19.759718 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Oct 31 01:32:19.759768 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Oct 31 01:32:19.759818 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Oct 31 01:32:19.759866 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Oct 31 01:32:19.759917 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Oct 31 01:32:19.759966 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Oct 31 01:32:19.760013 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Oct 31 01:32:19.760064 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Oct 31 01:32:19.760116 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Oct 31 01:32:19.760163 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Oct 31 01:32:19.760212 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Oct 31 01:32:19.760261 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Oct 31 01:32:19.760310 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Oct 31 01:32:19.760357 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Oct 31 01:32:19.760415 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Oct 31 01:32:19.760465 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Oct 31 01:32:19.760515 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Oct 31 01:32:19.760564 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Oct 31 01:32:19.760611 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Oct 31 01:32:19.760664 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Oct 31 01:32:19.760713 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Oct 31 01:32:19.760761 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Oct 31 01:32:19.760808 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Oct 31 01:32:19.760857 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Oct 31 01:32:19.760904 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Oct 31 01:32:19.760952 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Oct 31 01:32:19.761001 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Oct 31 01:32:19.761051 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Oct 31 01:32:19.761100 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Oct 31 01:32:19.761148 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Oct 31 01:32:19.761195 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Oct 31 01:32:19.761245 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Oct 31 01:32:19.761293 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Oct 31 01:32:19.761340 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Oct 31 01:32:19.761402 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Oct 31 01:32:19.761454 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Oct 31 01:32:19.761502 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Oct 31 01:32:19.761552 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Oct 31 01:32:19.761608 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Oct 31 01:32:19.761663 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Oct 31 01:32:19.761713 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Oct 31 01:32:19.761762 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Oct 31 01:32:19.761810 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Oct 31 01:32:19.761860 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Oct 31 01:32:19.761908 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Oct 31 01:32:19.761996 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Oct 31 01:32:19.762068 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Oct 31 01:32:19.762123 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Oct 31 01:32:19.762171 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Oct 31 01:32:19.762220 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Oct 31 01:32:19.762264 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000dbfff window] Oct 31 01:32:19.762309 kernel: pci_bus 0000:00: resource 6 [mem 0xc0000000-0xfebfffff window] Oct 31 01:32:19.762352 kernel: pci_bus 0000:00: resource 7 [io 0x0000-0x0cf7 window] Oct 31 01:32:19.762410 kernel: pci_bus 0000:00: resource 8 [io 0x0d00-0xfeff window] Oct 31 01:32:19.762465 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Oct 31 01:32:19.762515 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Oct 31 01:32:19.762560 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Oct 31 01:32:19.762605 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Oct 31 01:32:19.762651 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000dbfff window] Oct 31 01:32:19.762696 kernel: pci_bus 0000:02: resource 6 [mem 0xc0000000-0xfebfffff window] Oct 31 01:32:19.762743 kernel: pci_bus 0000:02: resource 7 [io 0x0000-0x0cf7 window] Oct 31 01:32:19.762791 kernel: pci_bus 0000:02: resource 8 [io 0x0d00-0xfeff window] Oct 31 01:32:19.762843 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Oct 31 01:32:19.762889 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Oct 31 01:32:19.762951 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Oct 31 01:32:19.763004 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Oct 31 01:32:19.763050 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Oct 31 01:32:19.763096 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Oct 31 01:32:19.763152 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Oct 31 01:32:19.763198 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Oct 31 01:32:19.763245 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Oct 31 01:32:19.763299 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Oct 31 01:32:19.763345 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Oct 31 01:32:19.763758 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Oct 31 01:32:19.763815 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Oct 31 01:32:19.764140 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Oct 31 01:32:19.764192 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Oct 31 01:32:19.764245 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Oct 31 01:32:19.764304 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Oct 31 01:32:19.764586 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Oct 31 01:32:19.764655 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Oct 31 01:32:19.764940 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Oct 31 01:32:19.764994 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Oct 31 01:32:19.765042 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Oct 31 01:32:19.765106 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Oct 31 01:32:19.765444 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Oct 31 01:32:19.765738 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Oct 31 01:32:19.765797 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Oct 31 01:32:19.765845 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Oct 31 01:32:19.765900 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Oct 31 01:32:19.765954 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Oct 31 01:32:19.766001 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Oct 31 01:32:19.766050 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Oct 31 01:32:19.766100 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Oct 31 01:32:19.766150 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Oct 31 01:32:19.766195 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Oct 31 01:32:19.766245 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Oct 31 01:32:19.766291 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Oct 31 01:32:19.766343 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Oct 31 01:32:19.766751 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Oct 31 01:32:19.766808 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Oct 31 01:32:19.766856 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Oct 31 01:32:19.766904 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Oct 31 01:32:19.767267 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Oct 31 01:32:19.767320 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Oct 31 01:32:19.767382 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Oct 31 01:32:19.767761 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Oct 31 01:32:19.767815 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Oct 31 01:32:19.767862 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Oct 31 01:32:19.767913 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Oct 31 01:32:19.767959 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Oct 31 01:32:19.768009 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Oct 31 01:32:19.768059 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Oct 31 01:32:19.768116 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Oct 31 01:32:19.768162 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Oct 31 01:32:19.768211 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Oct 31 01:32:19.768257 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Oct 31 01:32:19.768306 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Oct 31 01:32:19.768354 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Oct 31 01:32:19.768415 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Oct 31 01:32:19.768462 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Oct 31 01:32:19.768508 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Oct 31 01:32:19.768802 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Oct 31 01:32:19.768859 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Oct 31 01:32:19.768919 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Oct 31 01:32:19.768976 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Oct 31 01:32:19.769051 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Oct 31 01:32:19.769344 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Oct 31 01:32:19.769441 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Oct 31 01:32:19.769496 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Oct 31 01:32:19.769548 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Oct 31 01:32:19.769602 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Oct 31 01:32:19.769648 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Oct 31 01:32:19.769697 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Oct 31 01:32:19.769742 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Oct 31 01:32:19.769791 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Oct 31 01:32:19.769839 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Oct 31 01:32:19.769897 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 31 01:32:19.769907 kernel: PCI: CLS 32 bytes, default 64 Oct 31 01:32:19.769914 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 31 01:32:19.769920 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Oct 31 01:32:19.769927 kernel: clocksource: Switched to clocksource tsc Oct 31 01:32:19.769932 kernel: Initialise system trusted keyrings Oct 31 01:32:19.769939 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 31 01:32:19.769946 kernel: Key type asymmetric registered Oct 31 01:32:19.769953 kernel: Asymmetric key parser 'x509' registered Oct 31 01:32:19.769959 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 31 01:32:19.769965 kernel: io scheduler mq-deadline registered Oct 31 01:32:19.769971 kernel: io scheduler kyber registered Oct 31 01:32:19.769977 kernel: io scheduler bfq registered Oct 31 01:32:19.770029 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Oct 31 01:32:19.770080 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.770133 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Oct 31 01:32:19.770182 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.770234 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Oct 31 01:32:19.770282 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.770332 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Oct 31 01:32:19.770389 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.770442 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Oct 31 01:32:19.770492 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.770545 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Oct 31 01:32:19.770594 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.770671 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Oct 31 01:32:19.770722 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.771022 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Oct 31 01:32:19.771083 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.771138 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Oct 31 01:32:19.771506 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.771561 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Oct 31 01:32:19.771611 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.771775 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Oct 31 01:32:19.771833 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.771890 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Oct 31 01:32:19.772247 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.772304 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Oct 31 01:32:19.772357 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.772611 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Oct 31 01:32:19.772897 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.772954 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Oct 31 01:32:19.773314 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.773433 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Oct 31 01:32:19.773491 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.773542 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Oct 31 01:32:19.773602 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.773785 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Oct 31 01:32:19.773839 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.774186 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Oct 31 01:32:19.774252 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.774306 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Oct 31 01:32:19.774358 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.774426 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Oct 31 01:32:19.774477 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.774529 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Oct 31 01:32:19.774580 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.774828 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Oct 31 01:32:19.775117 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.775176 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Oct 31 01:32:19.775232 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.775613 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Oct 31 01:32:19.775668 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.775721 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Oct 31 01:32:19.775773 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.775823 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Oct 31 01:32:19.775873 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.775923 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Oct 31 01:32:19.775972 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.776022 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Oct 31 01:32:19.776073 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.776124 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Oct 31 01:32:19.776173 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.776223 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Oct 31 01:32:19.776273 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.776326 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Oct 31 01:32:19.776385 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:32:19.776394 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 31 01:32:19.776401 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 31 01:32:19.776408 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 31 01:32:19.776414 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Oct 31 01:32:19.776421 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 31 01:32:19.776429 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 31 01:32:19.776481 kernel: rtc_cmos 00:01: registered as rtc0 Oct 31 01:32:19.776528 kernel: rtc_cmos 00:01: setting system clock to 2025-10-31T01:32:19 UTC (1761874339) Oct 31 01:32:19.776571 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Oct 31 01:32:19.776580 kernel: intel_pstate: CPU model not supported Oct 31 01:32:19.776587 kernel: NET: Registered PF_INET6 protocol family Oct 31 01:32:19.776593 kernel: Segment Routing with IPv6 Oct 31 01:32:19.776599 kernel: In-situ OAM (IOAM) with IPv6 Oct 31 01:32:19.776607 kernel: NET: Registered PF_PACKET protocol family Oct 31 01:32:19.776613 kernel: Key type dns_resolver registered Oct 31 01:32:19.776732 kernel: IPI shorthand broadcast: enabled Oct 31 01:32:19.776741 kernel: sched_clock: Marking stable (927376498, 227901308)->(1223318958, -68041152) Oct 31 01:32:19.776747 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 31 01:32:19.776753 kernel: registered taskstats version 1 Oct 31 01:32:19.776759 kernel: Loading compiled-in X.509 certificates Oct 31 01:32:19.776765 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 8306d4e745b00e76b5fae2596c709096b7f28adc' Oct 31 01:32:19.776771 kernel: Key type .fscrypt registered Oct 31 01:32:19.776780 kernel: Key type fscrypt-provisioning registered Oct 31 01:32:19.776786 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 31 01:32:19.776792 kernel: ima: Allocated hash algorithm: sha1 Oct 31 01:32:19.776798 kernel: ima: No architecture policies found Oct 31 01:32:19.776805 kernel: clk: Disabling unused clocks Oct 31 01:32:19.776811 kernel: Freeing unused kernel image (initmem) memory: 47496K Oct 31 01:32:19.776817 kernel: Write protecting the kernel read-only data: 28672k Oct 31 01:32:19.776823 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 31 01:32:19.776829 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Oct 31 01:32:19.776836 kernel: Run /init as init process Oct 31 01:32:19.776842 kernel: with arguments: Oct 31 01:32:19.776848 kernel: /init Oct 31 01:32:19.776854 kernel: with environment: Oct 31 01:32:19.776860 kernel: HOME=/ Oct 31 01:32:19.776866 kernel: TERM=linux Oct 31 01:32:19.777161 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 31 01:32:19.777172 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 01:32:19.777183 systemd[1]: Detected virtualization vmware. Oct 31 01:32:19.777190 systemd[1]: Detected architecture x86-64. Oct 31 01:32:19.777196 systemd[1]: Running in initrd. Oct 31 01:32:19.777203 systemd[1]: No hostname configured, using default hostname. Oct 31 01:32:19.777209 systemd[1]: Hostname set to . Oct 31 01:32:19.777217 systemd[1]: Initializing machine ID from random generator. Oct 31 01:32:19.777223 systemd[1]: Queued start job for default target initrd.target. Oct 31 01:32:19.777229 systemd[1]: Started systemd-ask-password-console.path. Oct 31 01:32:19.777237 systemd[1]: Reached target cryptsetup.target. Oct 31 01:32:19.777243 systemd[1]: Reached target paths.target. Oct 31 01:32:19.777250 systemd[1]: Reached target slices.target. Oct 31 01:32:19.777256 systemd[1]: Reached target swap.target. Oct 31 01:32:19.777262 systemd[1]: Reached target timers.target. Oct 31 01:32:19.777269 systemd[1]: Listening on iscsid.socket. Oct 31 01:32:19.777275 systemd[1]: Listening on iscsiuio.socket. Oct 31 01:32:19.777283 systemd[1]: Listening on systemd-journald-audit.socket. Oct 31 01:32:19.777290 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 31 01:32:19.777296 systemd[1]: Listening on systemd-journald.socket. Oct 31 01:32:19.777303 systemd[1]: Listening on systemd-networkd.socket. Oct 31 01:32:19.777309 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 01:32:19.777315 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 01:32:19.777322 systemd[1]: Reached target sockets.target. Oct 31 01:32:19.777328 systemd[1]: Starting kmod-static-nodes.service... Oct 31 01:32:19.777334 systemd[1]: Finished network-cleanup.service. Oct 31 01:32:19.777342 systemd[1]: Starting systemd-fsck-usr.service... Oct 31 01:32:19.777348 systemd[1]: Starting systemd-journald.service... Oct 31 01:32:19.777355 systemd[1]: Starting systemd-modules-load.service... Oct 31 01:32:19.777361 systemd[1]: Starting systemd-resolved.service... Oct 31 01:32:19.777367 systemd[1]: Starting systemd-vconsole-setup.service... Oct 31 01:32:19.777383 systemd[1]: Finished kmod-static-nodes.service. Oct 31 01:32:19.777390 systemd[1]: Finished systemd-fsck-usr.service. Oct 31 01:32:19.777397 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 31 01:32:19.777403 systemd[1]: Finished systemd-vconsole-setup.service. Oct 31 01:32:19.777412 kernel: audit: type=1130 audit(1761874339.704:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:19.777418 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 31 01:32:19.777425 kernel: audit: type=1130 audit(1761874339.708:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:19.777431 systemd[1]: Starting dracut-cmdline-ask.service... Oct 31 01:32:19.777437 systemd[1]: Finished dracut-cmdline-ask.service. Oct 31 01:32:19.777444 kernel: audit: type=1130 audit(1761874339.721:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:19.777450 systemd[1]: Starting dracut-cmdline.service... Oct 31 01:32:19.777456 systemd[1]: Started systemd-resolved.service. Oct 31 01:32:19.777463 systemd[1]: Reached target nss-lookup.target. Oct 31 01:32:19.777470 kernel: audit: type=1130 audit(1761874339.751:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:19.777476 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 31 01:32:19.777482 kernel: Bridge firewalling registered Oct 31 01:32:19.777494 systemd-journald[217]: Journal started Oct 31 01:32:19.777529 systemd-journald[217]: Runtime Journal (/run/log/journal/ea923bdbac824f6699c49ed89f0fedd4) is 4.8M, max 38.8M, 34.0M free. Oct 31 01:32:19.781264 systemd[1]: Started systemd-journald.service. Oct 31 01:32:19.781300 kernel: audit: type=1130 audit(1761874339.777:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:19.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:19.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:19.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:19.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:19.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:19.695737 systemd-modules-load[218]: Inserted module 'overlay' Oct 31 01:32:19.738721 systemd-resolved[219]: Positive Trust Anchors: Oct 31 01:32:19.738731 systemd-resolved[219]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 01:32:19.738757 systemd-resolved[219]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 01:32:19.750953 systemd-resolved[219]: Defaulting to hostname 'linux'. Oct 31 01:32:19.762942 systemd-modules-load[218]: Inserted module 'br_netfilter' Oct 31 01:32:19.784470 kernel: SCSI subsystem initialized Oct 31 01:32:19.784569 dracut-cmdline[233]: dracut-dracut-053 Oct 31 01:32:19.784569 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Oct 31 01:32:19.784569 dracut-cmdline[233]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 01:32:19.798431 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 31 01:32:19.798487 kernel: device-mapper: uevent: version 1.0.3 Oct 31 01:32:19.798503 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 31 01:32:19.800706 systemd-modules-load[218]: Inserted module 'dm_multipath' Oct 31 01:32:19.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:19.801193 systemd[1]: Finished systemd-modules-load.service. Oct 31 01:32:19.804386 kernel: audit: type=1130 audit(1761874339.799:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:19.804469 systemd[1]: Starting systemd-sysctl.service... Oct 31 01:32:19.808393 kernel: Loading iSCSI transport class v2.0-870. Oct 31 01:32:19.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:19.810414 systemd[1]: Finished systemd-sysctl.service. Oct 31 01:32:19.813384 kernel: audit: type=1130 audit(1761874339.809:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:19.821394 kernel: iscsi: registered transport (tcp) Oct 31 01:32:19.839684 kernel: iscsi: registered transport (qla4xxx) Oct 31 01:32:19.839762 kernel: QLogic iSCSI HBA Driver Oct 31 01:32:19.857777 systemd[1]: Finished dracut-cmdline.service. Oct 31 01:32:19.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:19.858495 systemd[1]: Starting dracut-pre-udev.service... Oct 31 01:32:19.861528 kernel: audit: type=1130 audit(1761874339.856:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:19.902426 kernel: raid6: avx2x4 gen() 43328 MB/s Oct 31 01:32:19.919418 kernel: raid6: avx2x4 xor() 14641 MB/s Oct 31 01:32:19.936402 kernel: raid6: avx2x2 gen() 49384 MB/s Oct 31 01:32:19.953413 kernel: raid6: avx2x2 xor() 31467 MB/s Oct 31 01:32:19.970417 kernel: raid6: avx2x1 gen() 43504 MB/s Oct 31 01:32:19.987408 kernel: raid6: avx2x1 xor() 27325 MB/s Oct 31 01:32:20.004406 kernel: raid6: sse2x4 gen() 20887 MB/s Oct 31 01:32:20.021419 kernel: raid6: sse2x4 xor() 11682 MB/s Oct 31 01:32:20.038412 kernel: raid6: sse2x2 gen() 20856 MB/s Oct 31 01:32:20.055421 kernel: raid6: sse2x2 xor() 13149 MB/s Oct 31 01:32:20.072407 kernel: raid6: sse2x1 gen() 17519 MB/s Oct 31 01:32:20.089620 kernel: raid6: sse2x1 xor() 8750 MB/s Oct 31 01:32:20.089663 kernel: raid6: using algorithm avx2x2 gen() 49384 MB/s Oct 31 01:32:20.089678 kernel: raid6: .... xor() 31467 MB/s, rmw enabled Oct 31 01:32:20.090786 kernel: raid6: using avx2x2 recovery algorithm Oct 31 01:32:20.099394 kernel: xor: automatically using best checksumming function avx Oct 31 01:32:20.162392 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 31 01:32:20.169391 kernel: audit: type=1130 audit(1761874340.165:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:20.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:20.166920 systemd[1]: Finished dracut-pre-udev.service. Oct 31 01:32:20.168000 audit: BPF prog-id=7 op=LOAD Oct 31 01:32:20.168000 audit: BPF prog-id=8 op=LOAD Oct 31 01:32:20.169686 systemd[1]: Starting systemd-udevd.service... Oct 31 01:32:20.180644 systemd-udevd[416]: Using default interface naming scheme 'v252'. Oct 31 01:32:20.184197 systemd[1]: Started systemd-udevd.service. Oct 31 01:32:20.185224 systemd[1]: Starting dracut-pre-trigger.service... Oct 31 01:32:20.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:20.193351 dracut-pre-trigger[421]: rd.md=0: removing MD RAID activation Oct 31 01:32:20.209942 systemd[1]: Finished dracut-pre-trigger.service. Oct 31 01:32:20.210486 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 01:32:20.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:20.276968 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 01:32:20.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:20.334826 kernel: VMware PVSCSI driver - version 1.0.7.0-k Oct 31 01:32:20.334864 kernel: vmw_pvscsi: using 64bit dma Oct 31 01:32:20.335917 kernel: vmw_pvscsi: max_id: 16 Oct 31 01:32:20.335938 kernel: vmw_pvscsi: setting ring_pages to 8 Oct 31 01:32:20.351399 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Oct 31 01:32:20.358409 kernel: vmw_pvscsi: enabling reqCallThreshold Oct 31 01:32:20.358449 kernel: vmw_pvscsi: driver-based request coalescing enabled Oct 31 01:32:20.358463 kernel: vmw_pvscsi: using MSI-X Oct 31 01:32:20.361898 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Oct 31 01:32:20.362218 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Oct 31 01:32:20.378759 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Oct 31 01:32:20.383797 kernel: cryptd: max_cpu_qlen set to 1000 Oct 31 01:32:20.383809 kernel: libata version 3.00 loaded. Oct 31 01:32:20.383820 kernel: ata_piix 0000:00:07.1: version 2.13 Oct 31 01:32:20.383896 kernel: scsi host1: ata_piix Oct 31 01:32:20.383974 kernel: scsi host2: ata_piix Oct 31 01:32:20.384055 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Oct 31 01:32:20.384065 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Oct 31 01:32:20.384076 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Oct 31 01:32:20.384141 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Oct 31 01:32:20.384208 kernel: AVX2 version of gcm_enc/dec engaged. Oct 31 01:32:20.385399 kernel: AES CTR mode by8 optimization enabled Oct 31 01:32:20.535404 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Oct 31 01:32:20.541391 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Oct 31 01:32:20.545387 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Oct 31 01:32:20.555860 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Oct 31 01:32:20.612104 kernel: sd 0:0:0:0: [sda] Write Protect is off Oct 31 01:32:20.612194 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Oct 31 01:32:20.612259 kernel: sd 0:0:0:0: [sda] Cache data unavailable Oct 31 01:32:20.612324 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Oct 31 01:32:20.612401 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Oct 31 01:32:20.612473 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 31 01:32:20.612481 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Oct 31 01:32:20.612542 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 31 01:32:20.612550 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Oct 31 01:32:20.664926 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 31 01:32:20.668401 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (463) Oct 31 01:32:20.673123 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 31 01:32:20.673267 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 31 01:32:20.675432 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 01:32:20.676079 systemd[1]: Starting disk-uuid.service... Oct 31 01:32:20.679993 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 31 01:32:20.715388 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 31 01:32:20.724400 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 31 01:32:21.786327 disk-uuid[550]: The operation has completed successfully. Oct 31 01:32:21.786564 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 31 01:32:22.100779 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 31 01:32:22.100855 systemd[1]: Finished disk-uuid.service. Oct 31 01:32:22.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:22.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:22.101764 systemd[1]: Starting verity-setup.service... Oct 31 01:32:22.134390 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Oct 31 01:32:22.718883 systemd[1]: Found device dev-mapper-usr.device. Oct 31 01:32:22.719808 systemd[1]: Mounting sysusr-usr.mount... Oct 31 01:32:22.721342 systemd[1]: Finished verity-setup.service. Oct 31 01:32:22.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:23.029325 systemd[1]: Mounted sysusr-usr.mount. Oct 31 01:32:23.029581 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 31 01:32:23.030013 systemd[1]: Starting afterburn-network-kargs.service... Oct 31 01:32:23.030496 systemd[1]: Starting ignition-setup.service... Oct 31 01:32:23.239524 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 31 01:32:23.239566 kernel: BTRFS info (device sda6): using free space tree Oct 31 01:32:23.239574 kernel: BTRFS info (device sda6): has skinny extents Oct 31 01:32:23.297394 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 31 01:32:23.310097 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 31 01:32:23.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:23.318797 systemd[1]: Finished ignition-setup.service. Oct 31 01:32:23.319486 systemd[1]: Starting ignition-fetch-offline.service... Oct 31 01:32:23.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:23.393492 systemd[1]: Finished afterburn-network-kargs.service. Oct 31 01:32:23.395009 systemd[1]: Starting parse-ip-for-networkd.service... Oct 31 01:32:23.471320 systemd[1]: Finished parse-ip-for-networkd.service. Oct 31 01:32:23.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:23.470000 audit: BPF prog-id=9 op=LOAD Oct 31 01:32:23.472332 systemd[1]: Starting systemd-networkd.service... Oct 31 01:32:23.490519 systemd-networkd[735]: lo: Link UP Oct 31 01:32:23.490527 systemd-networkd[735]: lo: Gained carrier Oct 31 01:32:23.490874 systemd-networkd[735]: Enumeration completed Oct 31 01:32:23.490952 systemd[1]: Started systemd-networkd.service. Oct 31 01:32:23.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:23.491256 systemd[1]: Reached target network.target. Oct 31 01:32:23.496417 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Oct 31 01:32:23.496546 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Oct 31 01:32:23.491879 systemd[1]: Starting iscsiuio.service... Oct 31 01:32:23.492240 systemd-networkd[735]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Oct 31 01:32:23.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:23.497053 systemd[1]: Started iscsiuio.service. Oct 31 01:32:23.497898 systemd[1]: Starting iscsid.service... Oct 31 01:32:23.498824 systemd-networkd[735]: ens192: Link UP Oct 31 01:32:23.498954 systemd-networkd[735]: ens192: Gained carrier Oct 31 01:32:23.500156 iscsid[740]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 31 01:32:23.500156 iscsid[740]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 31 01:32:23.500156 iscsid[740]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 31 01:32:23.500156 iscsid[740]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 31 01:32:23.500156 iscsid[740]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 31 01:32:23.500156 iscsid[740]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 31 01:32:23.501177 systemd[1]: Started iscsid.service. Oct 31 01:32:23.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:23.501905 systemd[1]: Starting dracut-initqueue.service... Oct 31 01:32:23.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:23.509227 systemd[1]: Finished dracut-initqueue.service. Oct 31 01:32:23.509414 systemd[1]: Reached target remote-fs-pre.target. Oct 31 01:32:23.509528 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 01:32:23.509708 systemd[1]: Reached target remote-fs.target. Oct 31 01:32:23.510703 systemd[1]: Starting dracut-pre-mount.service... Oct 31 01:32:23.516279 systemd[1]: Finished dracut-pre-mount.service. Oct 31 01:32:23.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:23.715861 ignition[607]: Ignition 2.14.0 Oct 31 01:32:23.715876 ignition[607]: Stage: fetch-offline Oct 31 01:32:23.716001 ignition[607]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 01:32:23.716021 ignition[607]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 31 01:32:23.719434 ignition[607]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 31 01:32:23.719602 ignition[607]: parsed url from cmdline: "" Oct 31 01:32:23.719605 ignition[607]: no config URL provided Oct 31 01:32:23.719609 ignition[607]: reading system config file "/usr/lib/ignition/user.ign" Oct 31 01:32:23.719617 ignition[607]: no config at "/usr/lib/ignition/user.ign" Oct 31 01:32:23.728111 ignition[607]: config successfully fetched Oct 31 01:32:23.728135 ignition[607]: parsing config with SHA512: 1d4406479353a696ce4088ff4a116e0798b70e541ee0b2f12573dc034e3621f53d53d1821f4f53b4c9b8fc4755919e1a7ec6860c616ee4c79b4fb75f7e978d23 Oct 31 01:32:23.730651 unknown[607]: fetched base config from "system" Oct 31 01:32:23.730661 unknown[607]: fetched user config from "vmware" Oct 31 01:32:23.730968 ignition[607]: fetch-offline: fetch-offline passed Oct 31 01:32:23.731029 ignition[607]: Ignition finished successfully Oct 31 01:32:23.731857 systemd[1]: Finished ignition-fetch-offline.service. Oct 31 01:32:23.732080 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Oct 31 01:32:23.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:23.732606 systemd[1]: Starting ignition-kargs.service... Oct 31 01:32:23.736849 kernel: kauditd_printk_skb: 17 callbacks suppressed Oct 31 01:32:23.736874 kernel: audit: type=1130 audit(1761874343.730:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:23.743696 ignition[755]: Ignition 2.14.0 Oct 31 01:32:23.743705 ignition[755]: Stage: kargs Oct 31 01:32:23.743801 ignition[755]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 01:32:23.743813 ignition[755]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 31 01:32:23.745696 ignition[755]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 31 01:32:23.746660 ignition[755]: kargs: kargs passed Oct 31 01:32:23.746703 ignition[755]: Ignition finished successfully Oct 31 01:32:23.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:23.748065 systemd[1]: Finished ignition-kargs.service. Oct 31 01:32:23.751921 kernel: audit: type=1130 audit(1761874343.746:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:23.748819 systemd[1]: Starting ignition-disks.service... Oct 31 01:32:23.755776 ignition[761]: Ignition 2.14.0 Oct 31 01:32:23.756057 ignition[761]: Stage: disks Oct 31 01:32:23.756258 ignition[761]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 01:32:23.756431 ignition[761]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 31 01:32:23.758079 ignition[761]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 31 01:32:23.759550 ignition[761]: disks: disks passed Oct 31 01:32:23.759709 ignition[761]: Ignition finished successfully Oct 31 01:32:23.760389 systemd[1]: Finished ignition-disks.service. Oct 31 01:32:23.760570 systemd[1]: Reached target initrd-root-device.target. Oct 31 01:32:23.763360 kernel: audit: type=1130 audit(1761874343.759:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:23.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:23.763261 systemd[1]: Reached target local-fs-pre.target. Oct 31 01:32:23.763489 systemd[1]: Reached target local-fs.target. Oct 31 01:32:23.763644 systemd[1]: Reached target sysinit.target. Oct 31 01:32:23.763812 systemd[1]: Reached target basic.target. Oct 31 01:32:23.764540 systemd[1]: Starting systemd-fsck-root.service... Oct 31 01:32:23.811220 systemd-fsck[769]: ROOT: clean, 637/1628000 files, 124069/1617920 blocks Oct 31 01:32:23.812808 systemd[1]: Finished systemd-fsck-root.service. Oct 31 01:32:23.813509 systemd[1]: Mounting sysroot.mount... Oct 31 01:32:23.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:23.817414 kernel: audit: type=1130 audit(1761874343.811:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:23.838387 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 31 01:32:23.838875 systemd[1]: Mounted sysroot.mount. Oct 31 01:32:23.839050 systemd[1]: Reached target initrd-root-fs.target. Oct 31 01:32:23.840071 systemd[1]: Mounting sysroot-usr.mount... Oct 31 01:32:23.840514 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 31 01:32:23.840541 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 31 01:32:23.840558 systemd[1]: Reached target ignition-diskful.target. Oct 31 01:32:23.842730 systemd[1]: Mounted sysroot-usr.mount. Oct 31 01:32:23.843556 systemd[1]: Starting initrd-setup-root.service... Oct 31 01:32:23.846911 initrd-setup-root[779]: cut: /sysroot/etc/passwd: No such file or directory Oct 31 01:32:23.851102 initrd-setup-root[787]: cut: /sysroot/etc/group: No such file or directory Oct 31 01:32:23.853829 initrd-setup-root[795]: cut: /sysroot/etc/shadow: No such file or directory Oct 31 01:32:23.856464 initrd-setup-root[803]: cut: /sysroot/etc/gshadow: No such file or directory Oct 31 01:32:23.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:23.987167 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 31 01:32:23.992205 kernel: audit: type=1130 audit(1761874343.986:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:23.987420 systemd[1]: Finished initrd-setup-root.service. Oct 31 01:32:23.987927 systemd[1]: Starting ignition-mount.service... Oct 31 01:32:23.992420 systemd[1]: Starting sysroot-boot.service... Oct 31 01:32:23.994037 bash[821]: umount: /sysroot/usr/share/oem: not mounted. Oct 31 01:32:23.999327 ignition[822]: INFO : Ignition 2.14.0 Oct 31 01:32:23.999327 ignition[822]: INFO : Stage: mount Oct 31 01:32:23.999637 ignition[822]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 01:32:23.999637 ignition[822]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 31 01:32:24.001261 ignition[822]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 31 01:32:24.003560 ignition[822]: INFO : mount: mount passed Oct 31 01:32:24.003690 ignition[822]: INFO : Ignition finished successfully Oct 31 01:32:24.004403 systemd[1]: Finished ignition-mount.service. Oct 31 01:32:24.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:24.007387 kernel: audit: type=1130 audit(1761874344.003:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:24.009387 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (815) Oct 31 01:32:24.013834 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 31 01:32:24.013867 kernel: BTRFS info (device sda6): using free space tree Oct 31 01:32:24.013875 kernel: BTRFS info (device sda6): has skinny extents Oct 31 01:32:24.023395 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 31 01:32:24.024135 systemd[1]: Finished sysroot-boot.service. Oct 31 01:32:24.026919 kernel: audit: type=1130 audit(1761874344.022:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:24.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:24.028260 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 31 01:32:24.028927 systemd[1]: Starting ignition-files.service... Oct 31 01:32:24.038805 ignition[850]: INFO : Ignition 2.14.0 Oct 31 01:32:24.038805 ignition[850]: INFO : Stage: files Oct 31 01:32:24.039238 ignition[850]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 01:32:24.039238 ignition[850]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 31 01:32:24.040318 ignition[850]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 31 01:32:24.049875 ignition[850]: DEBUG : files: compiled without relabeling support, skipping Oct 31 01:32:24.053113 ignition[850]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 31 01:32:24.053113 ignition[850]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 31 01:32:24.077169 ignition[850]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 31 01:32:24.077476 ignition[850]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 31 01:32:24.090115 unknown[850]: wrote ssh authorized keys file for user: core Oct 31 01:32:24.090691 ignition[850]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 31 01:32:24.095514 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Oct 31 01:32:24.095817 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Oct 31 01:32:24.099600 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 01:32:24.099861 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 01:32:24.099861 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.34.1-x86-64.raw" Oct 31 01:32:24.099861 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.34.1-x86-64.raw" Oct 31 01:32:24.100652 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Oct 31 01:32:24.100652 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Oct 31 01:32:24.105502 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3175880845" Oct 31 01:32:24.105787 ignition[850]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3175880845": device or resource busy Oct 31 01:32:24.106005 ignition[850]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3175880845", trying btrfs: device or resource busy Oct 31 01:32:24.106318 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3175880845" Oct 31 01:32:24.106593 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3175880845" Oct 31 01:32:24.108982 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem3175880845" Oct 31 01:32:24.109294 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem3175880845" Oct 31 01:32:24.109509 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Oct 31 01:32:24.109720 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.34.1-x86-64.raw" Oct 31 01:32:24.109990 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.34.1-x86-64.raw: attempt #1 Oct 31 01:32:24.110238 systemd[1]: mnt-oem3175880845.mount: Deactivated successfully. Oct 31 01:32:24.573709 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Oct 31 01:32:24.902910 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.34.1-x86-64.raw" Oct 31 01:32:24.908568 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Oct 31 01:32:24.908955 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Oct 31 01:32:24.909174 ignition[850]: INFO : files: op(c): [started] processing unit "vmtoolsd.service" Oct 31 01:32:24.909326 ignition[850]: INFO : files: op(c): [finished] processing unit "vmtoolsd.service" Oct 31 01:32:24.909487 ignition[850]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Oct 31 01:32:24.909660 ignition[850]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 31 01:32:24.910060 ignition[850]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 31 01:32:24.910261 ignition[850]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Oct 31 01:32:24.910423 ignition[850]: INFO : files: op(f): [started] setting preset to enabled for "vmtoolsd.service" Oct 31 01:32:24.910635 ignition[850]: INFO : files: op(f): [finished] setting preset to enabled for "vmtoolsd.service" Oct 31 01:32:24.910791 ignition[850]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Oct 31 01:32:24.910949 ignition[850]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Oct 31 01:32:25.107491 systemd-networkd[735]: ens192: Gained IPv6LL Oct 31 01:32:25.577321 ignition[850]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Oct 31 01:32:25.577825 ignition[850]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Oct 31 01:32:25.578177 ignition[850]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 31 01:32:25.578520 ignition[850]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 31 01:32:25.578796 ignition[850]: INFO : files: files passed Oct 31 01:32:25.578993 ignition[850]: INFO : Ignition finished successfully Oct 31 01:32:25.581648 systemd[1]: Finished ignition-files.service. Oct 31 01:32:25.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.582535 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 31 01:32:25.585408 kernel: audit: type=1130 audit(1761874345.580:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.585005 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 31 01:32:25.585460 systemd[1]: Starting ignition-quench.service... Oct 31 01:32:25.602323 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 31 01:32:25.602396 systemd[1]: Finished ignition-quench.service. Oct 31 01:32:25.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.607554 kernel: audit: type=1130 audit(1761874345.601:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.607579 kernel: audit: type=1131 audit(1761874345.601:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.609741 initrd-setup-root-after-ignition[876]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 31 01:32:25.610359 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 31 01:32:25.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.610545 systemd[1]: Reached target ignition-complete.target. Oct 31 01:32:25.611079 systemd[1]: Starting initrd-parse-etc.service... Oct 31 01:32:25.620214 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 31 01:32:25.620445 systemd[1]: Finished initrd-parse-etc.service. Oct 31 01:32:25.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.620811 systemd[1]: Reached target initrd-fs.target. Oct 31 01:32:25.621022 systemd[1]: Reached target initrd.target. Oct 31 01:32:25.621249 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 31 01:32:25.622034 systemd[1]: Starting dracut-pre-pivot.service... Oct 31 01:32:25.628896 systemd[1]: Finished dracut-pre-pivot.service. Oct 31 01:32:25.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.629757 systemd[1]: Starting initrd-cleanup.service... Oct 31 01:32:25.635542 systemd[1]: Stopped target nss-lookup.target. Oct 31 01:32:25.635846 systemd[1]: Stopped target remote-cryptsetup.target. Oct 31 01:32:25.636122 systemd[1]: Stopped target timers.target. Oct 31 01:32:25.636459 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 31 01:32:25.636663 systemd[1]: Stopped dracut-pre-pivot.service. Oct 31 01:32:25.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.637032 systemd[1]: Stopped target initrd.target. Oct 31 01:32:25.637286 systemd[1]: Stopped target basic.target. Oct 31 01:32:25.637546 systemd[1]: Stopped target ignition-complete.target. Oct 31 01:32:25.637816 systemd[1]: Stopped target ignition-diskful.target. Oct 31 01:32:25.638074 systemd[1]: Stopped target initrd-root-device.target. Oct 31 01:32:25.638335 systemd[1]: Stopped target remote-fs.target. Oct 31 01:32:25.638589 systemd[1]: Stopped target remote-fs-pre.target. Oct 31 01:32:25.638852 systemd[1]: Stopped target sysinit.target. Oct 31 01:32:25.639109 systemd[1]: Stopped target local-fs.target. Oct 31 01:32:25.639357 systemd[1]: Stopped target local-fs-pre.target. Oct 31 01:32:25.639620 systemd[1]: Stopped target swap.target. Oct 31 01:32:25.639849 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 31 01:32:25.640050 systemd[1]: Stopped dracut-pre-mount.service. Oct 31 01:32:25.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.640459 systemd[1]: Stopped target cryptsetup.target. Oct 31 01:32:25.640703 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 31 01:32:25.640900 systemd[1]: Stopped dracut-initqueue.service. Oct 31 01:32:25.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.641219 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 31 01:32:25.641435 systemd[1]: Stopped ignition-fetch-offline.service. Oct 31 01:32:25.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.641780 systemd[1]: Stopped target paths.target. Oct 31 01:32:25.642011 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 31 01:32:25.645411 systemd[1]: Stopped systemd-ask-password-console.path. Oct 31 01:32:25.645766 systemd[1]: Stopped target slices.target. Oct 31 01:32:25.646021 systemd[1]: Stopped target sockets.target. Oct 31 01:32:25.646297 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 31 01:32:25.646538 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 31 01:32:25.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.646886 systemd[1]: ignition-files.service: Deactivated successfully. Oct 31 01:32:25.647080 systemd[1]: Stopped ignition-files.service. Oct 31 01:32:25.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.647916 systemd[1]: Stopping ignition-mount.service... Oct 31 01:32:25.649960 iscsid[740]: iscsid shutting down. Oct 31 01:32:25.650288 systemd[1]: Stopping iscsid.service... Oct 31 01:32:25.650520 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 31 01:32:25.650748 systemd[1]: Stopped kmod-static-nodes.service. Oct 31 01:32:25.651682 systemd[1]: Stopping sysroot-boot.service... Oct 31 01:32:25.651943 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 31 01:32:25.652181 systemd[1]: Stopped systemd-udev-trigger.service. Oct 31 01:32:25.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.652538 ignition[889]: INFO : Ignition 2.14.0 Oct 31 01:32:25.652538 ignition[889]: INFO : Stage: umount Oct 31 01:32:25.652860 ignition[889]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 01:32:25.652860 ignition[889]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 31 01:32:25.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.653290 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 31 01:32:25.653539 systemd[1]: Stopped dracut-pre-trigger.service. Oct 31 01:32:25.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.654427 ignition[889]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 31 01:32:25.655389 systemd[1]: iscsid.service: Deactivated successfully. Oct 31 01:32:25.655522 ignition[889]: INFO : umount: umount passed Oct 31 01:32:25.655634 ignition[889]: INFO : Ignition finished successfully Oct 31 01:32:25.656220 systemd[1]: Stopped iscsid.service. Oct 31 01:32:25.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.656799 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 31 01:32:25.656989 systemd[1]: Stopped ignition-mount.service. Oct 31 01:32:25.657467 systemd[1]: iscsid.socket: Deactivated successfully. Oct 31 01:32:25.657659 systemd[1]: Closed iscsid.socket. Oct 31 01:32:25.657896 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 31 01:32:25.658088 systemd[1]: Stopped ignition-disks.service. Oct 31 01:32:25.658351 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 31 01:32:25.658557 systemd[1]: Stopped ignition-kargs.service. Oct 31 01:32:25.658818 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 31 01:32:25.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.659139 systemd[1]: Stopped ignition-setup.service. Oct 31 01:32:25.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.659487 systemd[1]: Stopping iscsiuio.service... Oct 31 01:32:25.660969 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 31 01:32:25.661194 systemd[1]: Finished initrd-cleanup.service. Oct 31 01:32:25.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.661671 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 31 01:32:25.661857 systemd[1]: Stopped iscsiuio.service. Oct 31 01:32:25.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.662721 systemd[1]: Stopped target network.target. Oct 31 01:32:25.662940 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 31 01:32:25.663086 systemd[1]: Closed iscsiuio.socket. Oct 31 01:32:25.663627 systemd[1]: Stopping systemd-networkd.service... Oct 31 01:32:25.663894 systemd[1]: Stopping systemd-resolved.service... Oct 31 01:32:25.667087 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 31 01:32:25.667337 systemd[1]: Stopped systemd-networkd.service. Oct 31 01:32:25.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.667989 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 31 01:32:25.668147 systemd[1]: Closed systemd-networkd.socket. Oct 31 01:32:25.668982 systemd[1]: Stopping network-cleanup.service... Oct 31 01:32:25.669296 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 31 01:32:25.669493 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 31 01:32:25.669747 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Oct 31 01:32:25.669909 systemd[1]: Stopped afterburn-network-kargs.service. Oct 31 01:32:25.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.670184 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 31 01:32:25.670336 systemd[1]: Stopped systemd-sysctl.service. Oct 31 01:32:25.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.671000 audit: BPF prog-id=9 op=UNLOAD Oct 31 01:32:25.673450 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 31 01:32:25.673491 systemd[1]: Stopped systemd-modules-load.service. Oct 31 01:32:25.673822 systemd[1]: Stopping systemd-udevd.service... Oct 31 01:32:25.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.675653 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 31 01:32:25.675703 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 31 01:32:25.676082 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 31 01:32:25.676142 systemd[1]: Stopped sysroot-boot.service. Oct 31 01:32:25.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.676630 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 31 01:32:25.676663 systemd[1]: Stopped initrd-setup-root.service. Oct 31 01:32:25.679306 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 31 01:32:25.679383 systemd[1]: Stopped network-cleanup.service. Oct 31 01:32:25.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.684423 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 31 01:32:25.684513 systemd[1]: Stopped systemd-udevd.service. Oct 31 01:32:25.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.684929 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 31 01:32:25.684957 systemd[1]: Closed systemd-udevd-control.socket. Oct 31 01:32:25.685717 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 31 01:32:25.685735 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 31 01:32:25.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.685871 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 31 01:32:25.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.685895 systemd[1]: Stopped dracut-pre-udev.service. Oct 31 01:32:25.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.686071 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 31 01:32:25.686092 systemd[1]: Stopped dracut-cmdline.service. Oct 31 01:32:25.686224 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 31 01:32:25.686244 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 31 01:32:25.686914 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 31 01:32:25.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.687033 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 31 01:32:25.687061 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 31 01:32:25.690929 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 31 01:32:25.691011 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 31 01:32:25.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.718849 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 31 01:32:25.718917 systemd[1]: Stopped systemd-resolved.service. Oct 31 01:32:25.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:25.719496 systemd[1]: Reached target initrd-switch-root.target. Oct 31 01:32:25.720029 systemd[1]: Starting initrd-switch-root.service... Oct 31 01:32:25.724000 audit: BPF prog-id=6 op=UNLOAD Oct 31 01:32:25.726992 systemd[1]: Switching root. Oct 31 01:32:25.746042 systemd-journald[217]: Journal stopped Oct 31 01:32:28.092186 systemd-journald[217]: Received SIGTERM from PID 1 (systemd). Oct 31 01:32:28.092207 kernel: SELinux: Class mctp_socket not defined in policy. Oct 31 01:32:28.092216 kernel: SELinux: Class anon_inode not defined in policy. Oct 31 01:32:28.092222 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 31 01:32:28.092227 kernel: SELinux: policy capability network_peer_controls=1 Oct 31 01:32:28.092234 kernel: SELinux: policy capability open_perms=1 Oct 31 01:32:28.092241 kernel: SELinux: policy capability extended_socket_class=1 Oct 31 01:32:28.092248 kernel: SELinux: policy capability always_check_network=0 Oct 31 01:32:28.092254 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 31 01:32:28.092260 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 31 01:32:28.092265 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 31 01:32:28.092278 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 31 01:32:28.092287 systemd[1]: Successfully loaded SELinux policy in 106.952ms. Oct 31 01:32:28.092295 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.121ms. Oct 31 01:32:28.092303 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 01:32:28.092310 systemd[1]: Detected virtualization vmware. Oct 31 01:32:28.092318 systemd[1]: Detected architecture x86-64. Oct 31 01:32:28.092324 systemd[1]: Detected first boot. Oct 31 01:32:28.092331 systemd[1]: Initializing machine ID from random generator. Oct 31 01:32:28.092337 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Oct 31 01:32:28.092343 systemd[1]: Populated /etc with preset unit settings. Oct 31 01:32:28.092350 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:32:28.092357 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:32:28.092365 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:32:28.093414 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 31 01:32:28.093426 systemd[1]: Stopped initrd-switch-root.service. Oct 31 01:32:28.093433 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 31 01:32:28.093441 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 31 01:32:28.093448 systemd[1]: Created slice system-addon\x2drun.slice. Oct 31 01:32:28.093455 systemd[1]: Created slice system-getty.slice. Oct 31 01:32:28.093462 systemd[1]: Created slice system-modprobe.slice. Oct 31 01:32:28.093471 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 31 01:32:28.093478 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 31 01:32:28.093484 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 31 01:32:28.093491 systemd[1]: Created slice user.slice. Oct 31 01:32:28.093498 systemd[1]: Started systemd-ask-password-console.path. Oct 31 01:32:28.093504 systemd[1]: Started systemd-ask-password-wall.path. Oct 31 01:32:28.093511 systemd[1]: Set up automount boot.automount. Oct 31 01:32:28.093517 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 31 01:32:28.093525 systemd[1]: Stopped target initrd-switch-root.target. Oct 31 01:32:28.093533 systemd[1]: Stopped target initrd-fs.target. Oct 31 01:32:28.093541 systemd[1]: Stopped target initrd-root-fs.target. Oct 31 01:32:28.093548 systemd[1]: Reached target integritysetup.target. Oct 31 01:32:28.093555 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 01:32:28.093562 systemd[1]: Reached target remote-fs.target. Oct 31 01:32:28.093569 systemd[1]: Reached target slices.target. Oct 31 01:32:28.093576 systemd[1]: Reached target swap.target. Oct 31 01:32:28.093584 systemd[1]: Reached target torcx.target. Oct 31 01:32:28.093592 systemd[1]: Reached target veritysetup.target. Oct 31 01:32:28.093599 systemd[1]: Listening on systemd-coredump.socket. Oct 31 01:32:28.093606 systemd[1]: Listening on systemd-initctl.socket. Oct 31 01:32:28.093612 systemd[1]: Listening on systemd-networkd.socket. Oct 31 01:32:28.093619 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 01:32:28.093626 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 01:32:28.093635 systemd[1]: Listening on systemd-userdbd.socket. Oct 31 01:32:28.093642 systemd[1]: Mounting dev-hugepages.mount... Oct 31 01:32:28.093649 systemd[1]: Mounting dev-mqueue.mount... Oct 31 01:32:28.093656 systemd[1]: Mounting media.mount... Oct 31 01:32:28.093663 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:32:28.093670 systemd[1]: Mounting sys-kernel-debug.mount... Oct 31 01:32:28.093677 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 31 01:32:28.093685 systemd[1]: Mounting tmp.mount... Oct 31 01:32:28.093692 systemd[1]: Starting flatcar-tmpfiles.service... Oct 31 01:32:28.093699 systemd[1]: Starting ignition-delete-config.service... Oct 31 01:32:28.093706 systemd[1]: Starting kmod-static-nodes.service... Oct 31 01:32:28.093713 systemd[1]: Starting modprobe@configfs.service... Oct 31 01:32:28.093720 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:32:28.093727 systemd[1]: Starting modprobe@drm.service... Oct 31 01:32:28.093735 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:32:28.093742 systemd[1]: Starting modprobe@fuse.service... Oct 31 01:32:28.093750 systemd[1]: Starting modprobe@loop.service... Oct 31 01:32:28.093758 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 31 01:32:28.093765 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 31 01:32:28.093772 systemd[1]: Stopped systemd-fsck-root.service. Oct 31 01:32:28.093779 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 31 01:32:28.093786 systemd[1]: Stopped systemd-fsck-usr.service. Oct 31 01:32:28.093793 systemd[1]: Stopped systemd-journald.service. Oct 31 01:32:28.093800 systemd[1]: Starting systemd-journald.service... Oct 31 01:32:28.093807 systemd[1]: Starting systemd-modules-load.service... Oct 31 01:32:28.093815 systemd[1]: Starting systemd-network-generator.service... Oct 31 01:32:28.093822 systemd[1]: Starting systemd-remount-fs.service... Oct 31 01:32:28.093830 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 01:32:28.093836 systemd[1]: verity-setup.service: Deactivated successfully. Oct 31 01:32:28.093843 systemd[1]: Stopped verity-setup.service. Oct 31 01:32:28.093851 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:32:28.093858 systemd[1]: Mounted dev-hugepages.mount. Oct 31 01:32:28.093866 kernel: fuse: init (API version 7.34) Oct 31 01:32:28.093872 systemd[1]: Mounted dev-mqueue.mount. Oct 31 01:32:28.093881 systemd[1]: Mounted media.mount. Oct 31 01:32:28.093889 systemd[1]: Mounted sys-kernel-debug.mount. Oct 31 01:32:28.093896 kernel: loop: module loaded Oct 31 01:32:28.093903 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 31 01:32:28.093910 systemd[1]: Mounted tmp.mount. Oct 31 01:32:28.093917 systemd[1]: Finished kmod-static-nodes.service. Oct 31 01:32:28.093924 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 31 01:32:28.093931 systemd[1]: Finished modprobe@configfs.service. Oct 31 01:32:28.093939 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:32:28.093947 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:32:28.093954 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 01:32:28.093961 systemd[1]: Finished modprobe@drm.service. Oct 31 01:32:28.093968 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:32:28.093975 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:32:28.093982 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 31 01:32:28.093989 systemd[1]: Finished modprobe@fuse.service. Oct 31 01:32:28.093996 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:32:28.094004 systemd[1]: Finished modprobe@loop.service. Oct 31 01:32:28.094011 systemd[1]: Finished systemd-modules-load.service. Oct 31 01:32:28.094018 systemd[1]: Finished systemd-network-generator.service. Oct 31 01:32:28.094026 systemd[1]: Finished systemd-remount-fs.service. Oct 31 01:32:28.094033 systemd[1]: Reached target network-pre.target. Oct 31 01:32:28.094040 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 31 01:32:28.094047 systemd[1]: Mounting sys-kernel-config.mount... Oct 31 01:32:28.094054 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 31 01:32:28.094061 systemd[1]: Starting systemd-hwdb-update.service... Oct 31 01:32:28.094070 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:32:28.094077 systemd[1]: Starting systemd-random-seed.service... Oct 31 01:32:28.094084 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:32:28.094091 systemd[1]: Starting systemd-sysctl.service... Oct 31 01:32:28.094101 systemd[1]: Finished flatcar-tmpfiles.service. Oct 31 01:32:28.094110 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 31 01:32:28.094117 systemd[1]: Mounted sys-kernel-config.mount. Oct 31 01:32:28.094125 systemd[1]: Starting systemd-sysusers.service... Oct 31 01:32:28.094136 systemd-journald[1008]: Journal started Oct 31 01:32:28.094167 systemd-journald[1008]: Runtime Journal (/run/log/journal/126bb4de47644c54b9c8bf4edabb4768) is 4.8M, max 38.8M, 34.0M free. Oct 31 01:32:26.125000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 31 01:32:26.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 01:32:26.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 01:32:26.188000 audit: BPF prog-id=10 op=LOAD Oct 31 01:32:26.188000 audit: BPF prog-id=10 op=UNLOAD Oct 31 01:32:26.188000 audit: BPF prog-id=11 op=LOAD Oct 31 01:32:26.188000 audit: BPF prog-id=11 op=UNLOAD Oct 31 01:32:26.264000 audit[922]: AVC avc: denied { associate } for pid=922 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Oct 31 01:32:26.264000 audit[922]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=905 pid=922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:32:26.264000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 01:32:26.265000 audit[922]: AVC avc: denied { associate } for pid=922 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Oct 31 01:32:26.265000 audit[922]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=905 pid=922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:32:26.265000 audit: CWD cwd="/" Oct 31 01:32:26.265000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:26.265000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:26.265000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 01:32:27.905000 audit: BPF prog-id=12 op=LOAD Oct 31 01:32:27.905000 audit: BPF prog-id=3 op=UNLOAD Oct 31 01:32:27.905000 audit: BPF prog-id=13 op=LOAD Oct 31 01:32:27.905000 audit: BPF prog-id=14 op=LOAD Oct 31 01:32:27.905000 audit: BPF prog-id=4 op=UNLOAD Oct 31 01:32:27.905000 audit: BPF prog-id=5 op=UNLOAD Oct 31 01:32:27.905000 audit: BPF prog-id=15 op=LOAD Oct 31 01:32:27.905000 audit: BPF prog-id=12 op=UNLOAD Oct 31 01:32:27.906000 audit: BPF prog-id=16 op=LOAD Oct 31 01:32:27.906000 audit: BPF prog-id=17 op=LOAD Oct 31 01:32:27.906000 audit: BPF prog-id=13 op=UNLOAD Oct 31 01:32:27.906000 audit: BPF prog-id=14 op=UNLOAD Oct 31 01:32:27.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:27.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:27.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:27.918000 audit: BPF prog-id=15 op=UNLOAD Oct 31 01:32:27.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:27.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:27.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:27.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:27.991000 audit: BPF prog-id=18 op=LOAD Oct 31 01:32:27.991000 audit: BPF prog-id=19 op=LOAD Oct 31 01:32:27.991000 audit: BPF prog-id=20 op=LOAD Oct 31 01:32:27.991000 audit: BPF prog-id=16 op=UNLOAD Oct 31 01:32:27.991000 audit: BPF prog-id=17 op=UNLOAD Oct 31 01:32:28.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.097422 systemd[1]: Started systemd-journald.service. Oct 31 01:32:28.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.089000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 31 01:32:28.089000 audit[1008]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffcd68acfb0 a2=4000 a3=7ffcd68ad04c items=0 ppid=1 pid=1008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:32:28.089000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 31 01:32:28.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:26.262986 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:32:27.904561 systemd[1]: Queued start job for default target multi-user.target. Oct 31 01:32:26.263514 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:26Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 01:32:27.904570 systemd[1]: Unnecessary job was removed for dev-sda6.device. Oct 31 01:32:26.263527 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:26Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 01:32:27.907671 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 31 01:32:26.263549 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:26Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 31 01:32:28.096049 systemd[1]: Starting systemd-journal-flush.service... Oct 31 01:32:26.263555 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:26Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 31 01:32:28.096716 systemd[1]: Finished systemd-random-seed.service. Oct 31 01:32:26.263576 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:26Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 31 01:32:28.096966 systemd[1]: Reached target first-boot-complete.target. Oct 31 01:32:26.263584 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:26Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 31 01:32:26.263717 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:26Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 31 01:32:26.263740 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:26Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 01:32:28.098533 jq[990]: true Oct 31 01:32:26.263748 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:26Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 01:32:26.264804 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:26Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 31 01:32:26.264825 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:26Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 31 01:32:26.264836 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:26Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Oct 31 01:32:26.264844 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:26Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 31 01:32:26.264854 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:26Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Oct 31 01:32:26.264861 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:26Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 31 01:32:27.641594 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:27Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:32:27.641917 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:27Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:32:27.641989 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:27Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:32:27.642117 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:27Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:32:27.642150 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:27Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 31 01:32:28.099409 jq[1016]: true Oct 31 01:32:27.642192 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-10-31T01:32:27Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 31 01:32:28.167808 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 01:32:28.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.168860 systemd[1]: Starting systemd-udev-settle.service... Oct 31 01:32:28.174709 systemd-journald[1008]: Time spent on flushing to /var/log/journal/126bb4de47644c54b9c8bf4edabb4768 is 17.570ms for 1990 entries. Oct 31 01:32:28.174709 systemd-journald[1008]: System Journal (/var/log/journal/126bb4de47644c54b9c8bf4edabb4768) is 8.0M, max 584.8M, 576.8M free. Oct 31 01:32:28.241206 systemd-journald[1008]: Received client request to flush runtime journal. Oct 31 01:32:28.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.209033 systemd[1]: Finished systemd-sysctl.service. Oct 31 01:32:28.241418 udevadm[1047]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 31 01:32:28.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.241816 systemd[1]: Finished systemd-journal-flush.service. Oct 31 01:32:28.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.269473 systemd[1]: Finished systemd-sysusers.service. Oct 31 01:32:28.350636 ignition[1043]: Ignition 2.14.0 Oct 31 01:32:28.351025 ignition[1043]: deleting config from guestinfo properties Oct 31 01:32:28.354504 ignition[1043]: Successfully deleted config Oct 31 01:32:28.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.355620 systemd[1]: Finished ignition-delete-config.service. Oct 31 01:32:28.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.605011 systemd[1]: Finished systemd-hwdb-update.service. Oct 31 01:32:28.604000 audit: BPF prog-id=21 op=LOAD Oct 31 01:32:28.604000 audit: BPF prog-id=22 op=LOAD Oct 31 01:32:28.604000 audit: BPF prog-id=7 op=UNLOAD Oct 31 01:32:28.604000 audit: BPF prog-id=8 op=UNLOAD Oct 31 01:32:28.606161 systemd[1]: Starting systemd-udevd.service... Oct 31 01:32:28.618279 systemd-udevd[1054]: Using default interface naming scheme 'v252'. Oct 31 01:32:28.648736 systemd[1]: Started systemd-udevd.service. Oct 31 01:32:28.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.648000 audit: BPF prog-id=23 op=LOAD Oct 31 01:32:28.650552 systemd[1]: Starting systemd-networkd.service... Oct 31 01:32:28.657000 audit: BPF prog-id=24 op=LOAD Oct 31 01:32:28.657000 audit: BPF prog-id=25 op=LOAD Oct 31 01:32:28.657000 audit: BPF prog-id=26 op=LOAD Oct 31 01:32:28.659234 systemd[1]: Starting systemd-userdbd.service... Oct 31 01:32:28.682058 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 31 01:32:28.707824 systemd[1]: Started systemd-userdbd.service. Oct 31 01:32:28.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.736389 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 31 01:32:28.740391 kernel: ACPI: button: Power Button [PWRF] Oct 31 01:32:28.754437 systemd-networkd[1064]: lo: Link UP Oct 31 01:32:28.754442 systemd-networkd[1064]: lo: Gained carrier Oct 31 01:32:28.755021 systemd-networkd[1064]: Enumeration completed Oct 31 01:32:28.755099 systemd-networkd[1064]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Oct 31 01:32:28.755116 systemd[1]: Started systemd-networkd.service. Oct 31 01:32:28.758730 kernel: kauditd_printk_skb: 119 callbacks suppressed Oct 31 01:32:28.758798 kernel: audit: type=1130 audit(1761874348.753:148): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.761701 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Oct 31 01:32:28.761859 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Oct 31 01:32:28.763014 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Oct 31 01:32:28.763485 systemd-networkd[1064]: ens192: Link UP Oct 31 01:32:28.763641 systemd-networkd[1064]: ens192: Gained carrier Oct 31 01:32:28.787115 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 01:32:28.840000 audit[1056]: AVC avc: denied { confidentiality } for pid=1056 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 31 01:32:28.847383 kernel: audit: type=1400 audit(1761874348.840:149): avc: denied { confidentiality } for pid=1056 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 31 01:32:28.840000 audit[1056]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555c210f9240 a1=338ec a2=7fdd9c4abbc5 a3=5 items=110 ppid=1054 pid=1056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:32:28.856427 kernel: audit: type=1300 audit(1761874348.840:149): arch=c000003e syscall=175 success=yes exit=0 a0=555c210f9240 a1=338ec a2=7fdd9c4abbc5 a3=5 items=110 ppid=1054 pid=1056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:32:28.856470 kernel: audit: type=1307 audit(1761874348.840:149): cwd="/" Oct 31 01:32:28.840000 audit: CWD cwd="/" Oct 31 01:32:28.866861 kernel: audit: type=1302 audit(1761874348.840:149): item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.866968 kernel: audit: type=1302 audit(1761874348.840:149): item=1 name=(null) inode=24680 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.866990 kernel: audit: type=1302 audit(1761874348.840:149): item=2 name=(null) inode=24680 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.867009 kernel: audit: type=1302 audit(1761874348.840:149): item=3 name=(null) inode=24681 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.867027 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Oct 31 01:32:28.875032 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Oct 31 01:32:28.875127 kernel: audit: type=1302 audit(1761874348.840:149): item=4 name=(null) inode=24680 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.875142 kernel: Guest personality initialized and is active Oct 31 01:32:28.840000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=1 name=(null) inode=24680 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=2 name=(null) inode=24680 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=3 name=(null) inode=24681 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=4 name=(null) inode=24680 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.879273 kernel: audit: type=1302 audit(1761874348.840:149): item=5 name=(null) inode=24682 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.879359 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Oct 31 01:32:28.840000 audit: PATH item=5 name=(null) inode=24682 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=6 name=(null) inode=24680 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=7 name=(null) inode=24683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=8 name=(null) inode=24683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=9 name=(null) inode=24684 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=10 name=(null) inode=24683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=11 name=(null) inode=24685 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=12 name=(null) inode=24683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=13 name=(null) inode=24686 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=14 name=(null) inode=24683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=15 name=(null) inode=24687 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=16 name=(null) inode=24683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=17 name=(null) inode=24688 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=18 name=(null) inode=24680 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=19 name=(null) inode=24689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=20 name=(null) inode=24689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=21 name=(null) inode=24690 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=22 name=(null) inode=24689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=23 name=(null) inode=24691 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=24 name=(null) inode=24689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=25 name=(null) inode=24692 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=26 name=(null) inode=24689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=27 name=(null) inode=24693 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=28 name=(null) inode=24689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=29 name=(null) inode=24694 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=30 name=(null) inode=24680 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=31 name=(null) inode=24695 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=32 name=(null) inode=24695 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=33 name=(null) inode=24696 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=34 name=(null) inode=24695 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.880699 kernel: Initialized host personality Oct 31 01:32:28.840000 audit: PATH item=35 name=(null) inode=24697 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=36 name=(null) inode=24695 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=37 name=(null) inode=24698 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=38 name=(null) inode=24695 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=39 name=(null) inode=24699 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=40 name=(null) inode=24695 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=41 name=(null) inode=24700 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=42 name=(null) inode=24680 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=43 name=(null) inode=24701 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=44 name=(null) inode=24701 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=45 name=(null) inode=24702 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=46 name=(null) inode=24701 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=47 name=(null) inode=24703 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=48 name=(null) inode=24701 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=49 name=(null) inode=24704 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=50 name=(null) inode=24701 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=51 name=(null) inode=24705 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=52 name=(null) inode=24701 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=53 name=(null) inode=24706 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=55 name=(null) inode=24707 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=56 name=(null) inode=24707 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=57 name=(null) inode=24708 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=58 name=(null) inode=24707 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=59 name=(null) inode=24709 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.881856 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Oct 31 01:32:28.840000 audit: PATH item=60 name=(null) inode=24707 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=61 name=(null) inode=24710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=62 name=(null) inode=24710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=63 name=(null) inode=24711 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=64 name=(null) inode=24710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=65 name=(null) inode=24712 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=66 name=(null) inode=24710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=67 name=(null) inode=24713 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=68 name=(null) inode=24710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=69 name=(null) inode=24714 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=70 name=(null) inode=24710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=71 name=(null) inode=24715 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=72 name=(null) inode=24707 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=73 name=(null) inode=24716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=74 name=(null) inode=24716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=75 name=(null) inode=24717 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=76 name=(null) inode=24716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=77 name=(null) inode=24718 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=78 name=(null) inode=24716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=79 name=(null) inode=24719 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=80 name=(null) inode=24716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=81 name=(null) inode=24720 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=82 name=(null) inode=24716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=83 name=(null) inode=24721 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=84 name=(null) inode=24707 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=85 name=(null) inode=24722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=86 name=(null) inode=24722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=87 name=(null) inode=24723 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=88 name=(null) inode=24722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=89 name=(null) inode=24724 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=90 name=(null) inode=24722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=91 name=(null) inode=24725 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=92 name=(null) inode=24722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=93 name=(null) inode=24726 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=94 name=(null) inode=24722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=95 name=(null) inode=24727 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=96 name=(null) inode=24707 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=97 name=(null) inode=24728 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=98 name=(null) inode=24728 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=99 name=(null) inode=24729 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=100 name=(null) inode=24728 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=101 name=(null) inode=24730 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=102 name=(null) inode=24728 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=103 name=(null) inode=24731 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=104 name=(null) inode=24728 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=105 name=(null) inode=24732 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=106 name=(null) inode=24728 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=107 name=(null) inode=24733 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PATH item=109 name=(null) inode=24734 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:32:28.840000 audit: PROCTITLE proctitle="(udev-worker)" Oct 31 01:32:28.891392 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Oct 31 01:32:28.900321 (udev-worker)[1063]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Oct 31 01:32:28.904419 kernel: mousedev: PS/2 mouse device common for all mice Oct 31 01:32:28.919661 systemd[1]: Finished systemd-udev-settle.service. Oct 31 01:32:28.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.920847 systemd[1]: Starting lvm2-activation-early.service... Oct 31 01:32:28.937990 lvm[1087]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 01:32:28.962991 systemd[1]: Finished lvm2-activation-early.service. Oct 31 01:32:28.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.963193 systemd[1]: Reached target cryptsetup.target. Oct 31 01:32:28.964187 systemd[1]: Starting lvm2-activation.service... Oct 31 01:32:28.966955 lvm[1088]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 01:32:28.985108 systemd[1]: Finished lvm2-activation.service. Oct 31 01:32:28.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:28.985307 systemd[1]: Reached target local-fs-pre.target. Oct 31 01:32:28.985421 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 31 01:32:28.985441 systemd[1]: Reached target local-fs.target. Oct 31 01:32:28.985531 systemd[1]: Reached target machines.target. Oct 31 01:32:28.986647 systemd[1]: Starting ldconfig.service... Oct 31 01:32:28.987257 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:32:28.987292 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:32:28.988174 systemd[1]: Starting systemd-boot-update.service... Oct 31 01:32:28.989065 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 31 01:32:28.990040 systemd[1]: Starting systemd-machine-id-commit.service... Oct 31 01:32:28.991707 systemd[1]: Starting systemd-sysext.service... Oct 31 01:32:28.998083 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1090 (bootctl) Oct 31 01:32:28.999081 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 31 01:32:29.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.003863 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 31 01:32:29.006168 systemd[1]: Unmounting usr-share-oem.mount... Oct 31 01:32:29.031209 systemd[1]: usr-share-oem.mount: Deactivated successfully. Oct 31 01:32:29.031331 systemd[1]: Unmounted usr-share-oem.mount. Oct 31 01:32:29.050396 kernel: loop0: detected capacity change from 0 to 219144 Oct 31 01:32:29.066965 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 31 01:32:29.067678 systemd[1]: Finished systemd-machine-id-commit.service. Oct 31 01:32:29.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.103395 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Oct 31 01:32:29.126392 kernel: loop1: detected capacity change from 0 to 219144 Oct 31 01:32:29.149215 systemd-fsck[1099]: fsck.fat 4.2 (2021-01-31) Oct 31 01:32:29.149215 systemd-fsck[1099]: /dev/sda1: 790 files, 120772/258078 clusters Oct 31 01:32:29.150785 (sd-sysext)[1102]: Using extensions 'kubernetes'. Oct 31 01:32:29.151315 (sd-sysext)[1102]: Merged extensions into '/usr'. Oct 31 01:32:29.153736 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 31 01:32:29.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.154876 systemd[1]: Mounting boot.mount... Oct 31 01:32:29.165620 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:32:29.166900 systemd[1]: Mounting usr-share-oem.mount... Oct 31 01:32:29.167944 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:32:29.170146 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:32:29.172695 systemd[1]: Starting modprobe@loop.service... Oct 31 01:32:29.172872 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:32:29.172957 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:32:29.173056 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:32:29.174850 systemd[1]: Mounted usr-share-oem.mount. Oct 31 01:32:29.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.175812 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:32:29.175900 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:32:29.176233 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:32:29.176310 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:32:29.176759 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:32:29.176833 systemd[1]: Finished modprobe@loop.service. Oct 31 01:32:29.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.177192 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:32:29.177256 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:32:29.178062 systemd[1]: Finished systemd-sysext.service. Oct 31 01:32:29.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.180379 systemd[1]: Starting ensure-sysext.service... Oct 31 01:32:29.184558 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 31 01:32:29.188056 systemd[1]: Mounted boot.mount. Oct 31 01:32:29.188897 systemd[1]: Reloading. Oct 31 01:32:29.216045 systemd-tmpfiles[1110]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 31 01:32:29.221226 systemd-tmpfiles[1110]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 31 01:32:29.225138 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2025-10-31T01:32:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:32:29.225428 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2025-10-31T01:32:29Z" level=info msg="torcx already run" Oct 31 01:32:29.229658 systemd-tmpfiles[1110]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 31 01:32:29.329313 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:32:29.329480 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:32:29.344100 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:32:29.379000 audit: BPF prog-id=27 op=LOAD Oct 31 01:32:29.380000 audit: BPF prog-id=18 op=UNLOAD Oct 31 01:32:29.380000 audit: BPF prog-id=28 op=LOAD Oct 31 01:32:29.380000 audit: BPF prog-id=29 op=LOAD Oct 31 01:32:29.380000 audit: BPF prog-id=19 op=UNLOAD Oct 31 01:32:29.380000 audit: BPF prog-id=20 op=UNLOAD Oct 31 01:32:29.380000 audit: BPF prog-id=30 op=LOAD Oct 31 01:32:29.380000 audit: BPF prog-id=23 op=UNLOAD Oct 31 01:32:29.381000 audit: BPF prog-id=31 op=LOAD Oct 31 01:32:29.381000 audit: BPF prog-id=24 op=UNLOAD Oct 31 01:32:29.381000 audit: BPF prog-id=32 op=LOAD Oct 31 01:32:29.381000 audit: BPF prog-id=33 op=LOAD Oct 31 01:32:29.381000 audit: BPF prog-id=25 op=UNLOAD Oct 31 01:32:29.382000 audit: BPF prog-id=26 op=UNLOAD Oct 31 01:32:29.382000 audit: BPF prog-id=34 op=LOAD Oct 31 01:32:29.382000 audit: BPF prog-id=35 op=LOAD Oct 31 01:32:29.382000 audit: BPF prog-id=21 op=UNLOAD Oct 31 01:32:29.382000 audit: BPF prog-id=22 op=UNLOAD Oct 31 01:32:29.385003 systemd[1]: Finished systemd-boot-update.service. Oct 31 01:32:29.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.394139 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:32:29.396019 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:32:29.397277 systemd[1]: Starting modprobe@loop.service... Oct 31 01:32:29.398113 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:32:29.398268 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:32:29.399010 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:32:29.399160 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:32:29.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.399951 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:32:29.400078 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:32:29.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.400862 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:32:29.400937 systemd[1]: Finished modprobe@loop.service. Oct 31 01:32:29.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.403055 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:32:29.403895 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:32:29.405068 systemd[1]: Starting modprobe@loop.service... Oct 31 01:32:29.405730 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:32:29.405800 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:32:29.406222 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:32:29.406295 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:32:29.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.406920 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:32:29.406990 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:32:29.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.407528 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:32:29.407598 systemd[1]: Finished modprobe@loop.service. Oct 31 01:32:29.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.408106 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:32:29.408164 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:32:29.410671 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:32:29.412064 systemd[1]: Starting modprobe@drm.service... Oct 31 01:32:29.412858 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:32:29.414228 systemd[1]: Starting modprobe@loop.service... Oct 31 01:32:29.415056 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:32:29.415130 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:32:29.416129 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 31 01:32:29.417062 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:32:29.417142 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:32:29.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.417710 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 01:32:29.417782 systemd[1]: Finished modprobe@drm.service. Oct 31 01:32:29.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.418259 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:32:29.418427 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:32:29.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.418875 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:32:29.419009 systemd[1]: Finished modprobe@loop.service. Oct 31 01:32:29.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.419594 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:32:29.419655 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:32:29.420480 systemd[1]: Finished ensure-sysext.service. Oct 31 01:32:29.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.425639 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 31 01:32:29.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.428000 audit: BPF prog-id=36 op=LOAD Oct 31 01:32:29.426843 systemd[1]: Starting audit-rules.service... Oct 31 01:32:29.427720 systemd[1]: Starting clean-ca-certificates.service... Oct 31 01:32:29.428598 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 31 01:32:29.430369 systemd[1]: Starting systemd-resolved.service... Oct 31 01:32:29.431000 audit: BPF prog-id=37 op=LOAD Oct 31 01:32:29.433487 systemd[1]: Starting systemd-timesyncd.service... Oct 31 01:32:29.434690 systemd[1]: Starting systemd-update-utmp.service... Oct 31 01:32:29.440000 audit[1207]: SYSTEM_BOOT pid=1207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.442263 systemd[1]: Finished clean-ca-certificates.service. Oct 31 01:32:29.442437 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 01:32:29.443042 systemd[1]: Finished systemd-update-utmp.service. Oct 31 01:32:29.456656 ldconfig[1089]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 31 01:32:29.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.474061 systemd[1]: Finished ldconfig.service. Oct 31 01:32:29.480711 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 31 01:32:29.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:32:29.481889 systemd[1]: Starting systemd-update-done.service... Oct 31 01:32:29.482542 augenrules[1222]: No rules Oct 31 01:32:29.481000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 31 01:32:29.481000 audit[1222]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc8cf1e360 a2=420 a3=0 items=0 ppid=1202 pid=1222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:32:29.481000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 31 01:32:29.483979 systemd[1]: Finished audit-rules.service. Oct 31 01:32:29.484634 systemd-resolved[1205]: Positive Trust Anchors: Oct 31 01:32:29.484763 systemd-resolved[1205]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 01:32:29.484827 systemd-resolved[1205]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 01:32:29.486722 systemd[1]: Finished systemd-update-done.service. Oct 31 01:32:29.543299 systemd[1]: Started systemd-timesyncd.service. Oct 31 01:32:29.543501 systemd[1]: Reached target time-set.target. Oct 31 01:32:29.631581 systemd-resolved[1205]: Defaulting to hostname 'linux'. Oct 31 01:32:29.632684 systemd[1]: Started systemd-resolved.service. Oct 31 01:32:29.632849 systemd[1]: Reached target network.target. Oct 31 01:32:29.632938 systemd[1]: Reached target nss-lookup.target. Oct 31 01:32:29.633028 systemd[1]: Reached target sysinit.target. Oct 31 01:32:29.633163 systemd[1]: Started motdgen.path. Oct 31 01:32:29.633271 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 31 01:32:29.633488 systemd[1]: Started logrotate.timer. Oct 31 01:32:29.633611 systemd[1]: Started mdadm.timer. Oct 31 01:32:29.633721 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 31 01:32:29.633817 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 31 01:32:29.633833 systemd[1]: Reached target paths.target. Oct 31 01:34:07.841975 systemd[1]: Reached target timers.target. Oct 31 01:34:07.842042 systemd-resolved[1205]: Clock change detected. Flushing caches. Oct 31 01:34:07.842144 systemd-timesyncd[1206]: Contacted time server 172.233.177.198:123 (0.flatcar.pool.ntp.org). Oct 31 01:34:07.842216 systemd[1]: Listening on dbus.socket. Oct 31 01:34:07.842378 systemd-timesyncd[1206]: Initial clock synchronization to Fri 2025-10-31 01:34:07.841971 UTC. Oct 31 01:34:07.843104 systemd[1]: Starting docker.socket... Oct 31 01:34:07.852364 systemd[1]: Listening on sshd.socket. Oct 31 01:34:07.852562 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:34:07.852864 systemd[1]: Listening on docker.socket. Oct 31 01:34:07.853057 systemd[1]: Reached target sockets.target. Oct 31 01:34:07.853149 systemd[1]: Reached target basic.target. Oct 31 01:34:07.853263 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 01:34:07.853289 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 01:34:07.853998 systemd[1]: Starting containerd.service... Oct 31 01:34:07.854753 systemd[1]: Starting dbus.service... Oct 31 01:34:07.855871 systemd[1]: Starting enable-oem-cloudinit.service... Oct 31 01:34:07.856853 systemd[1]: Starting extend-filesystems.service... Oct 31 01:34:07.857352 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 31 01:34:07.858000 jq[1233]: false Oct 31 01:34:07.859565 systemd[1]: Starting motdgen.service... Oct 31 01:34:07.860380 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 31 01:34:07.861213 systemd[1]: Starting sshd-keygen.service... Oct 31 01:34:07.862798 systemd[1]: Starting systemd-logind.service... Oct 31 01:34:07.862907 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:34:07.862954 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 31 01:34:07.863331 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 31 01:34:07.863671 systemd[1]: Starting update-engine.service... Oct 31 01:34:07.864426 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 31 01:34:07.865290 systemd[1]: Starting vmtoolsd.service... Oct 31 01:34:07.866812 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 31 01:34:07.866933 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 31 01:34:07.870459 jq[1242]: true Oct 31 01:34:07.872993 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 31 01:34:07.873103 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 31 01:34:07.876856 jq[1245]: true Oct 31 01:34:07.886858 systemd[1]: Started vmtoolsd.service. Oct 31 01:34:07.897693 systemd[1]: motdgen.service: Deactivated successfully. Oct 31 01:34:07.897804 systemd[1]: Finished motdgen.service. Oct 31 01:34:07.907352 extend-filesystems[1234]: Found loop1 Oct 31 01:34:07.907637 extend-filesystems[1234]: Found sda Oct 31 01:34:07.907637 extend-filesystems[1234]: Found sda1 Oct 31 01:34:07.907637 extend-filesystems[1234]: Found sda2 Oct 31 01:34:07.907637 extend-filesystems[1234]: Found sda3 Oct 31 01:34:07.907637 extend-filesystems[1234]: Found usr Oct 31 01:34:07.907637 extend-filesystems[1234]: Found sda4 Oct 31 01:34:07.907637 extend-filesystems[1234]: Found sda6 Oct 31 01:34:07.907637 extend-filesystems[1234]: Found sda7 Oct 31 01:34:07.907637 extend-filesystems[1234]: Found sda9 Oct 31 01:34:07.907637 extend-filesystems[1234]: Checking size of /dev/sda9 Oct 31 01:34:07.921277 env[1254]: time="2025-10-31T01:34:07.921249863Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 31 01:34:07.936330 env[1254]: time="2025-10-31T01:34:07.936300916Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 31 01:34:07.936514 env[1254]: time="2025-10-31T01:34:07.936501998Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:34:07.937570 env[1254]: time="2025-10-31T01:34:07.937541080Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 31 01:34:07.937570 env[1254]: time="2025-10-31T01:34:07.937562085Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:34:07.937723 env[1254]: time="2025-10-31T01:34:07.937700568Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 01:34:07.937723 env[1254]: time="2025-10-31T01:34:07.937715729Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 31 01:34:07.937769 env[1254]: time="2025-10-31T01:34:07.937725854Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 31 01:34:07.937769 env[1254]: time="2025-10-31T01:34:07.937731775Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 31 01:34:07.937804 env[1254]: time="2025-10-31T01:34:07.937776066Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:34:07.937945 env[1254]: time="2025-10-31T01:34:07.937931573Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:34:07.938022 env[1254]: time="2025-10-31T01:34:07.938006586Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 01:34:07.938022 env[1254]: time="2025-10-31T01:34:07.938018800Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 31 01:34:07.938075 env[1254]: time="2025-10-31T01:34:07.938046856Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 31 01:34:07.938075 env[1254]: time="2025-10-31T01:34:07.938054876Z" level=info msg="metadata content store policy set" policy=shared Oct 31 01:34:07.950366 extend-filesystems[1234]: Old size kept for /dev/sda9 Oct 31 01:34:07.950366 extend-filesystems[1234]: Found sr0 Oct 31 01:34:07.949917 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 31 01:34:07.950487 dbus-daemon[1232]: [system] SELinux support is enabled Oct 31 01:34:07.950021 systemd[1]: Finished extend-filesystems.service. Oct 31 01:34:07.950941 systemd[1]: Started dbus.service. Oct 31 01:34:07.952176 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 31 01:34:07.955083 env[1254]: time="2025-10-31T01:34:07.954704599Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 31 01:34:07.955083 env[1254]: time="2025-10-31T01:34:07.954730795Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 31 01:34:07.955083 env[1254]: time="2025-10-31T01:34:07.954755642Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 31 01:34:07.955083 env[1254]: time="2025-10-31T01:34:07.954781660Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 31 01:34:07.955083 env[1254]: time="2025-10-31T01:34:07.954790800Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 31 01:34:07.955083 env[1254]: time="2025-10-31T01:34:07.954798661Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 31 01:34:07.955083 env[1254]: time="2025-10-31T01:34:07.954805690Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 31 01:34:07.952206 systemd[1]: Reached target system-config.target. Oct 31 01:34:07.955259 env[1254]: time="2025-10-31T01:34:07.954814513Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 31 01:34:07.955259 env[1254]: time="2025-10-31T01:34:07.955140217Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 31 01:34:07.955259 env[1254]: time="2025-10-31T01:34:07.955150301Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 31 01:34:07.955259 env[1254]: time="2025-10-31T01:34:07.955164523Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 31 01:34:07.955259 env[1254]: time="2025-10-31T01:34:07.955175521Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 31 01:34:07.952325 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 31 01:34:07.952334 systemd[1]: Reached target user-config.target. Oct 31 01:34:07.956301 env[1254]: time="2025-10-31T01:34:07.956218410Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 31 01:34:07.957047 bash[1276]: Updated "/home/core/.ssh/authorized_keys" Oct 31 01:34:07.956878 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 31 01:34:07.957148 env[1254]: time="2025-10-31T01:34:07.956741988Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 31 01:34:07.957148 env[1254]: time="2025-10-31T01:34:07.956929308Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 31 01:34:07.957148 env[1254]: time="2025-10-31T01:34:07.956959621Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 31 01:34:07.957148 env[1254]: time="2025-10-31T01:34:07.956971322Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 31 01:34:07.957148 env[1254]: time="2025-10-31T01:34:07.957002303Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 31 01:34:07.957148 env[1254]: time="2025-10-31T01:34:07.957012794Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 31 01:34:07.957921 env[1254]: time="2025-10-31T01:34:07.957337909Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 31 01:34:07.957921 env[1254]: time="2025-10-31T01:34:07.957349857Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 31 01:34:07.957921 env[1254]: time="2025-10-31T01:34:07.957357489Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 31 01:34:07.957921 env[1254]: time="2025-10-31T01:34:07.957364543Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 31 01:34:07.957921 env[1254]: time="2025-10-31T01:34:07.957371387Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 31 01:34:07.957921 env[1254]: time="2025-10-31T01:34:07.957378483Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 31 01:34:07.957921 env[1254]: time="2025-10-31T01:34:07.957397313Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 31 01:34:07.957921 env[1254]: time="2025-10-31T01:34:07.957493396Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 31 01:34:07.957921 env[1254]: time="2025-10-31T01:34:07.957504063Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 31 01:34:07.957921 env[1254]: time="2025-10-31T01:34:07.957511974Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 31 01:34:07.957921 env[1254]: time="2025-10-31T01:34:07.957528008Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 31 01:34:07.957921 env[1254]: time="2025-10-31T01:34:07.957537796Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 31 01:34:07.957921 env[1254]: time="2025-10-31T01:34:07.957544578Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 31 01:34:07.957921 env[1254]: time="2025-10-31T01:34:07.957554678Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 31 01:34:07.958174 env[1254]: time="2025-10-31T01:34:07.957576827Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 31 01:34:07.958192 env[1254]: time="2025-10-31T01:34:07.958124733Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 31 01:34:07.958192 env[1254]: time="2025-10-31T01:34:07.958170136Z" level=info msg="Connect containerd service" Oct 31 01:34:07.958192 env[1254]: time="2025-10-31T01:34:07.958189752Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 31 01:34:07.961926 systemd-logind[1240]: Watching system buttons on /dev/input/event1 (Power Button) Oct 31 01:34:07.961939 systemd-logind[1240]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 31 01:34:07.963059 env[1254]: time="2025-10-31T01:34:07.962768636Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 01:34:07.963059 env[1254]: time="2025-10-31T01:34:07.962943478Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 31 01:34:07.963059 env[1254]: time="2025-10-31T01:34:07.962967374Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 31 01:34:07.963059 env[1254]: time="2025-10-31T01:34:07.963002853Z" level=info msg="containerd successfully booted in 0.042247s" Oct 31 01:34:07.963048 systemd[1]: Started containerd.service. Oct 31 01:34:07.963456 systemd-logind[1240]: New seat seat0. Oct 31 01:34:07.964655 systemd[1]: Started systemd-logind.service. Oct 31 01:34:07.974485 kernel: NET: Registered PF_VSOCK protocol family Oct 31 01:34:07.976558 update_engine[1241]: I1031 01:34:07.975967 1241 main.cc:92] Flatcar Update Engine starting Oct 31 01:34:07.979703 systemd[1]: Started update-engine.service. Oct 31 01:34:07.981172 systemd[1]: Started locksmithd.service. Oct 31 01:34:07.981985 update_engine[1241]: I1031 01:34:07.981921 1241 update_check_scheduler.cc:74] Next update check in 3m23s Oct 31 01:34:07.989727 env[1254]: time="2025-10-31T01:34:07.989692293Z" level=info msg="Start subscribing containerd event" Oct 31 01:34:07.997331 env[1254]: time="2025-10-31T01:34:07.997300472Z" level=info msg="Start recovering state" Oct 31 01:34:07.998971 env[1254]: time="2025-10-31T01:34:07.998949474Z" level=info msg="Start event monitor" Oct 31 01:34:07.999100 env[1254]: time="2025-10-31T01:34:07.999088817Z" level=info msg="Start snapshots syncer" Oct 31 01:34:07.999416 env[1254]: time="2025-10-31T01:34:07.999402191Z" level=info msg="Start cni network conf syncer for default" Oct 31 01:34:07.999485 env[1254]: time="2025-10-31T01:34:07.999475970Z" level=info msg="Start streaming server" Oct 31 01:34:08.098532 locksmithd[1291]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 31 01:34:08.239576 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:34:08.239628 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:34:08.436905 sshd_keygen[1252]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 31 01:34:08.452554 systemd[1]: Finished sshd-keygen.service. Oct 31 01:34:08.453820 systemd[1]: Starting issuegen.service... Oct 31 01:34:08.457786 systemd[1]: issuegen.service: Deactivated successfully. Oct 31 01:34:08.457889 systemd[1]: Finished issuegen.service. Oct 31 01:34:08.459152 systemd[1]: Starting systemd-user-sessions.service... Oct 31 01:34:08.464059 systemd[1]: Finished systemd-user-sessions.service. Oct 31 01:34:08.465136 systemd[1]: Started getty@tty1.service. Oct 31 01:34:08.466045 systemd[1]: Started serial-getty@ttyS0.service. Oct 31 01:34:08.466253 systemd[1]: Reached target getty.target. Oct 31 01:34:08.883578 systemd-networkd[1064]: ens192: Gained IPv6LL Oct 31 01:34:08.884848 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 31 01:34:08.885168 systemd[1]: Reached target network-online.target. Oct 31 01:34:08.886477 systemd[1]: Starting kubelet.service... Oct 31 01:34:09.932021 systemd[1]: Started kubelet.service. Oct 31 01:34:09.932497 systemd[1]: Reached target multi-user.target. Oct 31 01:34:09.933935 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 31 01:34:09.939917 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 31 01:34:09.940019 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 31 01:34:09.940224 systemd[1]: Startup finished in 997ms (kernel) + 6.363s (initrd) + 5.792s (userspace) = 13.152s. Oct 31 01:34:09.977662 login[1355]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 31 01:34:09.978908 login[1356]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 31 01:34:09.987172 systemd[1]: Created slice user-500.slice. Oct 31 01:34:09.988019 systemd[1]: Starting user-runtime-dir@500.service... Oct 31 01:34:09.993302 systemd-logind[1240]: New session 1 of user core. Oct 31 01:34:09.995464 systemd-logind[1240]: New session 2 of user core. Oct 31 01:34:09.998569 systemd[1]: Finished user-runtime-dir@500.service. Oct 31 01:34:09.999688 systemd[1]: Starting user@500.service... Oct 31 01:34:10.003043 (systemd)[1364]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:34:10.082265 systemd[1364]: Queued start job for default target default.target. Oct 31 01:34:10.082625 systemd[1364]: Reached target paths.target. Oct 31 01:34:10.082639 systemd[1364]: Reached target sockets.target. Oct 31 01:34:10.082650 systemd[1364]: Reached target timers.target. Oct 31 01:34:10.082657 systemd[1364]: Reached target basic.target. Oct 31 01:34:10.082696 systemd[1364]: Reached target default.target. Oct 31 01:34:10.082719 systemd[1364]: Startup finished in 75ms. Oct 31 01:34:10.082745 systemd[1]: Started user@500.service. Oct 31 01:34:10.083657 systemd[1]: Started session-1.scope. Oct 31 01:34:10.084170 systemd[1]: Started session-2.scope. Oct 31 01:34:10.537001 kubelet[1361]: E1031 01:34:10.536958 1361 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 01:34:10.538243 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 01:34:10.538327 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 01:34:20.753041 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 31 01:34:20.753184 systemd[1]: Stopped kubelet.service. Oct 31 01:34:20.754200 systemd[1]: Starting kubelet.service... Oct 31 01:34:20.881917 systemd[1]: Started kubelet.service. Oct 31 01:34:20.948731 kubelet[1393]: E1031 01:34:20.948695 1393 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 01:34:20.951571 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 01:34:20.951679 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 01:34:31.003052 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 31 01:34:31.003182 systemd[1]: Stopped kubelet.service. Oct 31 01:34:31.004274 systemd[1]: Starting kubelet.service... Oct 31 01:34:31.268676 systemd[1]: Started kubelet.service. Oct 31 01:34:31.300776 kubelet[1403]: E1031 01:34:31.300733 1403 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 01:34:31.302420 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 01:34:31.302525 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 01:34:38.137688 systemd[1]: Created slice system-sshd.slice. Oct 31 01:34:38.138917 systemd[1]: Started sshd@0-139.178.70.107:22-147.75.109.163:39690.service. Oct 31 01:34:38.345694 sshd[1409]: Accepted publickey for core from 147.75.109.163 port 39690 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:34:38.346882 sshd[1409]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:34:38.351068 systemd-logind[1240]: New session 3 of user core. Oct 31 01:34:38.351241 systemd[1]: Started session-3.scope. Oct 31 01:34:38.400409 systemd[1]: Started sshd@1-139.178.70.107:22-147.75.109.163:39694.service. Oct 31 01:34:38.445171 sshd[1414]: Accepted publickey for core from 147.75.109.163 port 39694 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:34:38.446365 sshd[1414]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:34:38.449613 systemd-logind[1240]: New session 4 of user core. Oct 31 01:34:38.450172 systemd[1]: Started session-4.scope. Oct 31 01:34:38.501547 sshd[1414]: pam_unix(sshd:session): session closed for user core Oct 31 01:34:38.503135 systemd[1]: Started sshd@2-139.178.70.107:22-147.75.109.163:39702.service. Oct 31 01:34:38.504489 systemd[1]: sshd@1-139.178.70.107:22-147.75.109.163:39694.service: Deactivated successfully. Oct 31 01:34:38.504901 systemd[1]: session-4.scope: Deactivated successfully. Oct 31 01:34:38.505695 systemd-logind[1240]: Session 4 logged out. Waiting for processes to exit. Oct 31 01:34:38.506298 systemd-logind[1240]: Removed session 4. Oct 31 01:34:38.537229 sshd[1419]: Accepted publickey for core from 147.75.109.163 port 39702 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:34:38.538134 sshd[1419]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:34:38.540883 systemd-logind[1240]: New session 5 of user core. Oct 31 01:34:38.541390 systemd[1]: Started session-5.scope. Oct 31 01:34:38.590725 sshd[1419]: pam_unix(sshd:session): session closed for user core Oct 31 01:34:38.593403 systemd[1]: Started sshd@3-139.178.70.107:22-147.75.109.163:39704.service. Oct 31 01:34:38.593892 systemd[1]: sshd@2-139.178.70.107:22-147.75.109.163:39702.service: Deactivated successfully. Oct 31 01:34:38.594665 systemd[1]: session-5.scope: Deactivated successfully. Oct 31 01:34:38.595218 systemd-logind[1240]: Session 5 logged out. Waiting for processes to exit. Oct 31 01:34:38.596194 systemd-logind[1240]: Removed session 5. Oct 31 01:34:38.633702 sshd[1425]: Accepted publickey for core from 147.75.109.163 port 39704 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:34:38.634843 sshd[1425]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:34:38.637471 systemd-logind[1240]: New session 6 of user core. Oct 31 01:34:38.638351 systemd[1]: Started session-6.scope. Oct 31 01:34:38.689882 sshd[1425]: pam_unix(sshd:session): session closed for user core Oct 31 01:34:38.693128 systemd[1]: Started sshd@4-139.178.70.107:22-147.75.109.163:39716.service. Oct 31 01:34:38.693603 systemd[1]: sshd@3-139.178.70.107:22-147.75.109.163:39704.service: Deactivated successfully. Oct 31 01:34:38.694232 systemd[1]: session-6.scope: Deactivated successfully. Oct 31 01:34:38.695012 systemd-logind[1240]: Session 6 logged out. Waiting for processes to exit. Oct 31 01:34:38.696262 systemd-logind[1240]: Removed session 6. Oct 31 01:34:38.730159 sshd[1431]: Accepted publickey for core from 147.75.109.163 port 39716 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:34:38.731244 sshd[1431]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:34:38.734457 systemd[1]: Started session-7.scope. Oct 31 01:34:38.735403 systemd-logind[1240]: New session 7 of user core. Oct 31 01:34:38.954051 sudo[1435]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 31 01:34:38.954410 sudo[1435]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:34:38.964578 dbus-daemon[1232]: \xd0\xddz\xaa-V: received setenforce notice (enforcing=-1747647184) Oct 31 01:34:38.966076 sudo[1435]: pam_unix(sudo:session): session closed for user root Oct 31 01:34:38.982252 sshd[1431]: pam_unix(sshd:session): session closed for user core Oct 31 01:34:38.984298 systemd[1]: Started sshd@5-139.178.70.107:22-147.75.109.163:39718.service. Oct 31 01:34:38.986639 systemd[1]: sshd@4-139.178.70.107:22-147.75.109.163:39716.service: Deactivated successfully. Oct 31 01:34:38.987212 systemd[1]: session-7.scope: Deactivated successfully. Oct 31 01:34:38.988179 systemd-logind[1240]: Session 7 logged out. Waiting for processes to exit. Oct 31 01:34:38.989052 systemd-logind[1240]: Removed session 7. Oct 31 01:34:39.018825 sshd[1438]: Accepted publickey for core from 147.75.109.163 port 39718 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:34:39.020200 sshd[1438]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:34:39.023704 systemd[1]: Started session-8.scope. Oct 31 01:34:39.024066 systemd-logind[1240]: New session 8 of user core. Oct 31 01:34:39.074350 sudo[1443]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 31 01:34:39.074697 sudo[1443]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:34:39.077179 sudo[1443]: pam_unix(sudo:session): session closed for user root Oct 31 01:34:39.081364 sudo[1442]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 31 01:34:39.081615 sudo[1442]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:34:39.088552 systemd[1]: Stopping audit-rules.service... Oct 31 01:34:39.088000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 01:34:39.095845 kernel: kauditd_printk_skb: 169 callbacks suppressed Oct 31 01:34:39.095938 kernel: audit: type=1305 audit(1761874479.088:212): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 01:34:39.088000 audit[1446]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe39e7c480 a2=420 a3=0 items=0 ppid=1 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:39.098099 auditctl[1446]: No rules Oct 31 01:34:39.101898 kernel: audit: type=1300 audit(1761874479.088:212): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe39e7c480 a2=420 a3=0 items=0 ppid=1 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:39.098500 systemd[1]: audit-rules.service: Deactivated successfully. Oct 31 01:34:39.098625 systemd[1]: Stopped audit-rules.service. Oct 31 01:34:39.088000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 31 01:34:39.102678 systemd[1]: Starting audit-rules.service... Oct 31 01:34:39.103475 kernel: audit: type=1327 audit(1761874479.088:212): proctitle=2F7362696E2F617564697463746C002D44 Oct 31 01:34:39.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:39.106325 kernel: audit: type=1131 audit(1761874479.096:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:39.116020 augenrules[1463]: No rules Oct 31 01:34:39.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:39.117182 sudo[1442]: pam_unix(sudo:session): session closed for user root Oct 31 01:34:39.116550 systemd[1]: Finished audit-rules.service. Oct 31 01:34:39.115000 audit[1442]: USER_END pid=1442 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:34:39.122505 kernel: audit: type=1130 audit(1761874479.115:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:39.122561 kernel: audit: type=1106 audit(1761874479.115:215): pid=1442 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:34:39.122632 sshd[1438]: pam_unix(sshd:session): session closed for user core Oct 31 01:34:39.115000 audit[1442]: CRED_DISP pid=1442 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:34:39.125167 systemd[1]: Started sshd@6-139.178.70.107:22-147.75.109.163:39720.service. Oct 31 01:34:39.125541 kernel: audit: type=1104 audit(1761874479.115:216): pid=1442 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:34:39.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.107:22-147.75.109.163:39720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:39.128608 kernel: audit: type=1130 audit(1761874479.123:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.107:22-147.75.109.163:39720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:39.127000 audit[1438]: USER_END pid=1438 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:34:39.130057 systemd[1]: sshd@5-139.178.70.107:22-147.75.109.163:39718.service: Deactivated successfully. Oct 31 01:34:39.130531 systemd[1]: session-8.scope: Deactivated successfully. Oct 31 01:34:39.131465 systemd-logind[1240]: Session 8 logged out. Waiting for processes to exit. Oct 31 01:34:39.132100 systemd-logind[1240]: Removed session 8. Oct 31 01:34:39.127000 audit[1438]: CRED_DISP pid=1438 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:34:39.136853 kernel: audit: type=1106 audit(1761874479.127:218): pid=1438 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:34:39.136922 kernel: audit: type=1104 audit(1761874479.127:219): pid=1438 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:34:39.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.107:22-147.75.109.163:39718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:39.163000 audit[1468]: USER_ACCT pid=1468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:34:39.165379 sshd[1468]: Accepted publickey for core from 147.75.109.163 port 39720 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:34:39.164000 audit[1468]: CRED_ACQ pid=1468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:34:39.164000 audit[1468]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3095c650 a2=3 a3=0 items=0 ppid=1 pid=1468 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:39.164000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:34:39.166277 sshd[1468]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:34:39.169392 systemd[1]: Started session-9.scope. Oct 31 01:34:39.170176 systemd-logind[1240]: New session 9 of user core. Oct 31 01:34:39.171000 audit[1468]: USER_START pid=1468 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:34:39.172000 audit[1471]: CRED_ACQ pid=1471 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:34:39.217000 audit[1472]: USER_ACCT pid=1472 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:34:39.217000 audit[1472]: CRED_REFR pid=1472 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:34:39.219216 sudo[1472]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 31 01:34:39.219950 sudo[1472]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:34:39.219000 audit[1472]: USER_START pid=1472 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:34:39.226173 systemd[1]: /etc/systemd/system/coreos-metadata.service:11: Ignoring unknown escape sequences: "echo "COREOS_CUSTOM_PRIVATE_IPV4=$(ip addr show ens192 | grep "inet 10." | grep -Po "inet \K[\d.]+") Oct 31 01:34:39.227973 systemd[1]: Starting coreos-metadata.service... Oct 31 01:34:39.319899 systemd[1]: coreos-metadata.service: Deactivated successfully. Oct 31 01:34:39.320017 systemd[1]: Finished coreos-metadata.service. Oct 31 01:34:39.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:39.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:41.503259 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Oct 31 01:34:41.503472 systemd[1]: Stopped kubelet.service. Oct 31 01:34:41.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:41.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:41.505181 systemd[1]: Starting kubelet.service... Oct 31 01:34:42.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:42.671481 systemd[1]: Started kubelet.service. Oct 31 01:34:42.702213 systemd[1]: Stopping kubelet.service... Oct 31 01:34:42.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:42.703855 systemd[1]: kubelet.service: Deactivated successfully. Oct 31 01:34:42.703975 systemd[1]: Stopped kubelet.service. Oct 31 01:34:42.705763 systemd[1]: Starting kubelet.service... Oct 31 01:34:42.724722 systemd[1]: Reloading. Oct 31 01:34:42.799141 /usr/lib/systemd/system-generators/torcx-generator[1543]: time="2025-10-31T01:34:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:34:42.799386 /usr/lib/systemd/system-generators/torcx-generator[1543]: time="2025-10-31T01:34:42Z" level=info msg="torcx already run" Oct 31 01:34:42.860642 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:34:42.860660 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:34:42.873789 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:34:42.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.921000 audit: BPF prog-id=43 op=LOAD Oct 31 01:34:42.922000 audit: BPF prog-id=41 op=UNLOAD Oct 31 01:34:42.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.922000 audit: BPF prog-id=44 op=LOAD Oct 31 01:34:42.922000 audit: BPF prog-id=38 op=UNLOAD Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit: BPF prog-id=45 op=LOAD Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit: BPF prog-id=46 op=LOAD Oct 31 01:34:42.923000 audit: BPF prog-id=39 op=UNLOAD Oct 31 01:34:42.923000 audit: BPF prog-id=40 op=UNLOAD Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.923000 audit: BPF prog-id=47 op=LOAD Oct 31 01:34:42.923000 audit: BPF prog-id=36 op=UNLOAD Oct 31 01:34:42.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.924000 audit: BPF prog-id=48 op=LOAD Oct 31 01:34:42.924000 audit: BPF prog-id=27 op=UNLOAD Oct 31 01:34:42.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit: BPF prog-id=49 op=LOAD Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit: BPF prog-id=50 op=LOAD Oct 31 01:34:42.925000 audit: BPF prog-id=28 op=UNLOAD Oct 31 01:34:42.925000 audit: BPF prog-id=29 op=UNLOAD Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.925000 audit: BPF prog-id=51 op=LOAD Oct 31 01:34:42.925000 audit: BPF prog-id=30 op=UNLOAD Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit: BPF prog-id=52 op=LOAD Oct 31 01:34:42.926000 audit: BPF prog-id=31 op=UNLOAD Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit: BPF prog-id=53 op=LOAD Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.926000 audit: BPF prog-id=54 op=LOAD Oct 31 01:34:42.926000 audit: BPF prog-id=32 op=UNLOAD Oct 31 01:34:42.926000 audit: BPF prog-id=33 op=UNLOAD Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit: BPF prog-id=55 op=LOAD Oct 31 01:34:42.927000 audit: BPF prog-id=37 op=UNLOAD Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit: BPF prog-id=56 op=LOAD Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:42.927000 audit: BPF prog-id=57 op=LOAD Oct 31 01:34:42.927000 audit: BPF prog-id=34 op=UNLOAD Oct 31 01:34:42.927000 audit: BPF prog-id=35 op=UNLOAD Oct 31 01:34:42.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 01:34:42.976515 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Oct 31 01:34:42.976588 systemd[1]: kubelet.service: Failed with result 'signal'. Oct 31 01:34:42.976788 systemd[1]: Stopped kubelet.service. Oct 31 01:34:42.978574 systemd[1]: Starting kubelet.service... Oct 31 01:34:43.521516 systemd[1]: Started kubelet.service. Oct 31 01:34:43.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:43.546817 kubelet[1606]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 31 01:34:43.547067 kubelet[1606]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 01:34:43.547150 kubelet[1606]: I1031 01:34:43.547133 1606 server.go:213] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 31 01:34:44.308619 kubelet[1606]: I1031 01:34:44.308497 1606 server.go:529] "Kubelet version" kubeletVersion="v1.34.1" Oct 31 01:34:44.308780 kubelet[1606]: I1031 01:34:44.308771 1606 server.go:531] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 31 01:34:44.322250 kubelet[1606]: I1031 01:34:44.322218 1606 watchdog_linux.go:95] "Systemd watchdog is not enabled" Oct 31 01:34:44.322368 kubelet[1606]: I1031 01:34:44.322359 1606 watchdog_linux.go:137] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 31 01:34:44.322618 kubelet[1606]: I1031 01:34:44.322608 1606 server.go:956] "Client rotation is on, will bootstrap in background" Oct 31 01:34:44.328911 kubelet[1606]: I1031 01:34:44.328881 1606 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 31 01:34:44.335455 kubelet[1606]: E1031 01:34:44.335417 1606 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 31 01:34:44.335599 kubelet[1606]: I1031 01:34:44.335473 1606 server.go:1400] "CRI implementation should be updated to support RuntimeConfig. Falling back to using cgroupDriver from kubelet config." Oct 31 01:34:44.343359 kubelet[1606]: I1031 01:34:44.343330 1606 server.go:781] "--cgroups-per-qos enabled, but --cgroup-root was not specified. Defaulting to /" Oct 31 01:34:44.347108 kubelet[1606]: I1031 01:34:44.347052 1606 container_manager_linux.go:270] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 31 01:34:44.347289 kubelet[1606]: I1031 01:34:44.347106 1606 container_manager_linux.go:275] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.67.124.139","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 31 01:34:44.347387 kubelet[1606]: I1031 01:34:44.347293 1606 topology_manager.go:138] "Creating topology manager with none policy" Oct 31 01:34:44.347387 kubelet[1606]: I1031 01:34:44.347302 1606 container_manager_linux.go:306] "Creating device plugin manager" Oct 31 01:34:44.347458 kubelet[1606]: I1031 01:34:44.347397 1606 container_manager_linux.go:315] "Creating Dynamic Resource Allocation (DRA) manager" Oct 31 01:34:44.362772 kubelet[1606]: I1031 01:34:44.362741 1606 state_mem.go:36] "Initialized new in-memory state store" Oct 31 01:34:44.369825 kubelet[1606]: I1031 01:34:44.369792 1606 kubelet.go:475] "Attempting to sync node with API server" Oct 31 01:34:44.370117 kubelet[1606]: I1031 01:34:44.369828 1606 kubelet.go:376] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 31 01:34:44.370155 kubelet[1606]: I1031 01:34:44.370134 1606 kubelet.go:387] "Adding apiserver pod source" Oct 31 01:34:44.370405 kubelet[1606]: E1031 01:34:44.370390 1606 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:34:44.370447 kubelet[1606]: E1031 01:34:44.370419 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:34:44.370447 kubelet[1606]: I1031 01:34:44.370442 1606 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 31 01:34:44.379844 kubelet[1606]: I1031 01:34:44.379821 1606 kuberuntime_manager.go:291] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 31 01:34:44.380165 kubelet[1606]: I1031 01:34:44.380148 1606 kubelet.go:940] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Oct 31 01:34:44.380215 kubelet[1606]: I1031 01:34:44.380171 1606 kubelet.go:964] "Not starting PodCertificateRequest manager because we are in static kubelet mode or the PodCertificateProjection feature gate is disabled" Oct 31 01:34:44.380215 kubelet[1606]: W1031 01:34:44.380201 1606 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 31 01:34:44.381414 kubelet[1606]: I1031 01:34:44.381399 1606 server.go:1262] "Started kubelet" Oct 31 01:34:44.381655 kubelet[1606]: I1031 01:34:44.381634 1606 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Oct 31 01:34:44.382239 kubelet[1606]: I1031 01:34:44.382223 1606 server.go:310] "Adding debug handlers to kubelet server" Oct 31 01:34:44.383000 audit[1606]: AVC avc: denied { mac_admin } for pid=1606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:44.384812 kubelet[1606]: I1031 01:34:44.384492 1606 kubelet.go:1567] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 31 01:34:44.384812 kubelet[1606]: I1031 01:34:44.384514 1606 kubelet.go:1571] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 31 01:34:44.384812 kubelet[1606]: I1031 01:34:44.384550 1606 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 31 01:34:44.387748 kernel: kauditd_printk_skb: 191 callbacks suppressed Oct 31 01:34:44.387799 kernel: audit: type=1400 audit(1761874484.383:409): avc: denied { mac_admin } for pid=1606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:44.387825 kernel: audit: type=1401 audit(1761874484.383:409): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:34:44.383000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:34:44.383000 audit[1606]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005fcb70 a1=c000059368 a2=c0005fcb40 a3=25 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:44.393538 kernel: audit: type=1300 audit(1761874484.383:409): arch=c000003e syscall=188 success=no exit=-22 a0=c0005fcb70 a1=c000059368 a2=c0005fcb40 a3=25 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:44.393592 kernel: audit: type=1327 audit(1761874484.383:409): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:34:44.383000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:34:44.383000 audit[1606]: AVC avc: denied { mac_admin } for pid=1606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:44.399759 kernel: audit: type=1400 audit(1761874484.383:410): avc: denied { mac_admin } for pid=1606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:44.399949 kubelet[1606]: I1031 01:34:44.399925 1606 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 31 01:34:44.401701 kubelet[1606]: I1031 01:34:44.401689 1606 volume_manager.go:313] "Starting Kubelet Volume Manager" Oct 31 01:34:44.401778 kubelet[1606]: E1031 01:34:44.401762 1606 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Oct 31 01:34:44.402143 kubelet[1606]: I1031 01:34:44.402130 1606 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Oct 31 01:34:44.402182 kubelet[1606]: I1031 01:34:44.402166 1606 reconciler.go:29] "Reconciler: start to sync state" Oct 31 01:34:44.383000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:34:44.383000 audit[1606]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00047bf40 a1=c000059380 a2=c0005fcc00 a3=25 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:44.407174 kubelet[1606]: I1031 01:34:44.407163 1606 factory.go:223] Registration of the systemd container factory successfully Oct 31 01:34:44.407309 kubelet[1606]: I1031 01:34:44.407298 1606 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 31 01:34:44.408746 kernel: audit: type=1401 audit(1761874484.383:410): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:34:44.408791 kernel: audit: type=1300 audit(1761874484.383:410): arch=c000003e syscall=188 success=no exit=-22 a0=c00047bf40 a1=c000059380 a2=c0005fcc00 a3=25 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:44.408810 kernel: audit: type=1327 audit(1761874484.383:410): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:34:44.383000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:34:44.408998 kubelet[1606]: I1031 01:34:44.408989 1606 factory.go:223] Registration of the containerd container factory successfully Oct 31 01:34:44.421296 kubelet[1606]: I1031 01:34:44.421269 1606 ratelimit.go:56] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 31 01:34:44.421408 kubelet[1606]: I1031 01:34:44.421397 1606 server_v1.go:49] "podresources" method="list" useActivePods=true Oct 31 01:34:44.421575 kubelet[1606]: I1031 01:34:44.421567 1606 server.go:249] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 31 01:34:44.444362 kubelet[1606]: I1031 01:34:44.444339 1606 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 31 01:34:44.444362 kubelet[1606]: I1031 01:34:44.444355 1606 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 31 01:34:44.444362 kubelet[1606]: I1031 01:34:44.444367 1606 state_mem.go:36] "Initialized new in-memory state store" Oct 31 01:34:44.444616 kubelet[1606]: E1031 01:34:44.444603 1606 reflector.go:205] "Failed to watch" err="failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Oct 31 01:34:44.445206 kubelet[1606]: E1031 01:34:44.445195 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.124.139\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Oct 31 01:34:44.445293 kubelet[1606]: E1031 01:34:44.445281 1606 reflector.go:205] "Failed to watch" err="failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Oct 31 01:34:44.445374 kubelet[1606]: E1031 01:34:44.445364 1606 reflector.go:205] "Failed to watch" err="failed to list *v1.Node: nodes \"10.67.124.139\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Oct 31 01:34:44.466823 kubelet[1606]: I1031 01:34:44.466806 1606 policy_none.go:49] "None policy: Start" Oct 31 01:34:44.466932 kubelet[1606]: I1031 01:34:44.466924 1606 memory_manager.go:187] "Starting memorymanager" policy="None" Oct 31 01:34:44.466980 kubelet[1606]: I1031 01:34:44.466972 1606 state_mem.go:36] "Initializing new in-memory state store" logger="Memory Manager state checkpoint" Oct 31 01:34:44.478416 kubelet[1606]: I1031 01:34:44.478397 1606 policy_none.go:47] "Start" Oct 31 01:34:44.480885 systemd[1]: Created slice kubepods.slice. Oct 31 01:34:44.483952 systemd[1]: Created slice kubepods-burstable.slice. Oct 31 01:34:44.486245 systemd[1]: Created slice kubepods-besteffort.slice. Oct 31 01:34:44.494116 kubelet[1606]: E1031 01:34:44.494089 1606 manager.go:513] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Oct 31 01:34:44.492000 audit[1606]: AVC avc: denied { mac_admin } for pid=1606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:44.492000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:34:44.497371 kubelet[1606]: E1031 01:34:44.497350 1606 server.go:96] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Oct 31 01:34:44.497599 kubelet[1606]: I1031 01:34:44.497588 1606 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 31 01:34:44.497916 kubelet[1606]: I1031 01:34:44.497722 1606 container_log_manager.go:146] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 31 01:34:44.498181 kubelet[1606]: I1031 01:34:44.498171 1606 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 31 01:34:44.498343 kernel: audit: type=1400 audit(1761874484.492:411): avc: denied { mac_admin } for pid=1606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:44.498385 kernel: audit: type=1401 audit(1761874484.492:411): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:34:44.492000 audit[1606]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d33710 a1=c000ca4270 a2=c000d336e0 a3=25 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:44.492000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:34:44.499292 kubelet[1606]: E1031 01:34:44.499203 1606 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 31 01:34:44.499292 kubelet[1606]: E1031 01:34:44.499230 1606 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.124.139\" not found" Oct 31 01:34:44.514000 audit[1629]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:44.514000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd60a6cf00 a2=0 a3=7ffd60a6ceec items=0 ppid=1606 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:44.514000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 01:34:44.516000 audit[1630]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:44.516000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fffeefe2970 a2=0 a3=7fffeefe295c items=0 ppid=1606 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:44.516000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 01:34:44.518000 audit[1632]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:44.518000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd90f0d6b0 a2=0 a3=7ffd90f0d69c items=0 ppid=1606 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:44.518000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:34:44.545000 audit[1637]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1637 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:44.545000 audit[1637]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffff201f600 a2=0 a3=7ffff201f5ec items=0 ppid=1606 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:44.545000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:34:44.600330 kubelet[1606]: I1031 01:34:44.600243 1606 kubelet_node_status.go:75] "Attempting to register node" node="10.67.124.139" Oct 31 01:34:44.607791 kubelet[1606]: E1031 01:34:44.607760 1606 kubelet_node_status.go:113] "Unable to register node with API server, error getting existing node" err="nodes \"10.67.124.139\" is forbidden: User \"system:anonymous\" cannot get resource \"nodes\" in API group \"\" at the cluster scope" node="10.67.124.139" Oct 31 01:34:44.650272 kubelet[1606]: E1031 01:34:44.650227 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.124.139\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Oct 31 01:34:44.677000 audit[1642]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1642 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:44.677000 audit[1642]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd486ccec0 a2=0 a3=7ffd486cceac items=0 ppid=1606 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:44.677000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F380000002D2D737263003132372E Oct 31 01:34:44.679451 kubelet[1606]: I1031 01:34:44.679409 1606 kubelet_network_linux.go:54] "Initialized iptables rules." protocol="IPv4" Oct 31 01:34:44.679000 audit[1644]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:44.679000 audit[1643]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:44.679000 audit[1643]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe9ebaf700 a2=0 a3=10e3 items=0 ppid=1606 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:44.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 01:34:44.680808 kubelet[1606]: I1031 01:34:44.680792 1606 kubelet_network_linux.go:54] "Initialized iptables rules." protocol="IPv6" Oct 31 01:34:44.680880 kubelet[1606]: I1031 01:34:44.680871 1606 status_manager.go:244] "Starting to sync pod status with apiserver" Oct 31 01:34:44.680957 kubelet[1606]: I1031 01:34:44.680948 1606 kubelet.go:2427] "Starting kubelet main sync loop" Oct 31 01:34:44.681080 kubelet[1606]: E1031 01:34:44.681069 1606 kubelet.go:2451] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 31 01:34:44.679000 audit[1644]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb65da730 a2=0 a3=7fffb65da71c items=0 ppid=1606 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:44.679000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 01:34:44.680000 audit[1645]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:44.680000 audit[1645]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe36211ab0 a2=0 a3=7ffe36211a9c items=0 ppid=1606 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:44.680000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 01:34:44.681000 audit[1646]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:44.681000 audit[1647]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:44.681000 audit[1647]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc5c68c660 a2=0 a3=7ffc5c68c64c items=0 ppid=1606 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:44.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 01:34:44.681000 audit[1646]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc38f01b60 a2=0 a3=7ffc38f01b4c items=0 ppid=1606 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:44.681000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 01:34:44.682000 audit[1649]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1649 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:44.682000 audit[1649]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff22eaddf0 a2=0 a3=7fff22eadddc items=0 ppid=1606 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:44.682000 audit[1648]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:44.682000 audit[1648]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe832da560 a2=0 a3=10e3 items=0 ppid=1606 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:44.682000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 01:34:44.682000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 01:34:44.685854 kubelet[1606]: E1031 01:34:44.685824 1606 reflector.go:205] "Failed to watch" err="failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"runtimeclasses\" in API group \"node.k8s.io\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Oct 31 01:34:44.809272 kubelet[1606]: I1031 01:34:44.809251 1606 kubelet_node_status.go:75] "Attempting to register node" node="10.67.124.139" Oct 31 01:34:44.815362 kubelet[1606]: E1031 01:34:44.815336 1606 kubelet_node_status.go:113] "Unable to register node with API server, error getting existing node" err="nodes \"10.67.124.139\" is forbidden: User \"system:anonymous\" cannot get resource \"nodes\" in API group \"\" at the cluster scope" node="10.67.124.139" Oct 31 01:34:45.054190 kubelet[1606]: E1031 01:34:45.054169 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.124.139\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Oct 31 01:34:45.216216 kubelet[1606]: I1031 01:34:45.216189 1606 kubelet_node_status.go:75] "Attempting to register node" node="10.67.124.139" Oct 31 01:34:45.222913 kubelet[1606]: E1031 01:34:45.222895 1606 kubelet_node_status.go:113] "Unable to register node with API server, error getting existing node" err="nodes \"10.67.124.139\" is forbidden: User \"system:anonymous\" cannot get resource \"nodes\" in API group \"\" at the cluster scope" node="10.67.124.139" Oct 31 01:34:45.324309 kubelet[1606]: I1031 01:34:45.324179 1606 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Oct 31 01:34:45.371358 kubelet[1606]: E1031 01:34:45.371334 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:34:45.529000 audit[1472]: USER_END pid=1472 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:34:45.529000 audit[1472]: CRED_DISP pid=1472 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:34:45.531101 sudo[1472]: pam_unix(sudo:session): session closed for user root Oct 31 01:34:45.532484 sshd[1468]: pam_unix(sshd:session): session closed for user core Oct 31 01:34:45.531000 audit[1468]: USER_END pid=1468 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:34:45.531000 audit[1468]: CRED_DISP pid=1468 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:34:45.533854 systemd[1]: sshd@6-139.178.70.107:22-147.75.109.163:39720.service: Deactivated successfully. Oct 31 01:34:45.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.107:22-147.75.109.163:39720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:45.534278 systemd[1]: session-9.scope: Deactivated successfully. Oct 31 01:34:45.534657 systemd-logind[1240]: Session 9 logged out. Waiting for processes to exit. Oct 31 01:34:45.535221 systemd-logind[1240]: Removed session 9. Oct 31 01:34:45.831376 kubelet[1606]: E1031 01:34:45.831353 1606 csi_plugin.go:399] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.67.124.139" not found Oct 31 01:34:45.856826 kubelet[1606]: E1031 01:34:45.856804 1606 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.67.124.139\" not found" node="10.67.124.139" Oct 31 01:34:46.024112 kubelet[1606]: I1031 01:34:46.024081 1606 kubelet_node_status.go:75] "Attempting to register node" node="10.67.124.139" Oct 31 01:34:46.044040 kubelet[1606]: I1031 01:34:46.044007 1606 kubelet_node_status.go:78] "Successfully registered node" node="10.67.124.139" Oct 31 01:34:46.358216 kubelet[1606]: I1031 01:34:46.358199 1606 kuberuntime_manager.go:1828] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Oct 31 01:34:46.358558 env[1254]: time="2025-10-31T01:34:46.358532829Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 31 01:34:46.358973 kubelet[1606]: I1031 01:34:46.358963 1606 kubelet_network.go:47] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Oct 31 01:34:46.371601 kubelet[1606]: I1031 01:34:46.371576 1606 apiserver.go:52] "Watching apiserver" Oct 31 01:34:46.371792 kubelet[1606]: E1031 01:34:46.371587 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:34:46.402192 kubelet[1606]: I1031 01:34:46.402167 1606 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Oct 31 01:34:47.371924 kubelet[1606]: E1031 01:34:47.371902 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:34:47.459689 kubelet[1606]: E1031 01:34:47.459659 1606 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mnsnz" podUID="e8632157-b6ab-4b24-9a54-bc9204b241e8" Oct 31 01:34:47.481341 systemd[1]: Created slice kubepods-besteffort-poddd3fe8e2_4aa9_4f68_9fd8_41a3cb328d69.slice. Oct 31 01:34:47.500060 systemd[1]: Created slice kubepods-besteffort-pod9f775fd8_bdf9_4550_b389_c8181214e96a.slice. Oct 31 01:34:47.520562 kubelet[1606]: I1031 01:34:47.520515 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lmp2t\" (UniqueName: \"kubernetes.io/projected/9f775fd8-bdf9-4550-b389-c8181214e96a-kube-api-access-lmp2t\") pod \"kube-proxy-7xp6b\" (UID: \"9f775fd8-bdf9-4550-b389-c8181214e96a\") " pod="kube-system/kube-proxy-7xp6b" Oct 31 01:34:47.520562 kubelet[1606]: I1031 01:34:47.520568 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e8632157-b6ab-4b24-9a54-bc9204b241e8-kubelet-dir\") pod \"csi-node-driver-mnsnz\" (UID: \"e8632157-b6ab-4b24-9a54-bc9204b241e8\") " pod="calico-system/csi-node-driver-mnsnz" Oct 31 01:34:47.520562 kubelet[1606]: I1031 01:34:47.520595 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e8632157-b6ab-4b24-9a54-bc9204b241e8-registration-dir\") pod \"csi-node-driver-mnsnz\" (UID: \"e8632157-b6ab-4b24-9a54-bc9204b241e8\") " pod="calico-system/csi-node-driver-mnsnz" Oct 31 01:34:47.520791 kubelet[1606]: I1031 01:34:47.520628 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9f775fd8-bdf9-4550-b389-c8181214e96a-lib-modules\") pod \"kube-proxy-7xp6b\" (UID: \"9f775fd8-bdf9-4550-b389-c8181214e96a\") " pod="kube-system/kube-proxy-7xp6b" Oct 31 01:34:47.520791 kubelet[1606]: I1031 01:34:47.520647 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e8632157-b6ab-4b24-9a54-bc9204b241e8-socket-dir\") pod \"csi-node-driver-mnsnz\" (UID: \"e8632157-b6ab-4b24-9a54-bc9204b241e8\") " pod="calico-system/csi-node-driver-mnsnz" Oct 31 01:34:47.520791 kubelet[1606]: I1031 01:34:47.520661 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e8632157-b6ab-4b24-9a54-bc9204b241e8-varrun\") pod \"csi-node-driver-mnsnz\" (UID: \"e8632157-b6ab-4b24-9a54-bc9204b241e8\") " pod="calico-system/csi-node-driver-mnsnz" Oct 31 01:34:47.520791 kubelet[1606]: I1031 01:34:47.520678 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wf85h\" (UniqueName: \"kubernetes.io/projected/e8632157-b6ab-4b24-9a54-bc9204b241e8-kube-api-access-wf85h\") pod \"csi-node-driver-mnsnz\" (UID: \"e8632157-b6ab-4b24-9a54-bc9204b241e8\") " pod="calico-system/csi-node-driver-mnsnz" Oct 31 01:34:47.520791 kubelet[1606]: I1031 01:34:47.520702 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2qv9l\" (UniqueName: \"kubernetes.io/projected/dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69-kube-api-access-2qv9l\") pod \"calico-node-k948q\" (UID: \"dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69\") " pod="calico-system/calico-node-k948q" Oct 31 01:34:47.520933 kubelet[1606]: I1031 01:34:47.520717 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/9f775fd8-bdf9-4550-b389-c8181214e96a-kube-proxy\") pod \"kube-proxy-7xp6b\" (UID: \"9f775fd8-bdf9-4550-b389-c8181214e96a\") " pod="kube-system/kube-proxy-7xp6b" Oct 31 01:34:47.520933 kubelet[1606]: I1031 01:34:47.520728 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69-cni-bin-dir\") pod \"calico-node-k948q\" (UID: \"dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69\") " pod="calico-system/calico-node-k948q" Oct 31 01:34:47.520933 kubelet[1606]: I1031 01:34:47.520739 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69-cni-log-dir\") pod \"calico-node-k948q\" (UID: \"dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69\") " pod="calico-system/calico-node-k948q" Oct 31 01:34:47.520933 kubelet[1606]: I1031 01:34:47.520747 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69-flexvol-driver-host\") pod \"calico-node-k948q\" (UID: \"dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69\") " pod="calico-system/calico-node-k948q" Oct 31 01:34:47.520933 kubelet[1606]: I1031 01:34:47.520755 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69-node-certs\") pod \"calico-node-k948q\" (UID: \"dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69\") " pod="calico-system/calico-node-k948q" Oct 31 01:34:47.521074 kubelet[1606]: I1031 01:34:47.520777 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69-var-lib-calico\") pod \"calico-node-k948q\" (UID: \"dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69\") " pod="calico-system/calico-node-k948q" Oct 31 01:34:47.521074 kubelet[1606]: I1031 01:34:47.520791 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69-cni-net-dir\") pod \"calico-node-k948q\" (UID: \"dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69\") " pod="calico-system/calico-node-k948q" Oct 31 01:34:47.521074 kubelet[1606]: I1031 01:34:47.520801 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69-xtables-lock\") pod \"calico-node-k948q\" (UID: \"dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69\") " pod="calico-system/calico-node-k948q" Oct 31 01:34:47.521074 kubelet[1606]: I1031 01:34:47.520810 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69-var-run-calico\") pod \"calico-node-k948q\" (UID: \"dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69\") " pod="calico-system/calico-node-k948q" Oct 31 01:34:47.521074 kubelet[1606]: I1031 01:34:47.520819 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9f775fd8-bdf9-4550-b389-c8181214e96a-xtables-lock\") pod \"kube-proxy-7xp6b\" (UID: \"9f775fd8-bdf9-4550-b389-c8181214e96a\") " pod="kube-system/kube-proxy-7xp6b" Oct 31 01:34:47.521207 kubelet[1606]: I1031 01:34:47.520833 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69-lib-modules\") pod \"calico-node-k948q\" (UID: \"dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69\") " pod="calico-system/calico-node-k948q" Oct 31 01:34:47.521207 kubelet[1606]: I1031 01:34:47.520859 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69-policysync\") pod \"calico-node-k948q\" (UID: \"dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69\") " pod="calico-system/calico-node-k948q" Oct 31 01:34:47.521207 kubelet[1606]: I1031 01:34:47.520876 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69-tigera-ca-bundle\") pod \"calico-node-k948q\" (UID: \"dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69\") " pod="calico-system/calico-node-k948q" Oct 31 01:34:47.622722 kubelet[1606]: I1031 01:34:47.622652 1606 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Oct 31 01:34:47.623754 kubelet[1606]: E1031 01:34:47.623745 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:47.623819 kubelet[1606]: W1031 01:34:47.623809 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:47.623871 kubelet[1606]: E1031 01:34:47.623862 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:47.624019 kubelet[1606]: E1031 01:34:47.624013 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:47.624067 kubelet[1606]: W1031 01:34:47.624059 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:47.624114 kubelet[1606]: E1031 01:34:47.624106 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:47.624244 kubelet[1606]: E1031 01:34:47.624232 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:47.624296 kubelet[1606]: W1031 01:34:47.624288 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:47.624341 kubelet[1606]: E1031 01:34:47.624333 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:47.624480 kubelet[1606]: E1031 01:34:47.624475 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:47.624530 kubelet[1606]: W1031 01:34:47.624522 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:47.624574 kubelet[1606]: E1031 01:34:47.624566 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:47.624769 kubelet[1606]: E1031 01:34:47.624762 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:47.624818 kubelet[1606]: W1031 01:34:47.624810 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:47.624864 kubelet[1606]: E1031 01:34:47.624856 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:47.626855 kubelet[1606]: E1031 01:34:47.626849 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:47.626912 kubelet[1606]: W1031 01:34:47.626903 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:47.626960 kubelet[1606]: E1031 01:34:47.626952 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:47.627088 kubelet[1606]: E1031 01:34:47.627082 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:47.627132 kubelet[1606]: W1031 01:34:47.627124 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:47.627178 kubelet[1606]: E1031 01:34:47.627170 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:47.627288 kubelet[1606]: E1031 01:34:47.627282 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:47.627331 kubelet[1606]: W1031 01:34:47.627323 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:47.627381 kubelet[1606]: E1031 01:34:47.627373 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:47.627528 kubelet[1606]: E1031 01:34:47.627523 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:47.627574 kubelet[1606]: W1031 01:34:47.627566 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:47.627621 kubelet[1606]: E1031 01:34:47.627612 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:47.627733 kubelet[1606]: E1031 01:34:47.627727 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:47.627775 kubelet[1606]: W1031 01:34:47.627767 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:47.627819 kubelet[1606]: E1031 01:34:47.627812 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:47.699649 kubelet[1606]: E1031 01:34:47.699636 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:47.699892 kubelet[1606]: W1031 01:34:47.699882 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:47.699951 kubelet[1606]: E1031 01:34:47.699942 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:47.700103 kubelet[1606]: E1031 01:34:47.700097 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:47.700154 kubelet[1606]: W1031 01:34:47.700145 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:47.700201 kubelet[1606]: E1031 01:34:47.700193 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:47.703392 kubelet[1606]: E1031 01:34:47.703383 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:47.703501 kubelet[1606]: W1031 01:34:47.703491 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:47.703553 kubelet[1606]: E1031 01:34:47.703545 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:47.811012 env[1254]: time="2025-10-31T01:34:47.810983724Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-k948q,Uid:dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69,Namespace:calico-system,Attempt:0,}" Oct 31 01:34:47.833329 env[1254]: time="2025-10-31T01:34:47.833223140Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7xp6b,Uid:9f775fd8-bdf9-4550-b389-c8181214e96a,Namespace:kube-system,Attempt:0,}" Oct 31 01:34:48.372601 kubelet[1606]: E1031 01:34:48.372576 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:34:49.373464 kubelet[1606]: E1031 01:34:49.373424 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:34:49.406532 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2185091440.mount: Deactivated successfully. Oct 31 01:34:49.461992 env[1254]: time="2025-10-31T01:34:49.461960627Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:49.495162 env[1254]: time="2025-10-31T01:34:49.495074163Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:49.501671 env[1254]: time="2025-10-31T01:34:49.501647225Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:49.536384 env[1254]: time="2025-10-31T01:34:49.536332717Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:49.546692 env[1254]: time="2025-10-31T01:34:49.546664014Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:49.555143 env[1254]: time="2025-10-31T01:34:49.555116041Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:49.559582 env[1254]: time="2025-10-31T01:34:49.559558889Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:49.560156 env[1254]: time="2025-10-31T01:34:49.560129857Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:49.578217 env[1254]: time="2025-10-31T01:34:49.577444658Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:34:49.578477 env[1254]: time="2025-10-31T01:34:49.578179206Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:34:49.578569 env[1254]: time="2025-10-31T01:34:49.578467598Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:34:49.579472 env[1254]: time="2025-10-31T01:34:49.578725314Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0ba997e06f2ea9f85318264b6aefc102f6548869cc45b838262fcb839d6c871f pid=1682 runtime=io.containerd.runc.v2 Oct 31 01:34:49.580130 env[1254]: time="2025-10-31T01:34:49.580090115Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:34:49.580227 env[1254]: time="2025-10-31T01:34:49.580209459Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:34:49.580297 env[1254]: time="2025-10-31T01:34:49.580281427Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:34:49.580531 env[1254]: time="2025-10-31T01:34:49.580503007Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/89a73f71ab6329e7c5e45e9826868dcd480363a9f220fae7630da5e3d26c84c4 pid=1684 runtime=io.containerd.runc.v2 Oct 31 01:34:49.597125 systemd[1]: Started cri-containerd-0ba997e06f2ea9f85318264b6aefc102f6548869cc45b838262fcb839d6c871f.scope. Oct 31 01:34:49.604300 systemd[1]: Started cri-containerd-89a73f71ab6329e7c5e45e9826868dcd480363a9f220fae7630da5e3d26c84c4.scope. Oct 31 01:34:49.619786 kernel: kauditd_printk_skb: 43 callbacks suppressed Oct 31 01:34:49.619878 kernel: audit: type=1400 audit(1761874489.611:429): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619907 kernel: audit: type=1400 audit(1761874489.611:430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.624697 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 31 01:34:49.624787 kernel: audit: type=1400 audit(1761874489.611:431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.624817 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 31 01:34:49.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.628219 kernel: audit: type=1400 audit(1761874489.611:432): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.628300 kernel: audit: backlog limit exceeded Oct 31 01:34:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.631367 kernel: audit: type=1400 audit(1761874489.611:433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.631405 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 31 01:34:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.634586 kernel: audit: type=1400 audit(1761874489.611:434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.613000 audit: BPF prog-id=58 op=LOAD Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000151c48 a2=10 a3=1c items=0 ppid=1684 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:49.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839613733663731616236333239653763356534356539383236383638 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001516b0 a2=3c a3=c items=0 ppid=1684 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:49.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839613733663731616236333239653763356534356539383236383638 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit: BPF prog-id=59 op=LOAD Oct 31 01:34:49.619000 audit[1705]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001519d8 a2=78 a3=c0001ba4a0 items=0 ppid=1684 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:49.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839613733663731616236333239653763356534356539383236383638 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit: BPF prog-id=60 op=LOAD Oct 31 01:34:49.619000 audit[1705]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000151770 a2=78 a3=c0001ba4e8 items=0 ppid=1684 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:49.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839613733663731616236333239653763356534356539383236383638 Oct 31 01:34:49.619000 audit: BPF prog-id=60 op=UNLOAD Oct 31 01:34:49.619000 audit: BPF prog-id=59 op=UNLOAD Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit: BPF prog-id=61 op=LOAD Oct 31 01:34:49.619000 audit[1705]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000151c30 a2=78 a3=c0001ba8f8 items=0 ppid=1684 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:49.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839613733663731616236333239653763356534356539383236383638 Oct 31 01:34:49.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.630000 audit: BPF prog-id=62 op=LOAD Oct 31 01:34:49.633000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.633000 audit[1704]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1682 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:49.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062613939376530366632656139663835333138323634623661656663 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1682 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:49.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062613939376530366632656139663835333138323634623661656663 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit: BPF prog-id=63 op=LOAD Oct 31 01:34:49.636000 audit[1704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000217350 items=0 ppid=1682 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:49.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062613939376530366632656139663835333138323634623661656663 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit: BPF prog-id=64 op=LOAD Oct 31 01:34:49.636000 audit[1704]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000217398 items=0 ppid=1682 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:49.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062613939376530366632656139663835333138323634623661656663 Oct 31 01:34:49.636000 audit: BPF prog-id=64 op=UNLOAD Oct 31 01:34:49.636000 audit: BPF prog-id=63 op=UNLOAD Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.636000 audit: BPF prog-id=65 op=LOAD Oct 31 01:34:49.636000 audit[1704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0002177a8 items=0 ppid=1682 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:49.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062613939376530366632656139663835333138323634623661656663 Oct 31 01:34:49.643425 env[1254]: time="2025-10-31T01:34:49.643344816Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7xp6b,Uid:9f775fd8-bdf9-4550-b389-c8181214e96a,Namespace:kube-system,Attempt:0,} returns sandbox id \"89a73f71ab6329e7c5e45e9826868dcd480363a9f220fae7630da5e3d26c84c4\"" Oct 31 01:34:49.645414 env[1254]: time="2025-10-31T01:34:49.645014043Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.34.1\"" Oct 31 01:34:49.650244 env[1254]: time="2025-10-31T01:34:49.650219089Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-k948q,Uid:dd3fe8e2-4aa9-4f68-9fd8-41a3cb328d69,Namespace:calico-system,Attempt:0,} returns sandbox id \"0ba997e06f2ea9f85318264b6aefc102f6548869cc45b838262fcb839d6c871f\"" Oct 31 01:34:49.682153 kubelet[1606]: E1031 01:34:49.681942 1606 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mnsnz" podUID="e8632157-b6ab-4b24-9a54-bc9204b241e8" Oct 31 01:34:50.373974 kubelet[1606]: E1031 01:34:50.373929 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:34:50.858874 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2121187819.mount: Deactivated successfully. Oct 31 01:34:51.241579 env[1254]: time="2025-10-31T01:34:51.241477215Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.34.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:51.242390 env[1254]: time="2025-10-31T01:34:51.242366533Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fc25172553d79197ecd840ec8dba1fba68330079355e974b04c1a441e6a4a0b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:51.243460 env[1254]: time="2025-10-31T01:34:51.243427231Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.34.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:51.244418 env[1254]: time="2025-10-31T01:34:51.244400723Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:913cc83ca0b5588a81d86ce8eedeb3ed1e9c1326e81852a1ea4f622b74ff749a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:51.244808 env[1254]: time="2025-10-31T01:34:51.244781978Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.34.1\" returns image reference \"sha256:fc25172553d79197ecd840ec8dba1fba68330079355e974b04c1a441e6a4a0b7\"" Oct 31 01:34:51.246101 env[1254]: time="2025-10-31T01:34:51.246079652Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Oct 31 01:34:51.248801 env[1254]: time="2025-10-31T01:34:51.248771652Z" level=info msg="CreateContainer within sandbox \"89a73f71ab6329e7c5e45e9826868dcd480363a9f220fae7630da5e3d26c84c4\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 31 01:34:51.256836 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount105539210.mount: Deactivated successfully. Oct 31 01:34:51.260832 env[1254]: time="2025-10-31T01:34:51.260795972Z" level=info msg="CreateContainer within sandbox \"89a73f71ab6329e7c5e45e9826868dcd480363a9f220fae7630da5e3d26c84c4\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"2df35c1d6eb80f0706a4dfea95984cd7fd1996485aec89390e14afe6880dd0da\"" Oct 31 01:34:51.272834 env[1254]: time="2025-10-31T01:34:51.272800082Z" level=info msg="StartContainer for \"2df35c1d6eb80f0706a4dfea95984cd7fd1996485aec89390e14afe6880dd0da\"" Oct 31 01:34:51.286965 systemd[1]: Started cri-containerd-2df35c1d6eb80f0706a4dfea95984cd7fd1996485aec89390e14afe6880dd0da.scope. Oct 31 01:34:51.298000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.298000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6b994fb5f8 items=0 ppid=1684 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264663335633164366562383066303730366134646665613935393834 Oct 31 01:34:51.298000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.298000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.298000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.298000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.298000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.298000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.298000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.298000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.298000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.298000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.298000 audit: BPF prog-id=66 op=LOAD Oct 31 01:34:51.298000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000297fb8 items=0 ppid=1684 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264663335633164366562383066303730366134646665613935393834 Oct 31 01:34:51.299000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.299000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.299000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.299000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.299000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.299000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.299000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.299000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.299000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.299000 audit: BPF prog-id=67 op=LOAD Oct 31 01:34:51.299000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000302008 items=0 ppid=1684 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264663335633164366562383066303730366134646665613935393834 Oct 31 01:34:51.299000 audit: BPF prog-id=67 op=UNLOAD Oct 31 01:34:51.299000 audit: BPF prog-id=66 op=UNLOAD Oct 31 01:34:51.299000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.299000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.299000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.299000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.299000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.299000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.299000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.299000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.299000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.299000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:51.299000 audit: BPF prog-id=68 op=LOAD Oct 31 01:34:51.299000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000302098 items=0 ppid=1684 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264663335633164366562383066303730366134646665613935393834 Oct 31 01:34:51.316609 env[1254]: time="2025-10-31T01:34:51.316575919Z" level=info msg="StartContainer for \"2df35c1d6eb80f0706a4dfea95984cd7fd1996485aec89390e14afe6880dd0da\" returns successfully" Oct 31 01:34:51.374474 kubelet[1606]: E1031 01:34:51.374430 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:34:51.485000 audit[1816]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.485000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6aa451b0 a2=0 a3=7ffe6aa4519c items=0 ppid=1766 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.485000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 01:34:51.486000 audit[1818]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1818 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.486000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd62c706f0 a2=0 a3=7ffd62c706dc items=0 ppid=1766 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.486000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 01:34:51.486000 audit[1819]: NETFILTER_CFG table=mangle:16 family=10 entries=1 op=nft_register_chain pid=1819 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.486000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6fe639e0 a2=0 a3=7ffd6fe639cc items=0 ppid=1766 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.486000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 01:34:51.486000 audit[1820]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.486000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9f295e10 a2=0 a3=7fff9f295dfc items=0 ppid=1766 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.486000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 01:34:51.487000 audit[1821]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1821 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.487000 audit[1821]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff357ce280 a2=0 a3=7fff357ce26c items=0 ppid=1766 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.487000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 01:34:51.487000 audit[1822]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1822 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.487000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffccd1d9600 a2=0 a3=7ffccd1d95ec items=0 ppid=1766 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.487000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 01:34:51.588000 audit[1825]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.588000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffed138c1f0 a2=0 a3=7ffed138c1dc items=0 ppid=1766 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.588000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 01:34:51.591000 audit[1827]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1827 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.591000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc89481320 a2=0 a3=7ffc8948130c items=0 ppid=1766 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.591000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C73002D Oct 31 01:34:51.593000 audit[1830]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.593000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffde5240d10 a2=0 a3=7ffde5240cfc items=0 ppid=1766 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C73 Oct 31 01:34:51.594000 audit[1831]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1831 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.594000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2e2416e0 a2=0 a3=7ffe2e2416cc items=0 ppid=1766 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.594000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 01:34:51.595000 audit[1833]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1833 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.595000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe300962d0 a2=0 a3=7ffe300962bc items=0 ppid=1766 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.595000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 01:34:51.596000 audit[1834]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.596000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3b129870 a2=0 a3=7ffd3b12985c items=0 ppid=1766 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 01:34:51.598000 audit[1836]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.598000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe650ac510 a2=0 a3=7ffe650ac4fc items=0 ppid=1766 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.598000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:34:51.600000 audit[1839]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1839 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.600000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcca15dff0 a2=0 a3=7ffcca15dfdc items=0 ppid=1766 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.600000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:34:51.601000 audit[1840]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1840 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.601000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffedb47ac20 a2=0 a3=7ffedb47ac0c items=0 ppid=1766 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.601000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 01:34:51.602000 audit[1842]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1842 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.602000 audit[1842]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd77e38a80 a2=0 a3=7ffd77e38a6c items=0 ppid=1766 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.602000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 01:34:51.603000 audit[1843]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.603000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3bb80480 a2=0 a3=7fff3bb8046c items=0 ppid=1766 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.603000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 01:34:51.604000 audit[1845]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.604000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd21f1db60 a2=0 a3=7ffd21f1db4c items=0 ppid=1766 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F5859 Oct 31 01:34:51.606000 audit[1848]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1848 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.606000 audit[1848]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc9bae4370 a2=0 a3=7ffc9bae435c items=0 ppid=1766 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.606000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F58 Oct 31 01:34:51.609000 audit[1851]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.609000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc1a54e970 a2=0 a3=7ffc1a54e95c items=0 ppid=1766 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.609000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F Oct 31 01:34:51.610000 audit[1852]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1852 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.610000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcfdbd2d90 a2=0 a3=7ffcfdbd2d7c items=0 ppid=1766 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.610000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 01:34:51.611000 audit[1854]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1854 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.611000 audit[1854]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe3b73a170 a2=0 a3=7ffe3b73a15c items=0 ppid=1766 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.611000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:34:51.643000 audit[1858]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.643000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe74e07910 a2=0 a3=7ffe74e078fc items=0 ppid=1766 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.643000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:34:51.644000 audit[1859]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.644000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1bc63540 a2=0 a3=7ffc1bc6352c items=0 ppid=1766 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.644000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 01:34:51.645000 audit[1861]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:51.645000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc159b0e20 a2=0 a3=7ffc159b0e0c items=0 ppid=1766 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.645000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 01:34:51.682136 kubelet[1606]: E1031 01:34:51.681879 1606 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mnsnz" podUID="e8632157-b6ab-4b24-9a54-bc9204b241e8" Oct 31 01:34:51.701000 audit[1867]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:51.701000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc2f822490 a2=0 a3=7ffc2f82247c items=0 ppid=1766 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.701000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:51.729000 audit[1867]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:51.729000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7ffc2f822490 a2=0 a3=7ffc2f82247c items=0 ppid=1766 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.729000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:51.739604 kubelet[1606]: E1031 01:34:51.739584 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.739604 kubelet[1606]: W1031 01:34:51.739598 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.739781 kubelet[1606]: E1031 01:34:51.739612 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.739781 kubelet[1606]: E1031 01:34:51.739749 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.739781 kubelet[1606]: W1031 01:34:51.739756 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.739781 kubelet[1606]: E1031 01:34:51.739766 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.739916 kubelet[1606]: E1031 01:34:51.739861 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.739916 kubelet[1606]: W1031 01:34:51.739866 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.739916 kubelet[1606]: E1031 01:34:51.739870 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.740010 kubelet[1606]: E1031 01:34:51.739988 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.740010 kubelet[1606]: W1031 01:34:51.739994 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.740010 kubelet[1606]: E1031 01:34:51.739999 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.740113 kubelet[1606]: E1031 01:34:51.740089 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.740113 kubelet[1606]: W1031 01:34:51.740094 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.740113 kubelet[1606]: E1031 01:34:51.740098 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.740206 kubelet[1606]: E1031 01:34:51.740192 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.740206 kubelet[1606]: W1031 01:34:51.740201 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.740277 kubelet[1606]: E1031 01:34:51.740216 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.740336 kubelet[1606]: E1031 01:34:51.740321 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.740336 kubelet[1606]: W1031 01:34:51.740330 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.740402 kubelet[1606]: E1031 01:34:51.740344 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.740458 kubelet[1606]: E1031 01:34:51.740452 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.740503 kubelet[1606]: W1031 01:34:51.740459 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.740503 kubelet[1606]: E1031 01:34:51.740466 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.740858 kubelet[1606]: E1031 01:34:51.740843 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.740858 kubelet[1606]: W1031 01:34:51.740849 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.740858 kubelet[1606]: E1031 01:34:51.740855 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.740973 kubelet[1606]: E1031 01:34:51.740958 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.740973 kubelet[1606]: W1031 01:34:51.740969 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.741052 kubelet[1606]: E1031 01:34:51.740983 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.741087 kubelet[1606]: E1031 01:34:51.741081 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.741117 kubelet[1606]: W1031 01:34:51.741087 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.741117 kubelet[1606]: E1031 01:34:51.741103 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.741204 kubelet[1606]: E1031 01:34:51.741190 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.741204 kubelet[1606]: W1031 01:34:51.741198 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.741204 kubelet[1606]: E1031 01:34:51.741203 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.741338 kubelet[1606]: E1031 01:34:51.741312 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.741338 kubelet[1606]: W1031 01:34:51.741327 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.741338 kubelet[1606]: E1031 01:34:51.741335 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.741427 kubelet[1606]: E1031 01:34:51.741424 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.741485 kubelet[1606]: W1031 01:34:51.741428 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.741485 kubelet[1606]: E1031 01:34:51.741447 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.741574 kubelet[1606]: E1031 01:34:51.741541 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.741574 kubelet[1606]: W1031 01:34:51.741545 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.741574 kubelet[1606]: E1031 01:34:51.741550 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.741649 kubelet[1606]: E1031 01:34:51.741643 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.741649 kubelet[1606]: W1031 01:34:51.741647 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.741701 kubelet[1606]: E1031 01:34:51.741652 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.741767 kubelet[1606]: E1031 01:34:51.741756 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.741767 kubelet[1606]: W1031 01:34:51.741764 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.741860 kubelet[1606]: E1031 01:34:51.741772 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.741893 kubelet[1606]: E1031 01:34:51.741871 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.741893 kubelet[1606]: W1031 01:34:51.741877 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.741893 kubelet[1606]: E1031 01:34:51.741882 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.741989 kubelet[1606]: E1031 01:34:51.741980 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.741989 kubelet[1606]: W1031 01:34:51.741987 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.742038 kubelet[1606]: E1031 01:34:51.741994 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.742091 kubelet[1606]: E1031 01:34:51.742077 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.742091 kubelet[1606]: W1031 01:34:51.742085 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.742091 kubelet[1606]: E1031 01:34:51.742090 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.742000 audit[1896]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1896 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.742000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd256db3d0 a2=0 a3=7ffd256db3bc items=0 ppid=1766 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.742000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 01:34:51.744000 audit[1898]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1898 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.744000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd5395fa60 a2=0 a3=7ffd5395fa4c items=0 ppid=1766 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.744000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C73 Oct 31 01:34:51.746645 kubelet[1606]: E1031 01:34:51.746460 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.746645 kubelet[1606]: W1031 01:34:51.746482 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.746645 kubelet[1606]: E1031 01:34:51.746499 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.746645 kubelet[1606]: E1031 01:34:51.746610 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.746645 kubelet[1606]: W1031 01:34:51.746616 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.746645 kubelet[1606]: E1031 01:34:51.746622 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.746807 kubelet[1606]: E1031 01:34:51.746762 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.746807 kubelet[1606]: W1031 01:34:51.746778 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.746807 kubelet[1606]: E1031 01:34:51.746790 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.746000 audit[1911]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1911 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.746000 audit[1911]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcbe25f370 a2=0 a3=7ffcbe25f35c items=0 ppid=1766 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.746000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C Oct 31 01:34:51.748619 kubelet[1606]: E1031 01:34:51.746927 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.748619 kubelet[1606]: W1031 01:34:51.746934 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.748619 kubelet[1606]: E1031 01:34:51.746940 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.748619 kubelet[1606]: E1031 01:34:51.747054 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.748619 kubelet[1606]: W1031 01:34:51.747068 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.748619 kubelet[1606]: E1031 01:34:51.747077 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.748619 kubelet[1606]: E1031 01:34:51.747185 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.748619 kubelet[1606]: W1031 01:34:51.747194 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.748619 kubelet[1606]: E1031 01:34:51.747201 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.748619 kubelet[1606]: E1031 01:34:51.747467 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.748876 kubelet[1606]: W1031 01:34:51.747472 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.748876 kubelet[1606]: E1031 01:34:51.747478 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.748876 kubelet[1606]: E1031 01:34:51.747586 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.748876 kubelet[1606]: W1031 01:34:51.747592 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.748876 kubelet[1606]: E1031 01:34:51.747600 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.748876 kubelet[1606]: E1031 01:34:51.747697 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.748876 kubelet[1606]: W1031 01:34:51.747704 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.748876 kubelet[1606]: E1031 01:34:51.747712 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.748876 kubelet[1606]: E1031 01:34:51.747817 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.748876 kubelet[1606]: W1031 01:34:51.747823 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.749090 kubelet[1606]: E1031 01:34:51.747829 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.749090 kubelet[1606]: E1031 01:34:51.747933 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.749090 kubelet[1606]: W1031 01:34:51.747939 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.749090 kubelet[1606]: E1031 01:34:51.747945 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.749090 kubelet[1606]: E1031 01:34:51.748130 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:51.749090 kubelet[1606]: W1031 01:34:51.748135 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:51.749090 kubelet[1606]: E1031 01:34:51.748141 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:51.748000 audit[1914]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1914 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.748000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7af573a0 a2=0 a3=7fff7af5738c items=0 ppid=1766 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.748000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 01:34:51.750000 audit[1916]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1916 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.750000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd7d75d690 a2=0 a3=7ffd7d75d67c items=0 ppid=1766 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.750000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 01:34:51.750000 audit[1917]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.750000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9fb83000 a2=0 a3=7fff9fb82fec items=0 ppid=1766 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.750000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 01:34:51.752000 audit[1919]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1919 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.752000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffefbe6a0e0 a2=0 a3=7ffefbe6a0cc items=0 ppid=1766 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.752000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:34:51.754000 audit[1922]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.754000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffffeb22a70 a2=0 a3=7ffffeb22a5c items=0 ppid=1766 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.754000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:34:51.755000 audit[1923]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1923 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.755000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4be28f60 a2=0 a3=7ffc4be28f4c items=0 ppid=1766 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.755000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 01:34:51.757000 audit[1925]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1925 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.757000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffddc1a3d90 a2=0 a3=7ffddc1a3d7c items=0 ppid=1766 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.757000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 01:34:51.758000 audit[1926]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1926 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.758000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe22e1d000 a2=0 a3=7ffe22e1cfec items=0 ppid=1766 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.758000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 01:34:51.760000 audit[1928]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1928 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.760000 audit[1928]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffa6657d30 a2=0 a3=7fffa6657d1c items=0 ppid=1766 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.760000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F58 Oct 31 01:34:51.762000 audit[1931]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1931 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.762000 audit[1931]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc8be6940 a2=0 a3=7ffdc8be692c items=0 ppid=1766 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.762000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F Oct 31 01:34:51.765000 audit[1934]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1934 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.765000 audit[1934]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc67dc35a0 a2=0 a3=7ffc67dc358c items=0 ppid=1766 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.765000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D5052 Oct 31 01:34:51.765000 audit[1935]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1935 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.765000 audit[1935]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffceab5deb0 a2=0 a3=7ffceab5de9c items=0 ppid=1766 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.765000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 01:34:51.767000 audit[1937]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1937 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.767000 audit[1937]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc506c0ab0 a2=0 a3=7ffc506c0a9c items=0 ppid=1766 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.767000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:34:51.770000 audit[1940]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1940 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.770000 audit[1940]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc23d093d0 a2=0 a3=7ffc23d093bc items=0 ppid=1766 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.770000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:34:51.771000 audit[1941]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1941 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.771000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6a5f1800 a2=0 a3=7ffd6a5f17ec items=0 ppid=1766 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.771000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 01:34:51.773000 audit[1943]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1943 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.773000 audit[1943]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcfd8ed9d0 a2=0 a3=7ffcfd8ed9bc items=0 ppid=1766 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 01:34:51.775000 audit[1944]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1944 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.775000 audit[1944]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6958ff30 a2=0 a3=7ffe6958ff1c items=0 ppid=1766 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.775000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 01:34:51.776000 audit[1946]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1946 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.776000 audit[1946]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffff43ae870 a2=0 a3=7ffff43ae85c items=0 ppid=1766 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.776000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:34:51.779000 audit[1949]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1949 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:51.779000 audit[1949]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd684caca0 a2=0 a3=7ffd684cac8c items=0 ppid=1766 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.779000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:34:51.782000 audit[1951]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1951 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 01:34:51.782000 audit[1951]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffeb974ae20 a2=0 a3=7ffeb974ae0c items=0 ppid=1766 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.782000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:51.782000 audit[1951]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1951 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 01:34:51.782000 audit[1951]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffeb974ae20 a2=0 a3=7ffeb974ae0c items=0 ppid=1766 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:51.782000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:52.375555 kubelet[1606]: E1031 01:34:52.375497 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:34:52.622348 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2960071298.mount: Deactivated successfully. Oct 31 01:34:52.748242 kubelet[1606]: E1031 01:34:52.748157 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.748242 kubelet[1606]: W1031 01:34:52.748178 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.748242 kubelet[1606]: E1031 01:34:52.748207 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.748708 kubelet[1606]: E1031 01:34:52.748688 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.748708 kubelet[1606]: W1031 01:34:52.748699 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.748708 kubelet[1606]: E1031 01:34:52.748709 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.748826 kubelet[1606]: E1031 01:34:52.748800 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.748826 kubelet[1606]: W1031 01:34:52.748804 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.748826 kubelet[1606]: E1031 01:34:52.748811 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.748929 kubelet[1606]: E1031 01:34:52.748908 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.748929 kubelet[1606]: W1031 01:34:52.748913 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.748929 kubelet[1606]: E1031 01:34:52.748918 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.749022 kubelet[1606]: E1031 01:34:52.749012 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.749022 kubelet[1606]: W1031 01:34:52.749017 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.749064 kubelet[1606]: E1031 01:34:52.749024 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.749115 kubelet[1606]: E1031 01:34:52.749103 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.749115 kubelet[1606]: W1031 01:34:52.749109 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.749115 kubelet[1606]: E1031 01:34:52.749114 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.749226 kubelet[1606]: E1031 01:34:52.749216 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.749226 kubelet[1606]: W1031 01:34:52.749225 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.749291 kubelet[1606]: E1031 01:34:52.749232 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.749352 kubelet[1606]: E1031 01:34:52.749341 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.749352 kubelet[1606]: W1031 01:34:52.749350 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.749423 kubelet[1606]: E1031 01:34:52.749358 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.749492 kubelet[1606]: E1031 01:34:52.749481 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.749492 kubelet[1606]: W1031 01:34:52.749491 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.749559 kubelet[1606]: E1031 01:34:52.749500 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.749602 kubelet[1606]: E1031 01:34:52.749586 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.749602 kubelet[1606]: W1031 01:34:52.749593 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.749602 kubelet[1606]: E1031 01:34:52.749598 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.749720 kubelet[1606]: E1031 01:34:52.749689 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.749720 kubelet[1606]: W1031 01:34:52.749694 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.749720 kubelet[1606]: E1031 01:34:52.749699 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.749817 kubelet[1606]: E1031 01:34:52.749773 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.749817 kubelet[1606]: W1031 01:34:52.749779 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.749817 kubelet[1606]: E1031 01:34:52.749788 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.749909 kubelet[1606]: E1031 01:34:52.749879 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.749909 kubelet[1606]: W1031 01:34:52.749884 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.749909 kubelet[1606]: E1031 01:34:52.749889 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.750024 kubelet[1606]: E1031 01:34:52.749971 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.750024 kubelet[1606]: W1031 01:34:52.749975 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.750024 kubelet[1606]: E1031 01:34:52.749980 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.750182 kubelet[1606]: E1031 01:34:52.750058 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.750182 kubelet[1606]: W1031 01:34:52.750062 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.750182 kubelet[1606]: E1031 01:34:52.750066 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.750182 kubelet[1606]: E1031 01:34:52.750144 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.750182 kubelet[1606]: W1031 01:34:52.750150 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.750182 kubelet[1606]: E1031 01:34:52.750155 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.750408 kubelet[1606]: E1031 01:34:52.750235 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.750408 kubelet[1606]: W1031 01:34:52.750241 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.750408 kubelet[1606]: E1031 01:34:52.750248 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.750408 kubelet[1606]: E1031 01:34:52.750350 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.750408 kubelet[1606]: W1031 01:34:52.750356 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.750408 kubelet[1606]: E1031 01:34:52.750364 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.750639 kubelet[1606]: E1031 01:34:52.750471 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.750639 kubelet[1606]: W1031 01:34:52.750477 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.750639 kubelet[1606]: E1031 01:34:52.750485 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.750639 kubelet[1606]: E1031 01:34:52.750568 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.750639 kubelet[1606]: W1031 01:34:52.750574 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.750639 kubelet[1606]: E1031 01:34:52.750581 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.753560 kubelet[1606]: E1031 01:34:52.753539 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.753560 kubelet[1606]: W1031 01:34:52.753554 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.753692 kubelet[1606]: E1031 01:34:52.753567 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.753724 kubelet[1606]: E1031 01:34:52.753696 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.753724 kubelet[1606]: W1031 01:34:52.753701 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.753724 kubelet[1606]: E1031 01:34:52.753707 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.754056 kubelet[1606]: E1031 01:34:52.754044 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.754056 kubelet[1606]: W1031 01:34:52.754054 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.754130 kubelet[1606]: E1031 01:34:52.754062 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.754177 kubelet[1606]: E1031 01:34:52.754159 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.754177 kubelet[1606]: W1031 01:34:52.754173 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.754255 kubelet[1606]: E1031 01:34:52.754180 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.754285 kubelet[1606]: E1031 01:34:52.754270 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.754285 kubelet[1606]: W1031 01:34:52.754275 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.754285 kubelet[1606]: E1031 01:34:52.754281 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.754407 kubelet[1606]: E1031 01:34:52.754388 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.754407 kubelet[1606]: W1031 01:34:52.754404 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.754504 kubelet[1606]: E1031 01:34:52.754411 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.754653 kubelet[1606]: E1031 01:34:52.754638 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.754653 kubelet[1606]: W1031 01:34:52.754649 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.754730 kubelet[1606]: E1031 01:34:52.754656 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.754798 kubelet[1606]: E1031 01:34:52.754787 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.754798 kubelet[1606]: W1031 01:34:52.754796 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.754874 kubelet[1606]: E1031 01:34:52.754802 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.756084 kubelet[1606]: E1031 01:34:52.755477 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.756084 kubelet[1606]: W1031 01:34:52.755486 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.756084 kubelet[1606]: E1031 01:34:52.755496 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.756084 kubelet[1606]: E1031 01:34:52.755619 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.756084 kubelet[1606]: W1031 01:34:52.755632 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.756084 kubelet[1606]: E1031 01:34:52.755641 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.756084 kubelet[1606]: E1031 01:34:52.755752 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.756084 kubelet[1606]: W1031 01:34:52.755757 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.756084 kubelet[1606]: E1031 01:34:52.755762 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.756084 kubelet[1606]: E1031 01:34:52.756037 1606 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:52.756359 kubelet[1606]: W1031 01:34:52.756044 1606 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:52.756359 kubelet[1606]: E1031 01:34:52.756052 1606 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:52.789866 update_engine[1241]: I1031 01:34:52.789574 1241 update_attempter.cc:509] Updating boot flags... Oct 31 01:34:52.809850 env[1254]: time="2025-10-31T01:34:52.809822140Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:52.820520 env[1254]: time="2025-10-31T01:34:52.820489101Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:52.824874 env[1254]: time="2025-10-31T01:34:52.824846229Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:52.831859 env[1254]: time="2025-10-31T01:34:52.831829581Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:52.832045 env[1254]: time="2025-10-31T01:34:52.832022909Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5\"" Oct 31 01:34:52.844211 env[1254]: time="2025-10-31T01:34:52.844175496Z" level=info msg="CreateContainer within sandbox \"0ba997e06f2ea9f85318264b6aefc102f6548869cc45b838262fcb839d6c871f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 31 01:34:52.939063 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3181448912.mount: Deactivated successfully. Oct 31 01:34:53.001265 env[1254]: time="2025-10-31T01:34:53.001194631Z" level=info msg="CreateContainer within sandbox \"0ba997e06f2ea9f85318264b6aefc102f6548869cc45b838262fcb839d6c871f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"323699c9e34008c810cb86838ce96fb00dc9425be857a7f17d457c1d19b34e92\"" Oct 31 01:34:53.001981 env[1254]: time="2025-10-31T01:34:53.001966041Z" level=info msg="StartContainer for \"323699c9e34008c810cb86838ce96fb00dc9425be857a7f17d457c1d19b34e92\"" Oct 31 01:34:53.017924 systemd[1]: Started cri-containerd-323699c9e34008c810cb86838ce96fb00dc9425be857a7f17d457c1d19b34e92.scope. Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f0ddd281568 items=0 ppid=1682 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332333639396339653334303038633831306362383638333863653936 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit: BPF prog-id=69 op=LOAD Oct 31 01:34:53.031000 audit[2009]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00021ce08 items=0 ppid=1682 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332333639396339653334303038633831306362383638333863653936 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit: BPF prog-id=70 op=LOAD Oct 31 01:34:53.031000 audit[2009]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00021ce58 items=0 ppid=1682 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332333639396339653334303038633831306362383638333863653936 Oct 31 01:34:53.031000 audit: BPF prog-id=70 op=UNLOAD Oct 31 01:34:53.031000 audit: BPF prog-id=69 op=UNLOAD Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.031000 audit: BPF prog-id=71 op=LOAD Oct 31 01:34:53.031000 audit[2009]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00021cee8 items=0 ppid=1682 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332333639396339653334303038633831306362383638333863653936 Oct 31 01:34:53.051320 env[1254]: time="2025-10-31T01:34:53.051276056Z" level=info msg="StartContainer for \"323699c9e34008c810cb86838ce96fb00dc9425be857a7f17d457c1d19b34e92\" returns successfully" Oct 31 01:34:53.053345 systemd[1]: cri-containerd-323699c9e34008c810cb86838ce96fb00dc9425be857a7f17d457c1d19b34e92.scope: Deactivated successfully. Oct 31 01:34:53.055000 audit: BPF prog-id=71 op=UNLOAD Oct 31 01:34:53.376276 kubelet[1606]: E1031 01:34:53.376246 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:34:53.577534 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-323699c9e34008c810cb86838ce96fb00dc9425be857a7f17d457c1d19b34e92-rootfs.mount: Deactivated successfully. Oct 31 01:34:53.681910 kubelet[1606]: E1031 01:34:53.681777 1606 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mnsnz" podUID="e8632157-b6ab-4b24-9a54-bc9204b241e8" Oct 31 01:34:53.743112 kubelet[1606]: I1031 01:34:53.742932 1606 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-7xp6b" podStartSLOduration=6.142015627 podStartE2EDuration="7.742922656s" podCreationTimestamp="2025-10-31 01:34:46 +0000 UTC" firstStartedPulling="2025-10-31 01:34:49.644571146 +0000 UTC m=+6.120017550" lastFinishedPulling="2025-10-31 01:34:51.245478174 +0000 UTC m=+7.720924579" observedRunningTime="2025-10-31 01:34:51.709878235 +0000 UTC m=+8.185324656" watchObservedRunningTime="2025-10-31 01:34:53.742922656 +0000 UTC m=+10.218369072" Oct 31 01:34:53.771344 env[1254]: time="2025-10-31T01:34:53.771301926Z" level=info msg="shim disconnected" id=323699c9e34008c810cb86838ce96fb00dc9425be857a7f17d457c1d19b34e92 Oct 31 01:34:53.771499 env[1254]: time="2025-10-31T01:34:53.771487785Z" level=warning msg="cleaning up after shim disconnected" id=323699c9e34008c810cb86838ce96fb00dc9425be857a7f17d457c1d19b34e92 namespace=k8s.io Oct 31 01:34:53.771566 env[1254]: time="2025-10-31T01:34:53.771554862Z" level=info msg="cleaning up dead shim" Oct 31 01:34:53.777360 env[1254]: time="2025-10-31T01:34:53.777329217Z" level=warning msg="cleanup warnings time=\"2025-10-31T01:34:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2052 runtime=io.containerd.runc.v2\n" Oct 31 01:34:54.376642 kubelet[1606]: E1031 01:34:54.376617 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:34:54.697336 env[1254]: time="2025-10-31T01:34:54.697107217Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Oct 31 01:34:55.377158 kubelet[1606]: E1031 01:34:55.377123 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:34:55.681945 kubelet[1606]: E1031 01:34:55.681730 1606 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mnsnz" podUID="e8632157-b6ab-4b24-9a54-bc9204b241e8" Oct 31 01:34:56.377888 kubelet[1606]: E1031 01:34:56.377860 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:34:57.378148 kubelet[1606]: E1031 01:34:57.378118 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:34:57.622798 env[1254]: time="2025-10-31T01:34:57.622753246Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:57.626829 env[1254]: time="2025-10-31T01:34:57.626802674Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:57.629154 env[1254]: time="2025-10-31T01:34:57.628938561Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:57.633947 env[1254]: time="2025-10-31T01:34:57.633916082Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:57.634350 env[1254]: time="2025-10-31T01:34:57.634329147Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd\"" Oct 31 01:34:57.638306 env[1254]: time="2025-10-31T01:34:57.638267626Z" level=info msg="CreateContainer within sandbox \"0ba997e06f2ea9f85318264b6aefc102f6548869cc45b838262fcb839d6c871f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 31 01:34:57.646565 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1690320998.mount: Deactivated successfully. Oct 31 01:34:57.658536 env[1254]: time="2025-10-31T01:34:57.658500129Z" level=info msg="CreateContainer within sandbox \"0ba997e06f2ea9f85318264b6aefc102f6548869cc45b838262fcb839d6c871f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"2d2b6152815d554a1344cefd4ae07ea55d0fb709e9f27b921c7b1e1be4506f64\"" Oct 31 01:34:57.659201 env[1254]: time="2025-10-31T01:34:57.659177158Z" level=info msg="StartContainer for \"2d2b6152815d554a1344cefd4ae07ea55d0fb709e9f27b921c7b1e1be4506f64\"" Oct 31 01:34:57.675391 systemd[1]: Started cri-containerd-2d2b6152815d554a1344cefd4ae07ea55d0fb709e9f27b921c7b1e1be4506f64.scope. Oct 31 01:34:57.682696 kubelet[1606]: E1031 01:34:57.681740 1606 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mnsnz" podUID="e8632157-b6ab-4b24-9a54-bc9204b241e8" Oct 31 01:34:57.695000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.699813 kernel: kauditd_printk_skb: 348 callbacks suppressed Oct 31 01:34:57.699919 kernel: audit: type=1400 audit(1761874497.695:527): avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.699959 kernel: audit: type=1300 audit(1761874497.695:527): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f67faaa9b98 items=0 ppid=1682 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:57.695000 audit[2073]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f67faaa9b98 items=0 ppid=1682 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:57.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264326236313532383135643535346131333434636566643461653037 Oct 31 01:34:57.708020 kernel: audit: type=1327 audit(1761874497.695:527): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264326236313532383135643535346131333434636566643461653037 Oct 31 01:34:57.708113 kernel: audit: type=1400 audit(1761874497.697:528): avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.697000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.697000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.715476 kernel: audit: type=1400 audit(1761874497.697:528): avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.697000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.697000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.720862 kernel: audit: type=1400 audit(1761874497.697:528): avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.720935 kernel: audit: type=1400 audit(1761874497.697:528): avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.720954 kernel: audit: type=1400 audit(1761874497.697:528): avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.697000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.729462 kernel: audit: type=1400 audit(1761874497.697:528): avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.729552 kernel: audit: type=1400 audit(1761874497.697:528): avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.697000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.697000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.697000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.697000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.697000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.697000 audit: BPF prog-id=72 op=LOAD Oct 31 01:34:57.697000 audit[2073]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001c0a28 items=0 ppid=1682 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:57.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264326236313532383135643535346131333434636566643461653037 Oct 31 01:34:57.702000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.702000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.702000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.702000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.702000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.702000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.702000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.702000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.702000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.702000 audit: BPF prog-id=73 op=LOAD Oct 31 01:34:57.702000 audit[2073]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001c0a78 items=0 ppid=1682 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:57.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264326236313532383135643535346131333434636566643461653037 Oct 31 01:34:57.702000 audit: BPF prog-id=73 op=UNLOAD Oct 31 01:34:57.702000 audit: BPF prog-id=72 op=UNLOAD Oct 31 01:34:57.702000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.702000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.702000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.702000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.702000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.702000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.702000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.702000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.702000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.702000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.702000 audit: BPF prog-id=74 op=LOAD Oct 31 01:34:57.702000 audit[2073]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001c0b08 items=0 ppid=1682 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:57.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264326236313532383135643535346131333434636566643461653037 Oct 31 01:34:57.737794 env[1254]: time="2025-10-31T01:34:57.737757530Z" level=info msg="StartContainer for \"2d2b6152815d554a1344cefd4ae07ea55d0fb709e9f27b921c7b1e1be4506f64\" returns successfully" Oct 31 01:34:58.379309 kubelet[1606]: E1031 01:34:58.379261 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:34:58.544207 env[1254]: time="2025-10-31T01:34:58.544154718Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 01:34:58.545569 systemd[1]: cri-containerd-2d2b6152815d554a1344cefd4ae07ea55d0fb709e9f27b921c7b1e1be4506f64.scope: Deactivated successfully. Oct 31 01:34:58.547000 audit: BPF prog-id=74 op=UNLOAD Oct 31 01:34:58.559551 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2d2b6152815d554a1344cefd4ae07ea55d0fb709e9f27b921c7b1e1be4506f64-rootfs.mount: Deactivated successfully. Oct 31 01:34:58.669376 kubelet[1606]: I1031 01:34:58.644149 1606 kubelet_node_status.go:439] "Fast updating node status as it just became ready" Oct 31 01:34:58.938256 env[1254]: time="2025-10-31T01:34:58.937935513Z" level=info msg="shim disconnected" id=2d2b6152815d554a1344cefd4ae07ea55d0fb709e9f27b921c7b1e1be4506f64 Oct 31 01:34:58.938515 env[1254]: time="2025-10-31T01:34:58.938501719Z" level=warning msg="cleaning up after shim disconnected" id=2d2b6152815d554a1344cefd4ae07ea55d0fb709e9f27b921c7b1e1be4506f64 namespace=k8s.io Oct 31 01:34:58.938566 env[1254]: time="2025-10-31T01:34:58.938555304Z" level=info msg="cleaning up dead shim" Oct 31 01:34:58.943567 env[1254]: time="2025-10-31T01:34:58.943536733Z" level=warning msg="cleanup warnings time=\"2025-10-31T01:34:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2112 runtime=io.containerd.runc.v2\n" Oct 31 01:34:59.379878 kubelet[1606]: E1031 01:34:59.379838 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:34:59.687923 systemd[1]: Created slice kubepods-besteffort-pode8632157_b6ab_4b24_9a54_bc9204b241e8.slice. Oct 31 01:34:59.691710 env[1254]: time="2025-10-31T01:34:59.691685498Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mnsnz,Uid:e8632157-b6ab-4b24-9a54-bc9204b241e8,Namespace:calico-system,Attempt:0,}" Oct 31 01:34:59.730467 env[1254]: time="2025-10-31T01:34:59.730425017Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Oct 31 01:34:59.756153 env[1254]: time="2025-10-31T01:34:59.756096583Z" level=error msg="Failed to destroy network for sandbox \"ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:59.757156 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59-shm.mount: Deactivated successfully. Oct 31 01:34:59.757862 env[1254]: time="2025-10-31T01:34:59.757818952Z" level=error msg="encountered an error cleaning up failed sandbox \"ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:59.757923 env[1254]: time="2025-10-31T01:34:59.757880977Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mnsnz,Uid:e8632157-b6ab-4b24-9a54-bc9204b241e8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:59.758103 kubelet[1606]: E1031 01:34:59.758073 1606 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:59.758149 kubelet[1606]: E1031 01:34:59.758126 1606 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mnsnz" Oct 31 01:34:59.758183 kubelet[1606]: E1031 01:34:59.758155 1606 kuberuntime_manager.go:1343] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mnsnz" Oct 31 01:34:59.758248 kubelet[1606]: E1031 01:34:59.758223 1606 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-mnsnz_calico-system(e8632157-b6ab-4b24-9a54-bc9204b241e8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-mnsnz_calico-system(e8632157-b6ab-4b24-9a54-bc9204b241e8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mnsnz" podUID="e8632157-b6ab-4b24-9a54-bc9204b241e8" Oct 31 01:35:00.380536 kubelet[1606]: E1031 01:35:00.380497 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:00.730994 kubelet[1606]: I1031 01:35:00.730744 1606 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59" Oct 31 01:35:00.731350 env[1254]: time="2025-10-31T01:35:00.731314167Z" level=info msg="StopPodSandbox for \"ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59\"" Oct 31 01:35:00.748246 env[1254]: time="2025-10-31T01:35:00.748136243Z" level=error msg="StopPodSandbox for \"ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59\" failed" error="failed to destroy network for sandbox \"ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:35:00.748639 kubelet[1606]: E1031 01:35:00.748594 1606 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59" Oct 31 01:35:00.748734 kubelet[1606]: E1031 01:35:00.748652 1606 kuberuntime_manager.go:1665] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59"} Oct 31 01:35:00.748734 kubelet[1606]: E1031 01:35:00.748698 1606 kuberuntime_manager.go:1233] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e8632157-b6ab-4b24-9a54-bc9204b241e8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:35:00.748734 kubelet[1606]: E1031 01:35:00.748727 1606 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e8632157-b6ab-4b24-9a54-bc9204b241e8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mnsnz" podUID="e8632157-b6ab-4b24-9a54-bc9204b241e8" Oct 31 01:35:01.381071 kubelet[1606]: E1031 01:35:01.381037 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:01.720310 systemd[1]: Created slice kubepods-besteffort-podfee7a827_423d_40c4_9907_c82094f18516.slice. Oct 31 01:35:01.795228 kubelet[1606]: I1031 01:35:01.795201 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9g496\" (UniqueName: \"kubernetes.io/projected/fee7a827-423d-40c4-9907-c82094f18516-kube-api-access-9g496\") pod \"nginx-deployment-bb8f74bfb-4ttq2\" (UID: \"fee7a827-423d-40c4-9907-c82094f18516\") " pod="default/nginx-deployment-bb8f74bfb-4ttq2" Oct 31 01:35:02.029658 env[1254]: time="2025-10-31T01:35:02.029631943Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-bb8f74bfb-4ttq2,Uid:fee7a827-423d-40c4-9907-c82094f18516,Namespace:default,Attempt:0,}" Oct 31 01:35:02.116637 env[1254]: time="2025-10-31T01:35:02.116596663Z" level=error msg="Failed to destroy network for sandbox \"dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:35:02.117610 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77-shm.mount: Deactivated successfully. Oct 31 01:35:02.118217 env[1254]: time="2025-10-31T01:35:02.118185571Z" level=error msg="encountered an error cleaning up failed sandbox \"dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:35:02.118260 env[1254]: time="2025-10-31T01:35:02.118228710Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-bb8f74bfb-4ttq2,Uid:fee7a827-423d-40c4-9907-c82094f18516,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:35:02.118397 kubelet[1606]: E1031 01:35:02.118373 1606 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:35:02.118467 kubelet[1606]: E1031 01:35:02.118410 1606 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-bb8f74bfb-4ttq2" Oct 31 01:35:02.118467 kubelet[1606]: E1031 01:35:02.118423 1606 kuberuntime_manager.go:1343] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-bb8f74bfb-4ttq2" Oct 31 01:35:02.118576 kubelet[1606]: E1031 01:35:02.118471 1606 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-bb8f74bfb-4ttq2_default(fee7a827-423d-40c4-9907-c82094f18516)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-bb8f74bfb-4ttq2_default(fee7a827-423d-40c4-9907-c82094f18516)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-bb8f74bfb-4ttq2" podUID="fee7a827-423d-40c4-9907-c82094f18516" Oct 31 01:35:02.382673 kubelet[1606]: E1031 01:35:02.382101 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:02.734172 kubelet[1606]: I1031 01:35:02.733984 1606 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77" Oct 31 01:35:02.734406 env[1254]: time="2025-10-31T01:35:02.734388378Z" level=info msg="StopPodSandbox for \"dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77\"" Oct 31 01:35:02.756362 env[1254]: time="2025-10-31T01:35:02.756327996Z" level=error msg="StopPodSandbox for \"dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77\" failed" error="failed to destroy network for sandbox \"dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:35:02.756640 kubelet[1606]: E1031 01:35:02.756617 1606 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77" Oct 31 01:35:02.756688 kubelet[1606]: E1031 01:35:02.756654 1606 kuberuntime_manager.go:1665] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77"} Oct 31 01:35:02.756688 kubelet[1606]: E1031 01:35:02.756683 1606 kuberuntime_manager.go:1233] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fee7a827-423d-40c4-9907-c82094f18516\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:35:02.756754 kubelet[1606]: E1031 01:35:02.756703 1606 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fee7a827-423d-40c4-9907-c82094f18516\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-bb8f74bfb-4ttq2" podUID="fee7a827-423d-40c4-9907-c82094f18516" Oct 31 01:35:03.382585 kubelet[1606]: E1031 01:35:03.382530 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:04.371239 kubelet[1606]: E1031 01:35:04.371206 1606 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:04.382937 kubelet[1606]: E1031 01:35:04.382902 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:05.383388 kubelet[1606]: E1031 01:35:05.383332 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:06.260979 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount637908820.mount: Deactivated successfully. Oct 31 01:35:06.326063 env[1254]: time="2025-10-31T01:35:06.326022504Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:06.351533 env[1254]: time="2025-10-31T01:35:06.351493084Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:06.359882 env[1254]: time="2025-10-31T01:35:06.359847042Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:06.364879 env[1254]: time="2025-10-31T01:35:06.364852054Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:06.365232 env[1254]: time="2025-10-31T01:35:06.365215476Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9\"" Oct 31 01:35:06.384508 kubelet[1606]: E1031 01:35:06.384482 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:06.412666 env[1254]: time="2025-10-31T01:35:06.412636942Z" level=info msg="CreateContainer within sandbox \"0ba997e06f2ea9f85318264b6aefc102f6548869cc45b838262fcb839d6c871f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 31 01:35:06.421126 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1955689704.mount: Deactivated successfully. Oct 31 01:35:06.423939 env[1254]: time="2025-10-31T01:35:06.423906172Z" level=info msg="CreateContainer within sandbox \"0ba997e06f2ea9f85318264b6aefc102f6548869cc45b838262fcb839d6c871f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"af5b453c744f7dd6444ad4ddc8d9b1c8d1d9abbe100ab564983f61d0194310f0\"" Oct 31 01:35:06.424520 env[1254]: time="2025-10-31T01:35:06.424496356Z" level=info msg="StartContainer for \"af5b453c744f7dd6444ad4ddc8d9b1c8d1d9abbe100ab564983f61d0194310f0\"" Oct 31 01:35:06.437201 systemd[1]: Started cri-containerd-af5b453c744f7dd6444ad4ddc8d9b1c8d1d9abbe100ab564983f61d0194310f0.scope. Oct 31 01:35:06.452000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.454949 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 31 01:35:06.455005 kernel: audit: type=1400 audit(1761874506.452:534): avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.452000 audit[2217]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fcac02f2918 items=0 ppid=1682 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:06.461446 kernel: audit: type=1300 audit(1761874506.452:534): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fcac02f2918 items=0 ppid=1682 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:06.461504 kernel: audit: type=1327 audit(1761874506.452:534): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166356234353363373434663764643634343461643464646338643962 Oct 31 01:35:06.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166356234353363373434663764643634343461643464646338643962 Oct 31 01:35:06.452000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.467149 kernel: audit: type=1400 audit(1761874506.452:535): avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.467185 kernel: audit: type=1400 audit(1761874506.452:535): avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.452000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.452000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.471897 kernel: audit: type=1400 audit(1761874506.452:535): avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.452000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.474531 kernel: audit: type=1400 audit(1761874506.452:535): avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.452000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.477241 kernel: audit: type=1400 audit(1761874506.452:535): avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.452000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.452000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.482585 kernel: audit: type=1400 audit(1761874506.452:535): avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.482641 kernel: audit: type=1400 audit(1761874506.452:535): avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.452000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.452000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.452000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.452000 audit: BPF prog-id=75 op=LOAD Oct 31 01:35:06.452000 audit[2217]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002d9ba8 items=0 ppid=1682 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:06.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166356234353363373434663764643634343461643464646338643962 Oct 31 01:35:06.456000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.456000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.456000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.456000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.456000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.456000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.456000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.456000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.456000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.456000 audit: BPF prog-id=76 op=LOAD Oct 31 01:35:06.456000 audit[2217]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002d9bf8 items=0 ppid=1682 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:06.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166356234353363373434663764643634343461643464646338643962 Oct 31 01:35:06.463000 audit: BPF prog-id=76 op=UNLOAD Oct 31 01:35:06.463000 audit: BPF prog-id=75 op=UNLOAD Oct 31 01:35:06.463000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.463000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.463000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.463000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.463000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.463000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.463000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.463000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.463000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.463000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:06.463000 audit: BPF prog-id=77 op=LOAD Oct 31 01:35:06.463000 audit[2217]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002d9c88 items=0 ppid=1682 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:06.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166356234353363373434663764643634343461643464646338643962 Oct 31 01:35:06.497116 env[1254]: time="2025-10-31T01:35:06.497085407Z" level=info msg="StartContainer for \"af5b453c744f7dd6444ad4ddc8d9b1c8d1d9abbe100ab564983f61d0194310f0\" returns successfully" Oct 31 01:35:06.582921 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 31 01:35:06.583044 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 31 01:35:07.385204 kubelet[1606]: E1031 01:35:07.385175 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:07.752631 systemd[1]: run-containerd-runc-k8s.io-af5b453c744f7dd6444ad4ddc8d9b1c8d1d9abbe100ab564983f61d0194310f0-runc.wJf5pR.mount: Deactivated successfully. Oct 31 01:35:08.000000 audit[2359]: AVC avc: denied { write } for pid=2359 comm="tee" name="fd" dev="proc" ino=30836 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:35:08.000000 audit[2359]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec12227ea a2=241 a3=1b6 items=1 ppid=2322 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.000000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 31 01:35:08.000000 audit: PATH item=0 name="/dev/fd/63" inode=30823 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:35:08.000000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:35:08.015000 audit[2376]: AVC avc: denied { write } for pid=2376 comm="tee" name="fd" dev="proc" ino=30440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:35:08.015000 audit[2376]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9015c7d9 a2=241 a3=1b6 items=1 ppid=2323 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.015000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 31 01:35:08.015000 audit[2372]: AVC avc: denied { write } for pid=2372 comm="tee" name="fd" dev="proc" ino=30444 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:35:08.015000 audit[2372]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef00d97eb a2=241 a3=1b6 items=1 ppid=2329 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.015000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 31 01:35:08.015000 audit: PATH item=0 name="/dev/fd/63" inode=30828 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:35:08.015000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:35:08.016000 audit[2389]: AVC avc: denied { write } for pid=2389 comm="tee" name="fd" dev="proc" ino=30845 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:35:08.016000 audit[2369]: AVC avc: denied { write } for pid=2369 comm="tee" name="fd" dev="proc" ino=30448 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:35:08.016000 audit[2369]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdde8eb7e9 a2=241 a3=1b6 items=1 ppid=2328 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.016000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 31 01:35:08.016000 audit: PATH item=0 name="/dev/fd/63" inode=30396 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:35:08.016000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:35:08.018000 audit[2374]: AVC avc: denied { write } for pid=2374 comm="tee" name="fd" dev="proc" ino=30452 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:35:08.018000 audit[2374]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe7606b7e9 a2=241 a3=1b6 items=1 ppid=2331 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.018000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 31 01:35:08.018000 audit: PATH item=0 name="/dev/fd/63" inode=30398 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:35:08.018000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:35:08.016000 audit[2389]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd523467e9 a2=241 a3=1b6 items=1 ppid=2326 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.016000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 31 01:35:08.016000 audit: PATH item=0 name="/dev/fd/63" inode=30840 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:35:08.016000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:35:08.015000 audit: PATH item=0 name="/dev/fd/63" inode=30399 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:35:08.015000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:35:08.020000 audit[2384]: AVC avc: denied { write } for pid=2384 comm="tee" name="fd" dev="proc" ino=30849 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:35:08.020000 audit[2384]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffce6cac7da a2=241 a3=1b6 items=1 ppid=2332 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.020000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 31 01:35:08.020000 audit: PATH item=0 name="/dev/fd/63" inode=30403 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:35:08.020000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:35:08.364000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.364000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.364000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.364000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.364000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.364000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.364000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.364000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.364000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.364000 audit: BPF prog-id=78 op=LOAD Oct 31 01:35:08.364000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb44b18c0 a2=98 a3=1fffffffffffffff items=0 ppid=2336 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.364000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:35:08.365000 audit: BPF prog-id=78 op=UNLOAD Oct 31 01:35:08.365000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.365000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.365000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.365000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.365000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.365000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.365000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.365000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.365000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.365000 audit: BPF prog-id=79 op=LOAD Oct 31 01:35:08.365000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb44b17a0 a2=94 a3=3 items=0 ppid=2336 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.365000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:35:08.365000 audit: BPF prog-id=79 op=UNLOAD Oct 31 01:35:08.365000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.365000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.365000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.365000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.365000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.365000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.365000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.365000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.365000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.365000 audit: BPF prog-id=80 op=LOAD Oct 31 01:35:08.365000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb44b17e0 a2=94 a3=7fffb44b19c0 items=0 ppid=2336 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.365000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:35:08.365000 audit: BPF prog-id=80 op=UNLOAD Oct 31 01:35:08.365000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.365000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fffb44b18b0 a2=50 a3=a000000085 items=0 ppid=2336 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.365000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit: BPF prog-id=81 op=LOAD Oct 31 01:35:08.366000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffca3a4d4d0 a2=98 a3=3 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.366000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.366000 audit: BPF prog-id=81 op=UNLOAD Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit: BPF prog-id=82 op=LOAD Oct 31 01:35:08.366000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca3a4d2c0 a2=94 a3=54428f items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.366000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.366000 audit: BPF prog-id=82 op=UNLOAD Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.366000 audit: BPF prog-id=83 op=LOAD Oct 31 01:35:08.366000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca3a4d2f0 a2=94 a3=2 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.366000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.366000 audit: BPF prog-id=83 op=UNLOAD Oct 31 01:35:08.385735 kubelet[1606]: E1031 01:35:08.385701 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:08.434000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.434000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.434000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.434000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.434000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.434000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.434000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.434000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.434000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.434000 audit: BPF prog-id=84 op=LOAD Oct 31 01:35:08.434000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca3a4d1b0 a2=94 a3=1 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.434000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.434000 audit: BPF prog-id=84 op=UNLOAD Oct 31 01:35:08.434000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.434000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffca3a4d280 a2=50 a3=7ffca3a4d360 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.434000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca3a4d1c0 a2=28 a3=0 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.441000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca3a4d1f0 a2=28 a3=0 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.441000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca3a4d100 a2=28 a3=0 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.441000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca3a4d210 a2=28 a3=0 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.441000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca3a4d1f0 a2=28 a3=0 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.441000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca3a4d1e0 a2=28 a3=0 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.441000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca3a4d210 a2=28 a3=0 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.441000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca3a4d1f0 a2=28 a3=0 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.441000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca3a4d210 a2=28 a3=0 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.441000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca3a4d1e0 a2=28 a3=0 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.441000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca3a4d250 a2=28 a3=0 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.441000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffca3a4d000 a2=50 a3=1 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.441000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.441000 audit: BPF prog-id=85 op=LOAD Oct 31 01:35:08.441000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffca3a4d000 a2=94 a3=5 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.441000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.442000 audit: BPF prog-id=85 op=UNLOAD Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffca3a4d0b0 a2=50 a3=1 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.442000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffca3a4d1d0 a2=4 a3=38 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.442000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { confidentiality } for pid=2410 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:08.442000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffca3a4d220 a2=94 a3=6 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.442000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { confidentiality } for pid=2410 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:08.442000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffca3a4c9d0 a2=94 a3=88 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.442000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.442000 audit[2410]: AVC avc: denied { confidentiality } for pid=2410 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:08.442000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffca3a4c9d0 a2=94 a3=88 items=0 ppid=2336 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.442000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit: BPF prog-id=86 op=LOAD Oct 31 01:35:08.448000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe696e3dd0 a2=98 a3=1999999999999999 items=0 ppid=2336 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.448000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 01:35:08.448000 audit: BPF prog-id=86 op=UNLOAD Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit: BPF prog-id=87 op=LOAD Oct 31 01:35:08.448000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe696e3cb0 a2=94 a3=ffff items=0 ppid=2336 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.448000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 01:35:08.448000 audit: BPF prog-id=87 op=UNLOAD Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.448000 audit: BPF prog-id=88 op=LOAD Oct 31 01:35:08.448000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe696e3cf0 a2=94 a3=7ffe696e3ed0 items=0 ppid=2336 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.448000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 01:35:08.448000 audit: BPF prog-id=88 op=UNLOAD Oct 31 01:35:08.625888 systemd-networkd[1064]: vxlan.calico: Link UP Oct 31 01:35:08.625894 systemd-networkd[1064]: vxlan.calico: Gained carrier Oct 31 01:35:08.655000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.655000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.655000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.655000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.655000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.655000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.655000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.655000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.655000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.655000 audit: BPF prog-id=89 op=LOAD Oct 31 01:35:08.655000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff8da65640 a2=98 a3=0 items=0 ppid=2336 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.655000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:35:08.655000 audit: BPF prog-id=89 op=UNLOAD Oct 31 01:35:08.655000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.655000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.655000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.655000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.655000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.655000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.655000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.655000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.655000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.655000 audit: BPF prog-id=90 op=LOAD Oct 31 01:35:08.655000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff8da65450 a2=94 a3=54428f items=0 ppid=2336 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.655000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:35:08.656000 audit: BPF prog-id=90 op=UNLOAD Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit: BPF prog-id=91 op=LOAD Oct 31 01:35:08.656000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff8da65480 a2=94 a3=2 items=0 ppid=2336 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:35:08.656000 audit: BPF prog-id=91 op=UNLOAD Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff8da65350 a2=28 a3=0 items=0 ppid=2336 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8da65380 a2=28 a3=0 items=0 ppid=2336 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8da65290 a2=28 a3=0 items=0 ppid=2336 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff8da653a0 a2=28 a3=0 items=0 ppid=2336 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff8da65380 a2=28 a3=0 items=0 ppid=2336 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff8da65370 a2=28 a3=0 items=0 ppid=2336 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff8da653a0 a2=28 a3=0 items=0 ppid=2336 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8da65380 a2=28 a3=0 items=0 ppid=2336 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8da653a0 a2=28 a3=0 items=0 ppid=2336 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8da65370 a2=28 a3=0 items=0 ppid=2336 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff8da653e0 a2=28 a3=0 items=0 ppid=2336 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.656000 audit: BPF prog-id=92 op=LOAD Oct 31 01:35:08.656000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff8da65250 a2=94 a3=0 items=0 ppid=2336 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:35:08.656000 audit: BPF prog-id=92 op=UNLOAD Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff8da65240 a2=50 a3=2800 items=0 ppid=2336 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.658000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff8da65240 a2=50 a3=2800 items=0 ppid=2336 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.658000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit: BPF prog-id=93 op=LOAD Oct 31 01:35:08.658000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff8da64a60 a2=94 a3=2 items=0 ppid=2336 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.658000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:35:08.658000 audit: BPF prog-id=93 op=UNLOAD Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.658000 audit: BPF prog-id=94 op=LOAD Oct 31 01:35:08.658000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff8da64b60 a2=94 a3=30 items=0 ppid=2336 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.658000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:35:08.660000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.660000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.660000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.660000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.660000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.660000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.660000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.660000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.660000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.660000 audit: BPF prog-id=95 op=LOAD Oct 31 01:35:08.660000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd64338e40 a2=98 a3=0 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.660000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.660000 audit: BPF prog-id=95 op=UNLOAD Oct 31 01:35:08.660000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.660000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.660000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.660000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.660000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.660000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.660000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.660000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.660000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.660000 audit: BPF prog-id=96 op=LOAD Oct 31 01:35:08.660000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd64338c30 a2=94 a3=54428f items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.660000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.661000 audit: BPF prog-id=96 op=UNLOAD Oct 31 01:35:08.661000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.661000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.661000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.661000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.661000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.661000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.661000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.661000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.661000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.661000 audit: BPF prog-id=97 op=LOAD Oct 31 01:35:08.661000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd64338c60 a2=94 a3=2 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.661000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.661000 audit: BPF prog-id=97 op=UNLOAD Oct 31 01:35:08.747000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.747000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.747000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.747000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.747000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.747000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.747000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.747000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.747000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.747000 audit: BPF prog-id=98 op=LOAD Oct 31 01:35:08.747000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd64338b20 a2=94 a3=1 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.747000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.747000 audit: BPF prog-id=98 op=UNLOAD Oct 31 01:35:08.747000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.747000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd64338bf0 a2=50 a3=7ffd64338cd0 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.747000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.757000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.757000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd64338b30 a2=28 a3=0 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.757000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.757000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.757000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd64338b60 a2=28 a3=0 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.757000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.757000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.757000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd64338a70 a2=28 a3=0 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.757000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.757000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.757000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd64338b80 a2=28 a3=0 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.757000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd64338b60 a2=28 a3=0 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.758000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd64338b50 a2=28 a3=0 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.758000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd64338b80 a2=28 a3=0 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.758000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd64338b60 a2=28 a3=0 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.758000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd64338b80 a2=28 a3=0 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.758000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd64338b50 a2=28 a3=0 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.758000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd64338bc0 a2=28 a3=0 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.758000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd64338970 a2=50 a3=1 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.758000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit: BPF prog-id=99 op=LOAD Oct 31 01:35:08.758000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd64338970 a2=94 a3=5 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.758000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.758000 audit: BPF prog-id=99 op=UNLOAD Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd64338a20 a2=50 a3=1 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.758000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd64338b40 a2=4 a3=38 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.758000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.758000 audit[2462]: AVC avc: denied { confidentiality } for pid=2462 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:08.758000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd64338b90 a2=94 a3=6 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.758000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { confidentiality } for pid=2462 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:08.760000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd64338340 a2=94 a3=88 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.760000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.760000 audit[2462]: AVC avc: denied { confidentiality } for pid=2462 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:08.760000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd64338340 a2=94 a3=88 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.760000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.761000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.761000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd64339d70 a2=10 a3=f8f00800 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.761000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.761000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.761000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd64339c10 a2=10 a3=3 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.761000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.761000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.761000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd64339bb0 a2=10 a3=3 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.761000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.761000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:08.761000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd64339bb0 a2=10 a3=7 items=0 ppid=2336 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.761000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:35:08.767000 audit: BPF prog-id=94 op=UNLOAD Oct 31 01:35:08.829000 audit[2497]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2497 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:35:08.829000 audit[2497]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffedf6e74f0 a2=0 a3=7ffedf6e74dc items=0 ppid=2336 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.829000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:35:08.832000 audit[2496]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2496 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:35:08.832000 audit[2496]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffda4f2a530 a2=0 a3=7ffda4f2a51c items=0 ppid=2336 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.832000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:35:08.834000 audit[2498]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2498 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:35:08.834000 audit[2498]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc5f3fc7b0 a2=0 a3=7ffc5f3fc79c items=0 ppid=2336 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.834000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:35:08.840000 audit[2495]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2495 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:35:08.840000 audit[2495]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff09168f70 a2=0 a3=7fff09168f5c items=0 ppid=2336 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:08.840000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:35:09.386592 kubelet[1606]: E1031 01:35:09.386549 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:09.939674 systemd-networkd[1064]: vxlan.calico: Gained IPv6LL Oct 31 01:35:10.387582 kubelet[1606]: E1031 01:35:10.387540 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:11.388512 kubelet[1606]: E1031 01:35:11.388475 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:12.389517 kubelet[1606]: E1031 01:35:12.389484 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:13.390348 kubelet[1606]: E1031 01:35:13.390302 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:14.391033 kubelet[1606]: E1031 01:35:14.390995 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:15.391344 kubelet[1606]: E1031 01:35:15.391312 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:15.682237 env[1254]: time="2025-10-31T01:35:15.682036539Z" level=info msg="StopPodSandbox for \"ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59\"" Oct 31 01:35:15.682619 env[1254]: time="2025-10-31T01:35:15.682271091Z" level=info msg="StopPodSandbox for \"dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77\"" Oct 31 01:35:15.799134 kubelet[1606]: I1031 01:35:15.799071 1606 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-k948q" podStartSLOduration=13.084194607 podStartE2EDuration="29.799056659s" podCreationTimestamp="2025-10-31 01:34:46 +0000 UTC" firstStartedPulling="2025-10-31 01:34:49.650913079 +0000 UTC m=+6.126359483" lastFinishedPulling="2025-10-31 01:35:06.36577513 +0000 UTC m=+22.841221535" observedRunningTime="2025-10-31 01:35:06.774118949 +0000 UTC m=+23.249565365" watchObservedRunningTime="2025-10-31 01:35:15.799056659 +0000 UTC m=+32.274503076" Oct 31 01:35:16.013453 env[1254]: 2025-10-31 01:35:15.799 [INFO][2540] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77" Oct 31 01:35:16.013453 env[1254]: 2025-10-31 01:35:15.800 [INFO][2540] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77" iface="eth0" netns="/var/run/netns/cni-c1193c51-b6cf-714b-f4bf-8a34924637cf" Oct 31 01:35:16.013453 env[1254]: 2025-10-31 01:35:15.801 [INFO][2540] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77" iface="eth0" netns="/var/run/netns/cni-c1193c51-b6cf-714b-f4bf-8a34924637cf" Oct 31 01:35:16.013453 env[1254]: 2025-10-31 01:35:15.802 [INFO][2540] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77" iface="eth0" netns="/var/run/netns/cni-c1193c51-b6cf-714b-f4bf-8a34924637cf" Oct 31 01:35:16.013453 env[1254]: 2025-10-31 01:35:15.802 [INFO][2540] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77" Oct 31 01:35:16.013453 env[1254]: 2025-10-31 01:35:15.802 [INFO][2540] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77" Oct 31 01:35:16.013453 env[1254]: 2025-10-31 01:35:16.001 [INFO][2553] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77" HandleID="k8s-pod-network.dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77" Workload="10.67.124.139-k8s-nginx--deployment--bb8f74bfb--4ttq2-eth0" Oct 31 01:35:16.013453 env[1254]: 2025-10-31 01:35:16.001 [INFO][2553] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:16.013453 env[1254]: 2025-10-31 01:35:16.001 [INFO][2553] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:16.013453 env[1254]: 2025-10-31 01:35:16.008 [WARNING][2553] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77" HandleID="k8s-pod-network.dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77" Workload="10.67.124.139-k8s-nginx--deployment--bb8f74bfb--4ttq2-eth0" Oct 31 01:35:16.013453 env[1254]: 2025-10-31 01:35:16.008 [INFO][2553] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77" HandleID="k8s-pod-network.dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77" Workload="10.67.124.139-k8s-nginx--deployment--bb8f74bfb--4ttq2-eth0" Oct 31 01:35:16.013453 env[1254]: 2025-10-31 01:35:16.010 [INFO][2553] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:16.013453 env[1254]: 2025-10-31 01:35:16.012 [INFO][2540] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77" Oct 31 01:35:16.016351 env[1254]: time="2025-10-31T01:35:16.015517695Z" level=info msg="TearDown network for sandbox \"dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77\" successfully" Oct 31 01:35:16.016351 env[1254]: time="2025-10-31T01:35:16.015548132Z" level=info msg="StopPodSandbox for \"dfb23f41c47eddca47b0ca2188be684e3d52f22ed76d848ec85a41d59dac2a77\" returns successfully" Oct 31 01:35:16.014875 systemd[1]: run-netns-cni\x2dc1193c51\x2db6cf\x2d714b\x2df4bf\x2d8a34924637cf.mount: Deactivated successfully. Oct 31 01:35:16.017720 env[1254]: time="2025-10-31T01:35:16.017692036Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-bb8f74bfb-4ttq2,Uid:fee7a827-423d-40c4-9907-c82094f18516,Namespace:default,Attempt:1,}" Oct 31 01:35:16.030126 env[1254]: 2025-10-31 01:35:15.800 [INFO][2539] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59" Oct 31 01:35:16.030126 env[1254]: 2025-10-31 01:35:15.800 [INFO][2539] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59" iface="eth0" netns="/var/run/netns/cni-4eda48a2-5387-7e40-e52b-2fec773ca6ff" Oct 31 01:35:16.030126 env[1254]: 2025-10-31 01:35:15.801 [INFO][2539] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59" iface="eth0" netns="/var/run/netns/cni-4eda48a2-5387-7e40-e52b-2fec773ca6ff" Oct 31 01:35:16.030126 env[1254]: 2025-10-31 01:35:15.802 [INFO][2539] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59" iface="eth0" netns="/var/run/netns/cni-4eda48a2-5387-7e40-e52b-2fec773ca6ff" Oct 31 01:35:16.030126 env[1254]: 2025-10-31 01:35:15.802 [INFO][2539] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59" Oct 31 01:35:16.030126 env[1254]: 2025-10-31 01:35:15.802 [INFO][2539] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59" Oct 31 01:35:16.030126 env[1254]: 2025-10-31 01:35:16.001 [INFO][2554] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59" HandleID="k8s-pod-network.ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59" Workload="10.67.124.139-k8s-csi--node--driver--mnsnz-eth0" Oct 31 01:35:16.030126 env[1254]: 2025-10-31 01:35:16.001 [INFO][2554] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:16.030126 env[1254]: 2025-10-31 01:35:16.010 [INFO][2554] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:16.030126 env[1254]: 2025-10-31 01:35:16.021 [WARNING][2554] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59" HandleID="k8s-pod-network.ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59" Workload="10.67.124.139-k8s-csi--node--driver--mnsnz-eth0" Oct 31 01:35:16.030126 env[1254]: 2025-10-31 01:35:16.021 [INFO][2554] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59" HandleID="k8s-pod-network.ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59" Workload="10.67.124.139-k8s-csi--node--driver--mnsnz-eth0" Oct 31 01:35:16.030126 env[1254]: 2025-10-31 01:35:16.026 [INFO][2554] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:16.030126 env[1254]: 2025-10-31 01:35:16.028 [INFO][2539] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59" Oct 31 01:35:16.032532 env[1254]: time="2025-10-31T01:35:16.032079905Z" level=info msg="TearDown network for sandbox \"ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59\" successfully" Oct 31 01:35:16.032532 env[1254]: time="2025-10-31T01:35:16.032104550Z" level=info msg="StopPodSandbox for \"ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59\" returns successfully" Oct 31 01:35:16.031317 systemd[1]: run-netns-cni\x2d4eda48a2\x2d5387\x2d7e40\x2de52b\x2d2fec773ca6ff.mount: Deactivated successfully. Oct 31 01:35:16.033746 env[1254]: time="2025-10-31T01:35:16.033724581Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mnsnz,Uid:e8632157-b6ab-4b24-9a54-bc9204b241e8,Namespace:calico-system,Attempt:1,}" Oct 31 01:35:16.122700 systemd-networkd[1064]: cali61edf82dd43: Link UP Oct 31 01:35:16.125492 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:35:16.125571 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali61edf82dd43: link becomes ready Oct 31 01:35:16.125793 systemd-networkd[1064]: cali61edf82dd43: Gained carrier Oct 31 01:35:16.138048 env[1254]: 2025-10-31 01:35:16.077 [INFO][2567] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.139-k8s-nginx--deployment--bb8f74bfb--4ttq2-eth0 nginx-deployment-bb8f74bfb- default fee7a827-423d-40c4-9907-c82094f18516 1423 0 2025-10-31 01:35:01 +0000 UTC map[app:nginx pod-template-hash:bb8f74bfb projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.139 nginx-deployment-bb8f74bfb-4ttq2 eth0 default [] [] [kns.default ksa.default.default] cali61edf82dd43 [] [] }} ContainerID="f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a" Namespace="default" Pod="nginx-deployment-bb8f74bfb-4ttq2" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--bb8f74bfb--4ttq2-" Oct 31 01:35:16.138048 env[1254]: 2025-10-31 01:35:16.077 [INFO][2567] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a" Namespace="default" Pod="nginx-deployment-bb8f74bfb-4ttq2" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--bb8f74bfb--4ttq2-eth0" Oct 31 01:35:16.138048 env[1254]: 2025-10-31 01:35:16.093 [INFO][2594] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a" HandleID="k8s-pod-network.f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a" Workload="10.67.124.139-k8s-nginx--deployment--bb8f74bfb--4ttq2-eth0" Oct 31 01:35:16.138048 env[1254]: 2025-10-31 01:35:16.093 [INFO][2594] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a" HandleID="k8s-pod-network.f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a" Workload="10.67.124.139-k8s-nginx--deployment--bb8f74bfb--4ttq2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002defe0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.139", "pod":"nginx-deployment-bb8f74bfb-4ttq2", "timestamp":"2025-10-31 01:35:16.093738564 +0000 UTC"}, Hostname:"10.67.124.139", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:35:16.138048 env[1254]: 2025-10-31 01:35:16.093 [INFO][2594] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:16.138048 env[1254]: 2025-10-31 01:35:16.093 [INFO][2594] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:16.138048 env[1254]: 2025-10-31 01:35:16.093 [INFO][2594] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.139' Oct 31 01:35:16.138048 env[1254]: 2025-10-31 01:35:16.100 [INFO][2594] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a" host="10.67.124.139" Oct 31 01:35:16.138048 env[1254]: 2025-10-31 01:35:16.106 [INFO][2594] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.139" Oct 31 01:35:16.138048 env[1254]: 2025-10-31 01:35:16.109 [INFO][2594] ipam/ipam.go 511: Trying affinity for 192.168.110.0/26 host="10.67.124.139" Oct 31 01:35:16.138048 env[1254]: 2025-10-31 01:35:16.110 [INFO][2594] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.0/26 host="10.67.124.139" Oct 31 01:35:16.138048 env[1254]: 2025-10-31 01:35:16.111 [INFO][2594] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.0/26 host="10.67.124.139" Oct 31 01:35:16.138048 env[1254]: 2025-10-31 01:35:16.111 [INFO][2594] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.110.0/26 handle="k8s-pod-network.f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a" host="10.67.124.139" Oct 31 01:35:16.138048 env[1254]: 2025-10-31 01:35:16.112 [INFO][2594] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a Oct 31 01:35:16.138048 env[1254]: 2025-10-31 01:35:16.114 [INFO][2594] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.110.0/26 handle="k8s-pod-network.f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a" host="10.67.124.139" Oct 31 01:35:16.138048 env[1254]: 2025-10-31 01:35:16.117 [INFO][2594] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.110.1/26] block=192.168.110.0/26 handle="k8s-pod-network.f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a" host="10.67.124.139" Oct 31 01:35:16.138048 env[1254]: 2025-10-31 01:35:16.117 [INFO][2594] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.1/26] handle="k8s-pod-network.f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a" host="10.67.124.139" Oct 31 01:35:16.138048 env[1254]: 2025-10-31 01:35:16.117 [INFO][2594] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:16.138048 env[1254]: 2025-10-31 01:35:16.117 [INFO][2594] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.110.1/26] IPv6=[] ContainerID="f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a" HandleID="k8s-pod-network.f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a" Workload="10.67.124.139-k8s-nginx--deployment--bb8f74bfb--4ttq2-eth0" Oct 31 01:35:16.138532 env[1254]: 2025-10-31 01:35:16.118 [INFO][2567] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a" Namespace="default" Pod="nginx-deployment-bb8f74bfb-4ttq2" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--bb8f74bfb--4ttq2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-nginx--deployment--bb8f74bfb--4ttq2-eth0", GenerateName:"nginx-deployment-bb8f74bfb-", Namespace:"default", SelfLink:"", UID:"fee7a827-423d-40c4-9907-c82094f18516", ResourceVersion:"1423", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 35, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"bb8f74bfb", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"", Pod:"nginx-deployment-bb8f74bfb-4ttq2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali61edf82dd43", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:16.138532 env[1254]: 2025-10-31 01:35:16.118 [INFO][2567] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.1/32] ContainerID="f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a" Namespace="default" Pod="nginx-deployment-bb8f74bfb-4ttq2" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--bb8f74bfb--4ttq2-eth0" Oct 31 01:35:16.138532 env[1254]: 2025-10-31 01:35:16.118 [INFO][2567] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali61edf82dd43 ContainerID="f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a" Namespace="default" Pod="nginx-deployment-bb8f74bfb-4ttq2" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--bb8f74bfb--4ttq2-eth0" Oct 31 01:35:16.138532 env[1254]: 2025-10-31 01:35:16.125 [INFO][2567] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a" Namespace="default" Pod="nginx-deployment-bb8f74bfb-4ttq2" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--bb8f74bfb--4ttq2-eth0" Oct 31 01:35:16.138532 env[1254]: 2025-10-31 01:35:16.125 [INFO][2567] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a" Namespace="default" Pod="nginx-deployment-bb8f74bfb-4ttq2" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--bb8f74bfb--4ttq2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-nginx--deployment--bb8f74bfb--4ttq2-eth0", GenerateName:"nginx-deployment-bb8f74bfb-", Namespace:"default", SelfLink:"", UID:"fee7a827-423d-40c4-9907-c82094f18516", ResourceVersion:"1423", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 35, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"bb8f74bfb", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a", Pod:"nginx-deployment-bb8f74bfb-4ttq2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali61edf82dd43", MAC:"42:ff:0d:93:56:1c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:16.138532 env[1254]: 2025-10-31 01:35:16.136 [INFO][2567] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a" Namespace="default" Pod="nginx-deployment-bb8f74bfb-4ttq2" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--bb8f74bfb--4ttq2-eth0" Oct 31 01:35:16.155563 env[1254]: time="2025-10-31T01:35:16.155451456Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:35:16.155563 env[1254]: time="2025-10-31T01:35:16.155476577Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:35:16.155563 env[1254]: time="2025-10-31T01:35:16.155483546Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:35:16.155704 env[1254]: time="2025-10-31T01:35:16.155566537Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a pid=2627 runtime=io.containerd.runc.v2 Oct 31 01:35:16.163923 systemd[1]: Started cri-containerd-f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a.scope. Oct 31 01:35:16.178451 kernel: kauditd_printk_skb: 590 callbacks suppressed Oct 31 01:35:16.178521 kernel: audit: type=1325 audit(1761874516.148:649): table=filter:69 family=2 entries=38 op=nft_register_chain pid=2613 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:35:16.148000 audit[2613]: NETFILTER_CFG table=filter:69 family=2 entries=38 op=nft_register_chain pid=2613 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:35:16.148000 audit[2613]: SYSCALL arch=c000003e syscall=46 success=yes exit=21324 a0=3 a1=7fffa1797d90 a2=0 a3=7fffa1797d7c items=0 ppid=2336 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:16.183121 kernel: audit: type=1300 audit(1761874516.148:649): arch=c000003e syscall=46 success=yes exit=21324 a0=3 a1=7fffa1797d90 a2=0 a3=7fffa1797d7c items=0 ppid=2336 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:16.183151 kernel: audit: type=1327 audit(1761874516.148:649): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:35:16.148000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:35:16.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.191365 kernel: audit: type=1400 audit(1761874516.184:650): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.191399 kernel: audit: type=1400 audit(1761874516.184:651): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.192382 systemd-resolved[1205]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:35:16.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.201107 kernel: audit: type=1400 audit(1761874516.184:652): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.201145 kernel: audit: type=1400 audit(1761874516.184:653): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.206617 kernel: audit: type=1400 audit(1761874516.184:654): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.206674 kernel: audit: type=1400 audit(1761874516.184:655): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.209492 kernel: audit: type=1400 audit(1761874516.184:656): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.187000 audit: BPF prog-id=100 op=LOAD Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2627 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:16.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631633438323237303932383763326363626531353932376264353231 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2627 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:16.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631633438323237303932383763326363626531353932376264353231 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit: BPF prog-id=101 op=LOAD Oct 31 01:35:16.190000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001e1a20 items=0 ppid=2627 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:16.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631633438323237303932383763326363626531353932376264353231 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit: BPF prog-id=102 op=LOAD Oct 31 01:35:16.190000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001e1a68 items=0 ppid=2627 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:16.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631633438323237303932383763326363626531353932376264353231 Oct 31 01:35:16.190000 audit: BPF prog-id=102 op=UNLOAD Oct 31 01:35:16.190000 audit: BPF prog-id=101 op=UNLOAD Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.190000 audit: BPF prog-id=103 op=LOAD Oct 31 01:35:16.190000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001e1e78 items=0 ppid=2627 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:16.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631633438323237303932383763326363626531353932376264353231 Oct 31 01:35:16.220459 env[1254]: time="2025-10-31T01:35:16.220416766Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-bb8f74bfb-4ttq2,Uid:fee7a827-423d-40c4-9907-c82094f18516,Namespace:default,Attempt:1,} returns sandbox id \"f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a\"" Oct 31 01:35:16.221333 env[1254]: time="2025-10-31T01:35:16.221317184Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 31 01:35:16.229759 systemd-networkd[1064]: calia30cbc08957: Link UP Oct 31 01:35:16.231262 systemd-networkd[1064]: calia30cbc08957: Gained carrier Oct 31 01:35:16.231452 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia30cbc08957: link becomes ready Oct 31 01:35:16.241361 env[1254]: 2025-10-31 01:35:16.077 [INFO][2578] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.139-k8s-csi--node--driver--mnsnz-eth0 csi-node-driver- calico-system e8632157-b6ab-4b24-9a54-bc9204b241e8 1424 0 2025-10-31 01:34:46 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:9d99788f7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.67.124.139 csi-node-driver-mnsnz eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calia30cbc08957 [] [] }} ContainerID="a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815" Namespace="calico-system" Pod="csi-node-driver-mnsnz" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--mnsnz-" Oct 31 01:35:16.241361 env[1254]: 2025-10-31 01:35:16.077 [INFO][2578] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815" Namespace="calico-system" Pod="csi-node-driver-mnsnz" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--mnsnz-eth0" Oct 31 01:35:16.241361 env[1254]: 2025-10-31 01:35:16.096 [INFO][2596] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815" HandleID="k8s-pod-network.a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815" Workload="10.67.124.139-k8s-csi--node--driver--mnsnz-eth0" Oct 31 01:35:16.241361 env[1254]: 2025-10-31 01:35:16.096 [INFO][2596] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815" HandleID="k8s-pod-network.a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815" Workload="10.67.124.139-k8s-csi--node--driver--mnsnz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd070), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.124.139", "pod":"csi-node-driver-mnsnz", "timestamp":"2025-10-31 01:35:16.096595095 +0000 UTC"}, Hostname:"10.67.124.139", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:35:16.241361 env[1254]: 2025-10-31 01:35:16.096 [INFO][2596] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:16.241361 env[1254]: 2025-10-31 01:35:16.117 [INFO][2596] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:16.241361 env[1254]: 2025-10-31 01:35:16.117 [INFO][2596] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.139' Oct 31 01:35:16.241361 env[1254]: 2025-10-31 01:35:16.201 [INFO][2596] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815" host="10.67.124.139" Oct 31 01:35:16.241361 env[1254]: 2025-10-31 01:35:16.209 [INFO][2596] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.139" Oct 31 01:35:16.241361 env[1254]: 2025-10-31 01:35:16.213 [INFO][2596] ipam/ipam.go 511: Trying affinity for 192.168.110.0/26 host="10.67.124.139" Oct 31 01:35:16.241361 env[1254]: 2025-10-31 01:35:16.215 [INFO][2596] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.0/26 host="10.67.124.139" Oct 31 01:35:16.241361 env[1254]: 2025-10-31 01:35:16.217 [INFO][2596] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.0/26 host="10.67.124.139" Oct 31 01:35:16.241361 env[1254]: 2025-10-31 01:35:16.217 [INFO][2596] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.110.0/26 handle="k8s-pod-network.a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815" host="10.67.124.139" Oct 31 01:35:16.241361 env[1254]: 2025-10-31 01:35:16.218 [INFO][2596] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815 Oct 31 01:35:16.241361 env[1254]: 2025-10-31 01:35:16.223 [INFO][2596] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.110.0/26 handle="k8s-pod-network.a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815" host="10.67.124.139" Oct 31 01:35:16.241361 env[1254]: 2025-10-31 01:35:16.226 [INFO][2596] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.110.2/26] block=192.168.110.0/26 handle="k8s-pod-network.a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815" host="10.67.124.139" Oct 31 01:35:16.241361 env[1254]: 2025-10-31 01:35:16.226 [INFO][2596] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.2/26] handle="k8s-pod-network.a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815" host="10.67.124.139" Oct 31 01:35:16.241361 env[1254]: 2025-10-31 01:35:16.226 [INFO][2596] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:16.241361 env[1254]: 2025-10-31 01:35:16.226 [INFO][2596] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.110.2/26] IPv6=[] ContainerID="a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815" HandleID="k8s-pod-network.a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815" Workload="10.67.124.139-k8s-csi--node--driver--mnsnz-eth0" Oct 31 01:35:16.241827 env[1254]: 2025-10-31 01:35:16.227 [INFO][2578] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815" Namespace="calico-system" Pod="csi-node-driver-mnsnz" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--mnsnz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-csi--node--driver--mnsnz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e8632157-b6ab-4b24-9a54-bc9204b241e8", ResourceVersion:"1424", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"9d99788f7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"", Pod:"csi-node-driver-mnsnz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia30cbc08957", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:16.241827 env[1254]: 2025-10-31 01:35:16.227 [INFO][2578] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.2/32] ContainerID="a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815" Namespace="calico-system" Pod="csi-node-driver-mnsnz" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--mnsnz-eth0" Oct 31 01:35:16.241827 env[1254]: 2025-10-31 01:35:16.227 [INFO][2578] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia30cbc08957 ContainerID="a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815" Namespace="calico-system" Pod="csi-node-driver-mnsnz" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--mnsnz-eth0" Oct 31 01:35:16.241827 env[1254]: 2025-10-31 01:35:16.231 [INFO][2578] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815" Namespace="calico-system" Pod="csi-node-driver-mnsnz" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--mnsnz-eth0" Oct 31 01:35:16.241827 env[1254]: 2025-10-31 01:35:16.232 [INFO][2578] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815" Namespace="calico-system" Pod="csi-node-driver-mnsnz" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--mnsnz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-csi--node--driver--mnsnz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e8632157-b6ab-4b24-9a54-bc9204b241e8", ResourceVersion:"1424", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"9d99788f7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815", Pod:"csi-node-driver-mnsnz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia30cbc08957", MAC:"da:31:ec:f4:c0:58", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:16.241827 env[1254]: 2025-10-31 01:35:16.240 [INFO][2578] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815" Namespace="calico-system" Pod="csi-node-driver-mnsnz" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--mnsnz-eth0" Oct 31 01:35:16.247828 env[1254]: time="2025-10-31T01:35:16.247787055Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:35:16.247828 env[1254]: time="2025-10-31T01:35:16.247827209Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:35:16.247938 env[1254]: time="2025-10-31T01:35:16.247842413Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:35:16.247938 env[1254]: time="2025-10-31T01:35:16.247915509Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815 pid=2680 runtime=io.containerd.runc.v2 Oct 31 01:35:16.250000 audit[2693]: NETFILTER_CFG table=filter:70 family=2 entries=42 op=nft_register_chain pid=2693 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:35:16.250000 audit[2693]: SYSCALL arch=c000003e syscall=46 success=yes exit=22552 a0=3 a1=7ffec83adeb0 a2=0 a3=7ffec83ade9c items=0 ppid=2336 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:16.250000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:35:16.255327 systemd[1]: Started cri-containerd-a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815.scope. Oct 31 01:35:16.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.263000 audit: BPF prog-id=104 op=LOAD Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2680 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:16.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396535396361353034663935393665323335323235373939366237 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2680 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:16.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396535396361353034663935393665323335323235373939366237 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit: BPF prog-id=105 op=LOAD Oct 31 01:35:16.266000 audit[2690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00026dd90 items=0 ppid=2680 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:16.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396535396361353034663935393665323335323235373939366237 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit: BPF prog-id=106 op=LOAD Oct 31 01:35:16.266000 audit[2690]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00026ddd8 items=0 ppid=2680 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:16.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396535396361353034663935393665323335323235373939366237 Oct 31 01:35:16.266000 audit: BPF prog-id=106 op=UNLOAD Oct 31 01:35:16.266000 audit: BPF prog-id=105 op=UNLOAD Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:16.266000 audit: BPF prog-id=107 op=LOAD Oct 31 01:35:16.266000 audit[2690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003c81e8 items=0 ppid=2680 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:16.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396535396361353034663935393665323335323235373939366237 Oct 31 01:35:16.271103 systemd-resolved[1205]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:35:16.278033 env[1254]: time="2025-10-31T01:35:16.278010628Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mnsnz,Uid:e8632157-b6ab-4b24-9a54-bc9204b241e8,Namespace:calico-system,Attempt:1,} returns sandbox id \"a79e59ca504f9596e2352257996b75610a49f0889350a2b2874cdb191731f815\"" Oct 31 01:35:16.392155 kubelet[1606]: E1031 01:35:16.392120 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:17.392454 kubelet[1606]: E1031 01:35:17.392400 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:17.427867 systemd-networkd[1064]: cali61edf82dd43: Gained IPv6LL Oct 31 01:35:18.068079 systemd-networkd[1064]: calia30cbc08957: Gained IPv6LL Oct 31 01:35:18.392877 kubelet[1606]: E1031 01:35:18.392792 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:19.393202 kubelet[1606]: E1031 01:35:19.393173 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:19.781017 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3118778163.mount: Deactivated successfully. Oct 31 01:35:20.393771 kubelet[1606]: E1031 01:35:20.393745 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:20.900958 env[1254]: time="2025-10-31T01:35:20.900912029Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:20.901441 env[1254]: time="2025-10-31T01:35:20.901419780Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:20.904602 env[1254]: time="2025-10-31T01:35:20.904582464Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:20.905453 env[1254]: time="2025-10-31T01:35:20.905423229Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:20.905982 env[1254]: time="2025-10-31T01:35:20.905963210Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9\"" Oct 31 01:35:20.907100 env[1254]: time="2025-10-31T01:35:20.907081070Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 01:35:20.908068 env[1254]: time="2025-10-31T01:35:20.908052633Z" level=info msg="CreateContainer within sandbox \"f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Oct 31 01:35:20.914098 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3738080259.mount: Deactivated successfully. Oct 31 01:35:20.917387 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1353985579.mount: Deactivated successfully. Oct 31 01:35:20.919152 env[1254]: time="2025-10-31T01:35:20.919128080Z" level=info msg="CreateContainer within sandbox \"f1c4822709287c2ccbe15927bd5210b12e530d2072a1b1a29c594613fffc7f7a\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"47f8772b7d2f8270a56aed117c2b7270bf753c8f752e10b05f15a2c534907f40\"" Oct 31 01:35:20.919896 env[1254]: time="2025-10-31T01:35:20.919868162Z" level=info msg="StartContainer for \"47f8772b7d2f8270a56aed117c2b7270bf753c8f752e10b05f15a2c534907f40\"" Oct 31 01:35:20.931554 systemd[1]: Started cri-containerd-47f8772b7d2f8270a56aed117c2b7270bf753c8f752e10b05f15a2c534907f40.scope. Oct 31 01:35:20.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.943000 audit: BPF prog-id=108 op=LOAD Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2627 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:20.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663837373262376432663832373061353661656431313763326237 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2627 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:20.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663837373262376432663832373061353661656431313763326237 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit: BPF prog-id=109 op=LOAD Oct 31 01:35:20.944000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000383dc0 items=0 ppid=2627 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:20.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663837373262376432663832373061353661656431313763326237 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit: BPF prog-id=110 op=LOAD Oct 31 01:35:20.944000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000383e08 items=0 ppid=2627 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:20.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663837373262376432663832373061353661656431313763326237 Oct 31 01:35:20.944000 audit: BPF prog-id=110 op=UNLOAD Oct 31 01:35:20.944000 audit: BPF prog-id=109 op=UNLOAD Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:20.944000 audit: BPF prog-id=111 op=LOAD Oct 31 01:35:20.944000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003e0218 items=0 ppid=2627 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:20.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663837373262376432663832373061353661656431313763326237 Oct 31 01:35:20.966990 env[1254]: time="2025-10-31T01:35:20.966964516Z" level=info msg="StartContainer for \"47f8772b7d2f8270a56aed117c2b7270bf753c8f752e10b05f15a2c534907f40\" returns successfully" Oct 31 01:35:21.258981 env[1254]: time="2025-10-31T01:35:21.258950380Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:21.284680 env[1254]: time="2025-10-31T01:35:21.284618738Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 01:35:21.285242 kubelet[1606]: E1031 01:35:21.284918 1606 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:35:21.285242 kubelet[1606]: E1031 01:35:21.284949 1606 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:35:21.285242 kubelet[1606]: E1031 01:35:21.284995 1606 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-csi start failed in pod csi-node-driver-mnsnz_calico-system(e8632157-b6ab-4b24-9a54-bc9204b241e8): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:21.285607 env[1254]: time="2025-10-31T01:35:21.285584234Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 01:35:21.394239 kubelet[1606]: E1031 01:35:21.394213 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:21.788725 env[1254]: time="2025-10-31T01:35:21.788693822Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:21.789141 env[1254]: time="2025-10-31T01:35:21.789118188Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 01:35:21.789359 kubelet[1606]: E1031 01:35:21.789322 1606 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:35:21.789401 kubelet[1606]: E1031 01:35:21.789364 1606 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:35:21.789450 kubelet[1606]: E1031 01:35:21.789420 1606 kuberuntime_manager.go:1449] "Unhandled Error" err="container csi-node-driver-registrar start failed in pod csi-node-driver-mnsnz_calico-system(e8632157-b6ab-4b24-9a54-bc9204b241e8): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:21.789510 kubelet[1606]: E1031 01:35:21.789474 1606 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-mnsnz" podUID="e8632157-b6ab-4b24-9a54-bc9204b241e8" Oct 31 01:35:22.394547 kubelet[1606]: E1031 01:35:22.394516 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:22.769870 kubelet[1606]: E1031 01:35:22.769836 1606 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-mnsnz" podUID="e8632157-b6ab-4b24-9a54-bc9204b241e8" Oct 31 01:35:22.776671 kubelet[1606]: I1031 01:35:22.776636 1606 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-bb8f74bfb-4ttq2" podStartSLOduration=17.091027184 podStartE2EDuration="21.776625903s" podCreationTimestamp="2025-10-31 01:35:01 +0000 UTC" firstStartedPulling="2025-10-31 01:35:16.220977593 +0000 UTC m=+32.696424000" lastFinishedPulling="2025-10-31 01:35:20.906576314 +0000 UTC m=+37.382022719" observedRunningTime="2025-10-31 01:35:21.772008985 +0000 UTC m=+38.247455402" watchObservedRunningTime="2025-10-31 01:35:22.776625903 +0000 UTC m=+39.252072319" Oct 31 01:35:23.394880 kubelet[1606]: E1031 01:35:23.394854 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:24.371040 kubelet[1606]: E1031 01:35:24.371014 1606 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:24.395534 kubelet[1606]: E1031 01:35:24.395505 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:25.395971 kubelet[1606]: E1031 01:35:25.395942 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:26.396533 kubelet[1606]: E1031 01:35:26.396509 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:27.019193 kernel: kauditd_printk_skb: 167 callbacks suppressed Oct 31 01:35:27.019282 kernel: audit: type=1325 audit(1761874527.016:705): table=filter:71 family=2 entries=26 op=nft_register_rule pid=2786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:27.016000 audit[2786]: NETFILTER_CFG table=filter:71 family=2 entries=26 op=nft_register_rule pid=2786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:27.016000 audit[2786]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffc011e5730 a2=0 a3=7ffc011e571c items=0 ppid=1766 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:27.026025 kernel: audit: type=1300 audit(1761874527.016:705): arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffc011e5730 a2=0 a3=7ffc011e571c items=0 ppid=1766 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:27.026088 kernel: audit: type=1327 audit(1761874527.016:705): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:27.016000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:27.028000 audit[2786]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=2786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:27.028000 audit[2786]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc011e5730 a2=0 a3=0 items=0 ppid=1766 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:27.035780 kernel: audit: type=1325 audit(1761874527.028:706): table=nat:72 family=2 entries=20 op=nft_register_rule pid=2786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:27.035819 kernel: audit: type=1300 audit(1761874527.028:706): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc011e5730 a2=0 a3=0 items=0 ppid=1766 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:27.035835 kernel: audit: type=1327 audit(1761874527.028:706): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:27.028000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:27.397388 kubelet[1606]: E1031 01:35:27.397258 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:27.615293 systemd[1]: Created slice kubepods-besteffort-pod0c3e3b45_d470_434b_8fdd_d37a8480677f.slice. Oct 31 01:35:27.629107 kubelet[1606]: I1031 01:35:27.629069 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-692xg\" (UniqueName: \"kubernetes.io/projected/0c3e3b45-d470-434b-8fdd-d37a8480677f-kube-api-access-692xg\") pod \"nfs-server-provisioner-0\" (UID: \"0c3e3b45-d470-434b-8fdd-d37a8480677f\") " pod="default/nfs-server-provisioner-0" Oct 31 01:35:27.629107 kubelet[1606]: I1031 01:35:27.629109 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/0c3e3b45-d470-434b-8fdd-d37a8480677f-data\") pod \"nfs-server-provisioner-0\" (UID: \"0c3e3b45-d470-434b-8fdd-d37a8480677f\") " pod="default/nfs-server-provisioner-0" Oct 31 01:35:27.928974 env[1254]: time="2025-10-31T01:35:27.928717649Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:0c3e3b45-d470-434b-8fdd-d37a8480677f,Namespace:default,Attempt:0,}" Oct 31 01:35:28.044000 audit[2809]: NETFILTER_CFG table=filter:73 family=2 entries=38 op=nft_register_rule pid=2809 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:28.044000 audit[2809]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7fff847561a0 a2=0 a3=7fff8475618c items=0 ppid=1766 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:28.051704 kernel: audit: type=1325 audit(1761874528.044:707): table=filter:73 family=2 entries=38 op=nft_register_rule pid=2809 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:28.051825 kernel: audit: type=1300 audit(1761874528.044:707): arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7fff847561a0 a2=0 a3=7fff8475618c items=0 ppid=1766 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:28.051849 kernel: audit: type=1327 audit(1761874528.044:707): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:28.044000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:28.053964 kernel: audit: type=1325 audit(1761874528.052:708): table=nat:74 family=2 entries=20 op=nft_register_rule pid=2809 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:28.052000 audit[2809]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=2809 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:28.052000 audit[2809]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff847561a0 a2=0 a3=0 items=0 ppid=1766 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:28.052000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:28.110034 systemd-networkd[1064]: cali60e51b789ff: Link UP Oct 31 01:35:28.112170 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:35:28.112253 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Oct 31 01:35:28.112399 systemd-networkd[1064]: cali60e51b789ff: Gained carrier Oct 31 01:35:28.135510 env[1254]: 2025-10-31 01:35:27.989 [INFO][2788] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.139-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 0c3e3b45-d470-434b-8fdd-d37a8480677f 1509 0 2025-10-31 01:35:27 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-7c9b4c458c heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.124.139 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-" Oct 31 01:35:28.135510 env[1254]: 2025-10-31 01:35:27.989 [INFO][2788] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:35:28.135510 env[1254]: 2025-10-31 01:35:28.026 [INFO][2802] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad" HandleID="k8s-pod-network.5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad" Workload="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:35:28.135510 env[1254]: 2025-10-31 01:35:28.026 [INFO][2802] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad" HandleID="k8s-pod-network.5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad" Workload="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d55a0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.139", "pod":"nfs-server-provisioner-0", "timestamp":"2025-10-31 01:35:28.026181572 +0000 UTC"}, Hostname:"10.67.124.139", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:35:28.135510 env[1254]: 2025-10-31 01:35:28.026 [INFO][2802] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:28.135510 env[1254]: 2025-10-31 01:35:28.026 [INFO][2802] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:28.135510 env[1254]: 2025-10-31 01:35:28.026 [INFO][2802] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.139' Oct 31 01:35:28.135510 env[1254]: 2025-10-31 01:35:28.079 [INFO][2802] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad" host="10.67.124.139" Oct 31 01:35:28.135510 env[1254]: 2025-10-31 01:35:28.085 [INFO][2802] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.139" Oct 31 01:35:28.135510 env[1254]: 2025-10-31 01:35:28.089 [INFO][2802] ipam/ipam.go 511: Trying affinity for 192.168.110.0/26 host="10.67.124.139" Oct 31 01:35:28.135510 env[1254]: 2025-10-31 01:35:28.090 [INFO][2802] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.0/26 host="10.67.124.139" Oct 31 01:35:28.135510 env[1254]: 2025-10-31 01:35:28.091 [INFO][2802] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.0/26 host="10.67.124.139" Oct 31 01:35:28.135510 env[1254]: 2025-10-31 01:35:28.091 [INFO][2802] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.110.0/26 handle="k8s-pod-network.5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad" host="10.67.124.139" Oct 31 01:35:28.135510 env[1254]: 2025-10-31 01:35:28.092 [INFO][2802] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad Oct 31 01:35:28.135510 env[1254]: 2025-10-31 01:35:28.096 [INFO][2802] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.110.0/26 handle="k8s-pod-network.5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad" host="10.67.124.139" Oct 31 01:35:28.135510 env[1254]: 2025-10-31 01:35:28.106 [INFO][2802] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.110.3/26] block=192.168.110.0/26 handle="k8s-pod-network.5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad" host="10.67.124.139" Oct 31 01:35:28.135510 env[1254]: 2025-10-31 01:35:28.106 [INFO][2802] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.3/26] handle="k8s-pod-network.5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad" host="10.67.124.139" Oct 31 01:35:28.135510 env[1254]: 2025-10-31 01:35:28.106 [INFO][2802] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:28.135510 env[1254]: 2025-10-31 01:35:28.106 [INFO][2802] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.110.3/26] IPv6=[] ContainerID="5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad" HandleID="k8s-pod-network.5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad" Workload="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:35:28.136056 env[1254]: 2025-10-31 01:35:28.108 [INFO][2788] cni-plugin/k8s.go 418: Populated endpoint ContainerID="5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"0c3e3b45-d470-434b-8fdd-d37a8480677f", ResourceVersion:"1509", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 35, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-7c9b4c458c", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.110.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:28.136056 env[1254]: 2025-10-31 01:35:28.108 [INFO][2788] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.3/32] ContainerID="5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:35:28.136056 env[1254]: 2025-10-31 01:35:28.108 [INFO][2788] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:35:28.136056 env[1254]: 2025-10-31 01:35:28.112 [INFO][2788] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:35:28.136237 env[1254]: 2025-10-31 01:35:28.113 [INFO][2788] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"0c3e3b45-d470-434b-8fdd-d37a8480677f", ResourceVersion:"1509", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 35, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-7c9b4c458c", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.110.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"f6:35:c7:23:37:c3", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:28.136237 env[1254]: 2025-10-31 01:35:28.134 [INFO][2788] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:35:28.147021 env[1254]: time="2025-10-31T01:35:28.146913447Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:35:28.147021 env[1254]: time="2025-10-31T01:35:28.146938321Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:35:28.147021 env[1254]: time="2025-10-31T01:35:28.146947106Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:35:28.147238 env[1254]: time="2025-10-31T01:35:28.147211692Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad pid=2825 runtime=io.containerd.runc.v2 Oct 31 01:35:28.160722 systemd[1]: Started cri-containerd-5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad.scope. Oct 31 01:35:28.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.170000 audit: BPF prog-id=112 op=LOAD Oct 31 01:35:28.171000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.171000 audit[2836]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2825 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:28.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562646562323866646438383632306563656238373565646338343431 Oct 31 01:35:28.171000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.171000 audit[2836]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2825 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:28.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562646562323866646438383632306563656238373565646338343431 Oct 31 01:35:28.171000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.171000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.171000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.171000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.171000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.171000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.171000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.171000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.171000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.171000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.171000 audit: BPF prog-id=113 op=LOAD Oct 31 01:35:28.171000 audit[2836]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00034dce0 items=0 ppid=2825 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:28.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562646562323866646438383632306563656238373565646338343431 Oct 31 01:35:28.172000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.172000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.172000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.172000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.172000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.172000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.172000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.172000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.172000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.172000 audit: BPF prog-id=114 op=LOAD Oct 31 01:35:28.172000 audit[2836]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00034dd28 items=0 ppid=2825 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:28.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562646562323866646438383632306563656238373565646338343431 Oct 31 01:35:28.172000 audit: BPF prog-id=114 op=UNLOAD Oct 31 01:35:28.172000 audit: BPF prog-id=113 op=UNLOAD Oct 31 01:35:28.172000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.172000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.172000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.172000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.172000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.172000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.172000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.172000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.172000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.172000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:28.172000 audit: BPF prog-id=115 op=LOAD Oct 31 01:35:28.172000 audit[2836]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003d2138 items=0 ppid=2825 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:28.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562646562323866646438383632306563656238373565646338343431 Oct 31 01:35:28.175255 systemd-resolved[1205]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:35:28.182000 audit[2856]: NETFILTER_CFG table=filter:75 family=2 entries=46 op=nft_register_chain pid=2856 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:35:28.182000 audit[2856]: SYSCALL arch=c000003e syscall=46 success=yes exit=23608 a0=3 a1=7ffd0b6642f0 a2=0 a3=7ffd0b6642dc items=0 ppid=2336 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:28.182000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:35:28.196181 env[1254]: time="2025-10-31T01:35:28.196156684Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:0c3e3b45-d470-434b-8fdd-d37a8480677f,Namespace:default,Attempt:0,} returns sandbox id \"5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad\"" Oct 31 01:35:28.197372 env[1254]: time="2025-10-31T01:35:28.197355771Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Oct 31 01:35:28.397720 kubelet[1606]: E1031 01:35:28.397641 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:28.741405 systemd[1]: run-containerd-runc-k8s.io-5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad-runc.zGBabt.mount: Deactivated successfully. Oct 31 01:35:29.332923 systemd-networkd[1064]: cali60e51b789ff: Gained IPv6LL Oct 31 01:35:29.398337 kubelet[1606]: E1031 01:35:29.398294 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:30.117327 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3867726436.mount: Deactivated successfully. Oct 31 01:35:30.399444 kubelet[1606]: E1031 01:35:30.399351 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:31.400391 kubelet[1606]: E1031 01:35:31.400352 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:31.633864 env[1254]: time="2025-10-31T01:35:31.633830839Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:31.645362 env[1254]: time="2025-10-31T01:35:31.645333799Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:31.649492 env[1254]: time="2025-10-31T01:35:31.649463945Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:31.652487 env[1254]: time="2025-10-31T01:35:31.652423758Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:31.652999 env[1254]: time="2025-10-31T01:35:31.652967824Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Oct 31 01:35:31.664418 env[1254]: time="2025-10-31T01:35:31.664394425Z" level=info msg="CreateContainer within sandbox \"5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Oct 31 01:35:31.689607 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3187355214.mount: Deactivated successfully. Oct 31 01:35:31.692911 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1844024229.mount: Deactivated successfully. Oct 31 01:35:31.725332 env[1254]: time="2025-10-31T01:35:31.725299252Z" level=info msg="CreateContainer within sandbox \"5bdeb28fdd88620eceb875edc84419fcb13783d21f069a207424061408b8b5ad\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"0a573ca9ce3953cdfe38f142958b915a1bbbca0c3c86fef3acd486111c994463\"" Oct 31 01:35:31.725802 env[1254]: time="2025-10-31T01:35:31.725788596Z" level=info msg="StartContainer for \"0a573ca9ce3953cdfe38f142958b915a1bbbca0c3c86fef3acd486111c994463\"" Oct 31 01:35:31.746889 systemd[1]: Started cri-containerd-0a573ca9ce3953cdfe38f142958b915a1bbbca0c3c86fef3acd486111c994463.scope. Oct 31 01:35:31.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.757000 audit: BPF prog-id=116 op=LOAD Oct 31 01:35:31.758000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.758000 audit[2877]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2825 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:31.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061353733636139636533393533636466653338663134323935386239 Oct 31 01:35:31.758000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.758000 audit[2877]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2825 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:31.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061353733636139636533393533636466653338663134323935386239 Oct 31 01:35:31.758000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.758000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.758000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.758000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.758000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.758000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.758000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.758000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.758000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.758000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.758000 audit: BPF prog-id=117 op=LOAD Oct 31 01:35:31.758000 audit[2877]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000308840 items=0 ppid=2825 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:31.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061353733636139636533393533636466653338663134323935386239 Oct 31 01:35:31.759000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.759000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.759000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.759000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.759000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.759000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.759000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.759000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.759000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.759000 audit: BPF prog-id=118 op=LOAD Oct 31 01:35:31.759000 audit[2877]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000308888 items=0 ppid=2825 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:31.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061353733636139636533393533636466653338663134323935386239 Oct 31 01:35:31.759000 audit: BPF prog-id=118 op=UNLOAD Oct 31 01:35:31.759000 audit: BPF prog-id=117 op=UNLOAD Oct 31 01:35:31.759000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.759000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.759000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.759000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.759000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.759000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.759000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.759000 audit[2877]: AVC avc: denied { perfmon } for pid=2877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.759000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.759000 audit[2877]: AVC avc: denied { bpf } for pid=2877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:31.759000 audit: BPF prog-id=119 op=LOAD Oct 31 01:35:31.759000 audit[2877]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000308c98 items=0 ppid=2825 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:31.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061353733636139636533393533636466653338663134323935386239 Oct 31 01:35:31.798000 audit[2907]: AVC avc: denied { search } for pid=2907 comm="rpcbind" name="crypto" dev="proc" ino=33088 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c116 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 31 01:35:31.798000 audit[2907]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f701543d0c0 a2=0 a3=0 items=0 ppid=2888 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c116 key=(null) Oct 31 01:35:31.798000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Oct 31 01:35:31.802766 env[1254]: time="2025-10-31T01:35:31.802623164Z" level=info msg="StartContainer for \"0a573ca9ce3953cdfe38f142958b915a1bbbca0c3c86fef3acd486111c994463\" returns successfully" Oct 31 01:35:31.825000 audit[2912]: AVC avc: denied { search } for pid=2912 comm="dbus-daemon" name="crypto" dev="proc" ino=33088 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c116 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 31 01:35:31.825000 audit[2912]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f678105a0c0 a2=0 a3=0 items=0 ppid=2888 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c116 key=(null) Oct 31 01:35:31.825000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Oct 31 01:35:31.827000 audit[2913]: AVC avc: denied { watch } for pid=2913 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=529689 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c116 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c84,c116 tclass=dir permissive=0 Oct 31 01:35:31.827000 audit[2913]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5584324d23b0 a2=2c8 a3=7ffd1e15742c items=0 ppid=2888 pid=2913 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c116 key=(null) Oct 31 01:35:31.827000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Oct 31 01:35:31.830000 audit[2914]: AVC avc: denied { read } for pid=2914 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=34688 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c116 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Oct 31 01:35:31.830000 audit[2914]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fe1c1a99320 a1=80000 a2=d a3=7ffe87639bf0 items=0 ppid=2888 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c116 key=(null) Oct 31 01:35:31.830000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Oct 31 01:35:31.831000 audit[2914]: AVC avc: denied { search } for pid=2914 comm="ganesha.nfsd" name="crypto" dev="proc" ino=33088 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c116 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 31 01:35:31.831000 audit[2914]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fe1c0fed0c0 a2=0 a3=0 items=0 ppid=2888 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c116 key=(null) Oct 31 01:35:31.831000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Oct 31 01:35:32.401050 kubelet[1606]: E1031 01:35:32.401011 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:32.876000 audit[2942]: NETFILTER_CFG table=filter:76 family=2 entries=26 op=nft_register_rule pid=2942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:32.880282 kernel: kauditd_printk_skb: 134 callbacks suppressed Oct 31 01:35:32.880331 kernel: audit: type=1325 audit(1761874532.876:751): table=filter:76 family=2 entries=26 op=nft_register_rule pid=2942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:32.880351 kernel: audit: type=1300 audit(1761874532.876:751): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd0e609cf0 a2=0 a3=7ffd0e609cdc items=0 ppid=1766 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:32.876000 audit[2942]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd0e609cf0 a2=0 a3=7ffd0e609cdc items=0 ppid=1766 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:32.876000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:32.885591 kernel: audit: type=1327 audit(1761874532.876:751): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:32.886000 audit[2942]: NETFILTER_CFG table=nat:77 family=2 entries=104 op=nft_register_chain pid=2942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:32.886000 audit[2942]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffd0e609cf0 a2=0 a3=7ffd0e609cdc items=0 ppid=1766 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:32.893842 kernel: audit: type=1325 audit(1761874532.886:752): table=nat:77 family=2 entries=104 op=nft_register_chain pid=2942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:32.893926 kernel: audit: type=1300 audit(1761874532.886:752): arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffd0e609cf0 a2=0 a3=7ffd0e609cdc items=0 ppid=1766 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:32.893943 kernel: audit: type=1327 audit(1761874532.886:752): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:32.886000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:33.401795 kubelet[1606]: E1031 01:35:33.401768 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:34.402299 kubelet[1606]: E1031 01:35:34.402274 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:35.403501 kubelet[1606]: E1031 01:35:35.403475 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:36.404982 kubelet[1606]: E1031 01:35:36.404833 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:37.097819 kubelet[1606]: I1031 01:35:37.097782 1606 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=6.640990314 podStartE2EDuration="10.097769597s" podCreationTimestamp="2025-10-31 01:35:27 +0000 UTC" firstStartedPulling="2025-10-31 01:35:28.197004091 +0000 UTC m=+44.672450495" lastFinishedPulling="2025-10-31 01:35:31.653783374 +0000 UTC m=+48.129229778" observedRunningTime="2025-10-31 01:35:32.817650012 +0000 UTC m=+49.293096427" watchObservedRunningTime="2025-10-31 01:35:37.097769597 +0000 UTC m=+53.573216002" Oct 31 01:35:37.104648 systemd[1]: Created slice kubepods-besteffort-podcd151b03_00b1_4262_be13_5143cc17ce2f.slice. Oct 31 01:35:37.277481 kubelet[1606]: I1031 01:35:37.277428 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-72a81ee4-cc9f-45ac-a51e-d2f42b8fbee6\" (UniqueName: \"kubernetes.io/nfs/cd151b03-00b1-4262-be13-5143cc17ce2f-pvc-72a81ee4-cc9f-45ac-a51e-d2f42b8fbee6\") pod \"test-pod-1\" (UID: \"cd151b03-00b1-4262-be13-5143cc17ce2f\") " pod="default/test-pod-1" Oct 31 01:35:37.277666 kubelet[1606]: I1031 01:35:37.277653 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dt2b6\" (UniqueName: \"kubernetes.io/projected/cd151b03-00b1-4262-be13-5143cc17ce2f-kube-api-access-dt2b6\") pod \"test-pod-1\" (UID: \"cd151b03-00b1-4262-be13-5143cc17ce2f\") " pod="default/test-pod-1" Oct 31 01:35:37.405322 kubelet[1606]: E1031 01:35:37.405255 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:37.403000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.411653 kernel: Failed to create system directory netfs Oct 31 01:35:37.411694 kernel: audit: type=1400 audit(1761874537.403:753): avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.411742 kernel: Failed to create system directory netfs Oct 31 01:35:37.411761 kernel: audit: type=1400 audit(1761874537.403:753): avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.403000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.414949 kernel: Failed to create system directory netfs Oct 31 01:35:37.414975 kernel: audit: type=1400 audit(1761874537.403:753): avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.403000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.418168 kernel: Failed to create system directory netfs Oct 31 01:35:37.418194 kernel: audit: type=1400 audit(1761874537.403:753): avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.403000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.403000 audit[2948]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561ba83345e0 a1=153bc a2=561b9328a2b0 a3=5 items=0 ppid=488 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:37.403000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 01:35:37.424000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.424000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.429494 kernel: Failed to create system directory fscache Oct 31 01:35:37.429529 kernel: Failed to create system directory fscache Oct 31 01:35:37.429543 kernel: Failed to create system directory fscache Oct 31 01:35:37.424000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.424000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.430750 kernel: Failed to create system directory fscache Oct 31 01:35:37.430781 kernel: Failed to create system directory fscache Oct 31 01:35:37.424000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.424000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.432004 kernel: Failed to create system directory fscache Oct 31 01:35:37.432030 kernel: Failed to create system directory fscache Oct 31 01:35:37.424000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.424000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.424000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.433903 kernel: Failed to create system directory fscache Oct 31 01:35:37.433937 kernel: Failed to create system directory fscache Oct 31 01:35:37.433950 kernel: Failed to create system directory fscache Oct 31 01:35:37.424000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.424000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.424000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.435786 kernel: Failed to create system directory fscache Oct 31 01:35:37.435812 kernel: Failed to create system directory fscache Oct 31 01:35:37.435828 kernel: Failed to create system directory fscache Oct 31 01:35:37.424000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.424000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.437042 kernel: Failed to create system directory fscache Oct 31 01:35:37.438534 kernel: FS-Cache: Loaded Oct 31 01:35:37.424000 audit[2948]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561ba85499c0 a1=4c0fc a2=561b9328a2b0 a3=5 items=0 ppid=488 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:37.424000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.463456 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.463489 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.464693 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.464717 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.465977 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.466007 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.467817 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.467842 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.467855 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.469033 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.469054 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.470883 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.470909 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.470923 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.472727 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.472750 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.472764 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.473957 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.473983 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.475780 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.475806 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.475819 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.477001 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.477026 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.478835 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.478857 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.478873 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.480664 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.480694 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.480706 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.481881 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.481908 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.482513 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.483719 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.483748 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.484938 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.484964 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.486777 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.486801 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.486815 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.487987 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.488059 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.489838 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.489864 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.489878 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.491697 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.491720 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.491734 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.492944 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.492972 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.494884 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.494909 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.494922 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.496738 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.496763 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.496779 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.497952 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.498595 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.498619 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.499816 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.505283 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.505382 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.505406 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.505420 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.505438 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.506558 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.506585 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.507922 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.507948 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.509749 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.509779 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.509793 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.510975 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.511003 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.512814 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.512849 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.512864 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.514025 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.514052 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.515852 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.515879 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.515893 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.517673 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.517702 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.517715 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.518881 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.518906 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.520698 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.520755 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.520770 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.521907 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.521932 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.523730 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.523754 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.523779 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.524985 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.525009 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.526798 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.526827 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.526841 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.528011 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.528038 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.529835 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.529865 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.529879 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.530456 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.531655 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.531691 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.532862 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.532894 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.534679 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.534706 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.534720 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.535876 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.535904 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.537696 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.537724 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.537737 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.538913 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.538943 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.540727 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.540757 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.540770 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.541907 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.541935 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.452000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.543451 kernel: Failed to create system directory sunrpc Oct 31 01:35:37.549886 kernel: RPC: Registered named UNIX socket transport module. Oct 31 01:35:37.549948 kernel: RPC: Registered udp transport module. Oct 31 01:35:37.549965 kernel: RPC: Registered tcp transport module. Oct 31 01:35:37.549978 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Oct 31 01:35:37.452000 audit[2948]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561ba8595ad0 a1=1a8274 a2=561b9328a2b0 a3=5 items=6 ppid=488 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:37.452000 audit: CWD cwd="/" Oct 31 01:35:37.452000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:35:37.452000 audit: PATH item=1 name=(null) inode=34910 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:35:37.452000 audit: PATH item=2 name=(null) inode=34910 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:35:37.452000 audit: PATH item=3 name=(null) inode=34911 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:35:37.452000 audit: PATH item=4 name=(null) inode=34910 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:35:37.452000 audit: PATH item=5 name=(null) inode=34912 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:35:37.452000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.580516 kernel: Failed to create system directory nfs Oct 31 01:35:37.580547 kernel: Failed to create system directory nfs Oct 31 01:35:37.580561 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.581657 kernel: Failed to create system directory nfs Oct 31 01:35:37.581681 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.582823 kernel: Failed to create system directory nfs Oct 31 01:35:37.582846 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.583988 kernel: Failed to create system directory nfs Oct 31 01:35:37.584027 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.585754 kernel: Failed to create system directory nfs Oct 31 01:35:37.586010 kernel: Failed to create system directory nfs Oct 31 01:35:37.586055 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.586927 kernel: Failed to create system directory nfs Oct 31 01:35:37.586951 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.588727 kernel: Failed to create system directory nfs Oct 31 01:35:37.588750 kernel: Failed to create system directory nfs Oct 31 01:35:37.588766 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.589851 kernel: Failed to create system directory nfs Oct 31 01:35:37.589870 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.590978 kernel: Failed to create system directory nfs Oct 31 01:35:37.591002 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.591571 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.592727 kernel: Failed to create system directory nfs Oct 31 01:35:37.592751 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.593873 kernel: Failed to create system directory nfs Oct 31 01:35:37.593897 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.595032 kernel: Failed to create system directory nfs Oct 31 01:35:37.595055 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.596772 kernel: Failed to create system directory nfs Oct 31 01:35:37.596795 kernel: Failed to create system directory nfs Oct 31 01:35:37.596810 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.597916 kernel: Failed to create system directory nfs Oct 31 01:35:37.597940 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.599687 kernel: Failed to create system directory nfs Oct 31 01:35:37.599711 kernel: Failed to create system directory nfs Oct 31 01:35:37.599757 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.600848 kernel: Failed to create system directory nfs Oct 31 01:35:37.600868 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.602004 kernel: Failed to create system directory nfs Oct 31 01:35:37.602024 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.603760 kernel: Failed to create system directory nfs Oct 31 01:35:37.603785 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.608757 kernel: Failed to create system directory nfs Oct 31 01:35:37.608793 kernel: Failed to create system directory nfs Oct 31 01:35:37.608808 kernel: Failed to create system directory nfs Oct 31 01:35:37.608837 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.609906 kernel: Failed to create system directory nfs Oct 31 01:35:37.609930 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.610485 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.611648 kernel: Failed to create system directory nfs Oct 31 01:35:37.611671 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.612818 kernel: Failed to create system directory nfs Oct 31 01:35:37.612847 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.613964 kernel: Failed to create system directory nfs Oct 31 01:35:37.613988 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.615708 kernel: Failed to create system directory nfs Oct 31 01:35:37.615738 kernel: Failed to create system directory nfs Oct 31 01:35:37.615753 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.616866 kernel: Failed to create system directory nfs Oct 31 01:35:37.616890 kernel: Failed to create system directory nfs Oct 31 01:35:37.571000 audit[2948]: AVC avc: denied { confidentiality } for pid=2948 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.630504 kernel: FS-Cache: Netfs 'nfs' registered for caching Oct 31 01:35:37.571000 audit[2948]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561ba87b6c10 a1=16eb2c a2=561b9328a2b0 a3=5 items=0 ppid=488 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:37.571000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.662828 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.662865 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.664697 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.664741 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.666023 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.666054 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.666069 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.667858 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.667888 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.668102 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.669034 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.669060 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.670820 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.670843 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.670859 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.672004 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.672027 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.672601 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.673791 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.673817 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.675001 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.675021 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.675602 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.676798 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.676821 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.677981 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.678005 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.678575 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.679771 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.679795 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.680992 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.681016 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.683408 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.683944 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.683981 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.684012 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.684155 env[1254]: time="2025-10-31T01:35:37.682403939Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 01:35:37.684727 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.684759 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.685940 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.685965 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.686535 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.687732 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.687757 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.688955 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.688981 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.689552 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.690779 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.690799 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.692005 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.692029 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.692601 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.693798 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.693828 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.695015 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.695038 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.695605 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.696939 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.696966 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.697534 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.698726 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.698757 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.699950 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.699974 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.701772 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.701794 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.701810 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.702958 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.702986 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.704769 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.704793 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.704804 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.705957 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.705981 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.706527 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.707721 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.709978 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.710009 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.710022 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.710600 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.711812 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.711836 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.713017 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.713040 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.714834 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.714859 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.714874 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.716028 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.716048 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.716623 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.717819 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.717844 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.719009 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.719032 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.719601 kernel: Failed to create system directory nfs4 Oct 31 01:35:37.649000 audit[2953]: AVC avc: denied { confidentiality } for pid=2953 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.753715 systemd[1]: run-containerd-runc-k8s.io-af5b453c744f7dd6444ad4ddc8d9b1c8d1d9abbe100ab564983f61d0194310f0-runc.aIlDh8.mount: Deactivated successfully. Oct 31 01:35:37.822684 kernel: NFS: Registering the id_resolver key type Oct 31 01:35:37.822839 kernel: Key type id_resolver registered Oct 31 01:35:37.823456 kernel: Key type id_legacy registered Oct 31 01:35:37.649000 audit[2953]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fc6f7169010 a1=2095c4 a2=56512ec272b0 a3=5 items=0 ppid=488 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:37.649000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.838034 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.838081 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.838097 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.839937 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.839961 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.840599 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.841851 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.841881 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.841897 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.843726 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.843762 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.843783 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.844977 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.845009 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.846856 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.846879 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.846904 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.848734 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.848757 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.848781 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.849984 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.850018 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.851854 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.851883 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.851899 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.832000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:35:37.853460 kernel: Failed to create system directory rpcgss Oct 31 01:35:37.832000 audit[2973]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f3e71b1f010 a1=70bf4 a2=559f4850f2b0 a3=5 items=0 ppid=488 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:37.832000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Oct 31 01:35:37.864501 nfsidmap[2981]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Oct 31 01:35:37.865962 nfsidmap[2982]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Oct 31 01:35:38.009915 env[1254]: time="2025-10-31T01:35:38.009888439Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:cd151b03-00b1-4262-be13-5143cc17ce2f,Namespace:default,Attempt:0,}" Oct 31 01:35:38.053889 env[1254]: time="2025-10-31T01:35:38.053850983Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:38.054475 env[1254]: time="2025-10-31T01:35:38.054435916Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 01:35:38.054618 kubelet[1606]: E1031 01:35:38.054594 1606 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:35:38.054673 kubelet[1606]: E1031 01:35:38.054624 1606 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:35:38.054703 kubelet[1606]: E1031 01:35:38.054675 1606 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-csi start failed in pod csi-node-driver-mnsnz_calico-system(e8632157-b6ab-4b24-9a54-bc9204b241e8): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:38.055383 env[1254]: time="2025-10-31T01:35:38.055365901Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 01:35:38.079943 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:35:38.080007 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Oct 31 01:35:38.077565 systemd-networkd[1064]: cali5ec59c6bf6e: Link UP Oct 31 01:35:38.079918 systemd-networkd[1064]: cali5ec59c6bf6e: Gained carrier Oct 31 01:35:38.085903 env[1254]: 2025-10-31 01:35:38.038 [INFO][2985] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.139-k8s-test--pod--1-eth0 default cd151b03-00b1-4262-be13-5143cc17ce2f 1576 0 2025-10-31 01:35:29 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.139 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-" Oct 31 01:35:38.085903 env[1254]: 2025-10-31 01:35:38.038 [INFO][2985] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" Oct 31 01:35:38.085903 env[1254]: 2025-10-31 01:35:38.053 [INFO][2998] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9" HandleID="k8s-pod-network.37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9" Workload="10.67.124.139-k8s-test--pod--1-eth0" Oct 31 01:35:38.085903 env[1254]: 2025-10-31 01:35:38.053 [INFO][2998] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9" HandleID="k8s-pod-network.37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9" Workload="10.67.124.139-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4fe0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.139", "pod":"test-pod-1", "timestamp":"2025-10-31 01:35:38.053131062 +0000 UTC"}, Hostname:"10.67.124.139", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:35:38.085903 env[1254]: 2025-10-31 01:35:38.053 [INFO][2998] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:38.085903 env[1254]: 2025-10-31 01:35:38.053 [INFO][2998] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:38.085903 env[1254]: 2025-10-31 01:35:38.053 [INFO][2998] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.139' Oct 31 01:35:38.085903 env[1254]: 2025-10-31 01:35:38.058 [INFO][2998] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9" host="10.67.124.139" Oct 31 01:35:38.085903 env[1254]: 2025-10-31 01:35:38.063 [INFO][2998] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.139" Oct 31 01:35:38.085903 env[1254]: 2025-10-31 01:35:38.065 [INFO][2998] ipam/ipam.go 511: Trying affinity for 192.168.110.0/26 host="10.67.124.139" Oct 31 01:35:38.085903 env[1254]: 2025-10-31 01:35:38.066 [INFO][2998] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.0/26 host="10.67.124.139" Oct 31 01:35:38.085903 env[1254]: 2025-10-31 01:35:38.067 [INFO][2998] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.0/26 host="10.67.124.139" Oct 31 01:35:38.085903 env[1254]: 2025-10-31 01:35:38.067 [INFO][2998] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.110.0/26 handle="k8s-pod-network.37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9" host="10.67.124.139" Oct 31 01:35:38.085903 env[1254]: 2025-10-31 01:35:38.067 [INFO][2998] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9 Oct 31 01:35:38.085903 env[1254]: 2025-10-31 01:35:38.069 [INFO][2998] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.110.0/26 handle="k8s-pod-network.37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9" host="10.67.124.139" Oct 31 01:35:38.085903 env[1254]: 2025-10-31 01:35:38.073 [INFO][2998] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.110.4/26] block=192.168.110.0/26 handle="k8s-pod-network.37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9" host="10.67.124.139" Oct 31 01:35:38.085903 env[1254]: 2025-10-31 01:35:38.073 [INFO][2998] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.4/26] handle="k8s-pod-network.37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9" host="10.67.124.139" Oct 31 01:35:38.085903 env[1254]: 2025-10-31 01:35:38.073 [INFO][2998] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:38.085903 env[1254]: 2025-10-31 01:35:38.073 [INFO][2998] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.110.4/26] IPv6=[] ContainerID="37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9" HandleID="k8s-pod-network.37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9" Workload="10.67.124.139-k8s-test--pod--1-eth0" Oct 31 01:35:38.086735 env[1254]: 2025-10-31 01:35:38.074 [INFO][2985] cni-plugin/k8s.go 418: Populated endpoint ContainerID="37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"cd151b03-00b1-4262-be13-5143cc17ce2f", ResourceVersion:"1576", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 35, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:38.086735 env[1254]: 2025-10-31 01:35:38.074 [INFO][2985] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.4/32] ContainerID="37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" Oct 31 01:35:38.086735 env[1254]: 2025-10-31 01:35:38.075 [INFO][2985] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" Oct 31 01:35:38.086735 env[1254]: 2025-10-31 01:35:38.080 [INFO][2985] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" Oct 31 01:35:38.086735 env[1254]: 2025-10-31 01:35:38.080 [INFO][2985] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"cd151b03-00b1-4262-be13-5143cc17ce2f", ResourceVersion:"1576", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 35, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"06:38:d0:ab:f8:27", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:38.086735 env[1254]: 2025-10-31 01:35:38.084 [INFO][2985] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" Oct 31 01:35:38.094000 audit[3014]: NETFILTER_CFG table=filter:78 family=2 entries=36 op=nft_register_chain pid=3014 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:35:38.096787 kernel: kauditd_printk_skb: 339 callbacks suppressed Oct 31 01:35:38.096826 kernel: audit: type=1325 audit(1761874538.094:759): table=filter:78 family=2 entries=36 op=nft_register_chain pid=3014 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:35:38.094000 audit[3014]: SYSCALL arch=c000003e syscall=46 success=yes exit=19132 a0=3 a1=7ffea7f4f960 a2=0 a3=7ffea7f4f94c items=0 ppid=2336 pid=3014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:38.102834 kernel: audit: type=1300 audit(1761874538.094:759): arch=c000003e syscall=46 success=yes exit=19132 a0=3 a1=7ffea7f4f960 a2=0 a3=7ffea7f4f94c items=0 ppid=2336 pid=3014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:38.094000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:35:38.107447 kernel: audit: type=1327 audit(1761874538.094:759): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:35:38.109692 env[1254]: time="2025-10-31T01:35:38.109647431Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:35:38.109805 env[1254]: time="2025-10-31T01:35:38.109679572Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:35:38.109805 env[1254]: time="2025-10-31T01:35:38.109710875Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:35:38.109951 env[1254]: time="2025-10-31T01:35:38.109915200Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9 pid=3020 runtime=io.containerd.runc.v2 Oct 31 01:35:38.119150 systemd[1]: Started cri-containerd-37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9.scope. Oct 31 01:35:38.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.134982 kernel: audit: type=1400 audit(1761874538.128:760): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.135023 kernel: audit: type=1400 audit(1761874538.128:761): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.137702 kernel: audit: type=1400 audit(1761874538.128:762): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.137754 kernel: audit: type=1400 audit(1761874538.128:763): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.142889 kernel: audit: type=1400 audit(1761874538.128:764): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.142960 kernel: audit: type=1400 audit(1761874538.128:765): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.148039 kernel: audit: type=1400 audit(1761874538.128:766): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.128000 audit: BPF prog-id=120 op=LOAD Oct 31 01:35:38.134000 audit[3031]: AVC avc: denied { bpf } for pid=3031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.134000 audit[3031]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3020 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:38.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343733633163623966663437323866343961343435663437636633 Oct 31 01:35:38.134000 audit[3031]: AVC avc: denied { perfmon } for pid=3031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.134000 audit[3031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=3020 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:38.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343733633163623966663437323866343961343435663437636633 Oct 31 01:35:38.134000 audit[3031]: AVC avc: denied { bpf } for pid=3031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.134000 audit[3031]: AVC avc: denied { bpf } for pid=3031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.134000 audit[3031]: AVC avc: denied { bpf } for pid=3031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.134000 audit[3031]: AVC avc: denied { perfmon } for pid=3031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.134000 audit[3031]: AVC avc: denied { perfmon } for pid=3031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.134000 audit[3031]: AVC avc: denied { perfmon } for pid=3031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.134000 audit[3031]: AVC avc: denied { perfmon } for pid=3031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.134000 audit[3031]: AVC avc: denied { perfmon } for pid=3031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.134000 audit[3031]: AVC avc: denied { bpf } for pid=3031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.134000 audit[3031]: AVC avc: denied { bpf } for pid=3031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.134000 audit: BPF prog-id=121 op=LOAD Oct 31 01:35:38.134000 audit[3031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000253a00 items=0 ppid=3020 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:38.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343733633163623966663437323866343961343435663437636633 Oct 31 01:35:38.139000 audit[3031]: AVC avc: denied { bpf } for pid=3031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.139000 audit[3031]: AVC avc: denied { bpf } for pid=3031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.139000 audit[3031]: AVC avc: denied { perfmon } for pid=3031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.139000 audit[3031]: AVC avc: denied { perfmon } for pid=3031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.139000 audit[3031]: AVC avc: denied { perfmon } for pid=3031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.139000 audit[3031]: AVC avc: denied { perfmon } for pid=3031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.139000 audit[3031]: AVC avc: denied { perfmon } for pid=3031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.139000 audit[3031]: AVC avc: denied { bpf } for pid=3031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.139000 audit[3031]: AVC avc: denied { bpf } for pid=3031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.139000 audit: BPF prog-id=122 op=LOAD Oct 31 01:35:38.139000 audit[3031]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000253a48 items=0 ppid=3020 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:38.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343733633163623966663437323866343961343435663437636633 Oct 31 01:35:38.144000 audit: BPF prog-id=122 op=UNLOAD Oct 31 01:35:38.144000 audit: BPF prog-id=121 op=UNLOAD Oct 31 01:35:38.144000 audit[3031]: AVC avc: denied { bpf } for pid=3031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.144000 audit[3031]: AVC avc: denied { bpf } for pid=3031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.144000 audit[3031]: AVC avc: denied { bpf } for pid=3031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.144000 audit[3031]: AVC avc: denied { perfmon } for pid=3031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.144000 audit[3031]: AVC avc: denied { perfmon } for pid=3031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.144000 audit[3031]: AVC avc: denied { perfmon } for pid=3031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.144000 audit[3031]: AVC avc: denied { perfmon } for pid=3031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.144000 audit[3031]: AVC avc: denied { perfmon } for pid=3031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.144000 audit[3031]: AVC avc: denied { bpf } for pid=3031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.144000 audit[3031]: AVC avc: denied { bpf } for pid=3031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.144000 audit: BPF prog-id=123 op=LOAD Oct 31 01:35:38.144000 audit[3031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000253e58 items=0 ppid=3020 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:38.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343733633163623966663437323866343961343435663437636633 Oct 31 01:35:38.149798 systemd-resolved[1205]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:35:38.171051 env[1254]: time="2025-10-31T01:35:38.171019406Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:cd151b03-00b1-4262-be13-5143cc17ce2f,Namespace:default,Attempt:0,} returns sandbox id \"37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9\"" Oct 31 01:35:38.383127 env[1254]: time="2025-10-31T01:35:38.381895102Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:38.383127 env[1254]: time="2025-10-31T01:35:38.382276698Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 01:35:38.383288 kubelet[1606]: E1031 01:35:38.382598 1606 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:35:38.383288 kubelet[1606]: E1031 01:35:38.382648 1606 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:35:38.383288 kubelet[1606]: E1031 01:35:38.382789 1606 kuberuntime_manager.go:1449] "Unhandled Error" err="container csi-node-driver-registrar start failed in pod csi-node-driver-mnsnz_calico-system(e8632157-b6ab-4b24-9a54-bc9204b241e8): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:38.383437 kubelet[1606]: E1031 01:35:38.382825 1606 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-mnsnz" podUID="e8632157-b6ab-4b24-9a54-bc9204b241e8" Oct 31 01:35:38.383715 env[1254]: time="2025-10-31T01:35:38.383697522Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 31 01:35:38.384000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2488 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:35:38.384000 audit[1364]: AVC avc: denied { watch_reads } for pid=1364 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2488 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:35:38.384000 audit[1364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=556c27b2e620 a2=10 a3=930d86584f99db92 items=0 ppid=1 pid=1364 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:38.384000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2488 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:35:38.384000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2488 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:35:38.384000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 31 01:35:38.384000 audit[1364]: AVC avc: denied { watch_reads } for pid=1364 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2488 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:35:38.384000 audit[1364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=556c27b2e620 a2=10 a3=930d86584f99db92 items=0 ppid=1 pid=1364 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:38.384000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 31 01:35:38.384000 audit[1364]: AVC avc: denied { watch_reads } for pid=1364 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2488 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:35:38.384000 audit[1364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=556c27b2e620 a2=10 a3=930d86584f99db92 items=0 ppid=1 pid=1364 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:38.384000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 31 01:35:38.406257 kubelet[1606]: E1031 01:35:38.406216 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:38.767990 env[1254]: time="2025-10-31T01:35:38.767946473Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:38.768807 env[1254]: time="2025-10-31T01:35:38.768786783Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:38.769838 env[1254]: time="2025-10-31T01:35:38.769821788Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:38.770927 env[1254]: time="2025-10-31T01:35:38.770911465Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:35:38.771347 env[1254]: time="2025-10-31T01:35:38.771329427Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9\"" Oct 31 01:35:38.774065 env[1254]: time="2025-10-31T01:35:38.774036016Z" level=info msg="CreateContainer within sandbox \"37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9\" for container &ContainerMetadata{Name:test,Attempt:0,}" Oct 31 01:35:38.780010 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3139547787.mount: Deactivated successfully. Oct 31 01:35:38.783714 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2986777884.mount: Deactivated successfully. Oct 31 01:35:38.784825 env[1254]: time="2025-10-31T01:35:38.784593606Z" level=info msg="CreateContainer within sandbox \"37473c1cb9ff4728f49a445f47cf376c2b6700d86bf0c3826c8f1ce8464fb4c9\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"3c82abeeeffcfcd7dd4c89f20b2d982b9f429855843cd598fb5e286dfc1a8e5d\"" Oct 31 01:35:38.786554 env[1254]: time="2025-10-31T01:35:38.785625511Z" level=info msg="StartContainer for \"3c82abeeeffcfcd7dd4c89f20b2d982b9f429855843cd598fb5e286dfc1a8e5d\"" Oct 31 01:35:38.795766 systemd[1]: Started cri-containerd-3c82abeeeffcfcd7dd4c89f20b2d982b9f429855843cd598fb5e286dfc1a8e5d.scope. Oct 31 01:35:38.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit: BPF prog-id=124 op=LOAD Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3020 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:38.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383261626565656666636663643764643463383966323062326439 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=3020 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:38.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383261626565656666636663643764643463383966323062326439 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit: BPF prog-id=125 op=LOAD Oct 31 01:35:38.805000 audit[3063]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000218db0 items=0 ppid=3020 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:38.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383261626565656666636663643764643463383966323062326439 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit: BPF prog-id=126 op=LOAD Oct 31 01:35:38.805000 audit[3063]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000218df8 items=0 ppid=3020 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:38.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383261626565656666636663643764643463383966323062326439 Oct 31 01:35:38.805000 audit: BPF prog-id=126 op=UNLOAD Oct 31 01:35:38.805000 audit: BPF prog-id=125 op=UNLOAD Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:38.805000 audit: BPF prog-id=127 op=LOAD Oct 31 01:35:38.805000 audit[3063]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000219208 items=0 ppid=3020 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:38.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383261626565656666636663643764643463383966323062326439 Oct 31 01:35:38.817001 env[1254]: time="2025-10-31T01:35:38.816970859Z" level=info msg="StartContainer for \"3c82abeeeffcfcd7dd4c89f20b2d982b9f429855843cd598fb5e286dfc1a8e5d\" returns successfully" Oct 31 01:35:39.406948 kubelet[1606]: E1031 01:35:39.406907 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:39.763643 systemd-networkd[1064]: cali5ec59c6bf6e: Gained IPv6LL Oct 31 01:35:39.821292 kubelet[1606]: I1031 01:35:39.821249 1606 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=10.220688682 podStartE2EDuration="10.821237165s" podCreationTimestamp="2025-10-31 01:35:29 +0000 UTC" firstStartedPulling="2025-10-31 01:35:38.171612692 +0000 UTC m=+54.647059097" lastFinishedPulling="2025-10-31 01:35:38.772161171 +0000 UTC m=+55.247607580" observedRunningTime="2025-10-31 01:35:39.820826296 +0000 UTC m=+56.296272712" watchObservedRunningTime="2025-10-31 01:35:39.821237165 +0000 UTC m=+56.296683576" Oct 31 01:35:40.407637 kubelet[1606]: E1031 01:35:40.407608 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:41.408730 kubelet[1606]: E1031 01:35:41.408697 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:42.409921 kubelet[1606]: E1031 01:35:42.409729 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:43.410577 kubelet[1606]: E1031 01:35:43.410548 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:44.371237 kubelet[1606]: E1031 01:35:44.371186 1606 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:44.411414 kubelet[1606]: E1031 01:35:44.411394 1606 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:35:44.446805 env[1254]: time="2025-10-31T01:35:44.446777675Z" level=info msg="StopPodSandbox for \"ecc2b903f79941c52573f38ebde6fd50d00e910fffdc14d71b2a07b3c4b95b59\""