Oct 31 00:55:56.705718 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Oct 31 00:55:56.705739 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Thu Oct 30 23:38:01 -00 2025 Oct 31 00:55:56.705747 kernel: efi: EFI v2.70 by EDK II Oct 31 00:55:56.705753 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Oct 31 00:55:56.705758 kernel: random: crng init done Oct 31 00:55:56.705764 kernel: ACPI: Early table checksum verification disabled Oct 31 00:55:56.705771 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Oct 31 00:55:56.705778 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Oct 31 00:55:56.705784 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 00:55:56.705790 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 00:55:56.705795 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 00:55:56.705801 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 00:55:56.705807 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 00:55:56.705812 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 00:55:56.705821 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 00:55:56.705827 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 00:55:56.705833 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 00:55:56.705839 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Oct 31 00:55:56.705845 kernel: NUMA: Failed to initialise from firmware Oct 31 00:55:56.705851 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Oct 31 00:55:56.705857 kernel: NUMA: NODE_DATA [mem 0xdcb0a900-0xdcb0ffff] Oct 31 00:55:56.705863 kernel: Zone ranges: Oct 31 00:55:56.705869 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Oct 31 00:55:56.705876 kernel: DMA32 empty Oct 31 00:55:56.705882 kernel: Normal empty Oct 31 00:55:56.705888 kernel: Movable zone start for each node Oct 31 00:55:56.705894 kernel: Early memory node ranges Oct 31 00:55:56.705900 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Oct 31 00:55:56.705906 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Oct 31 00:55:56.705912 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Oct 31 00:55:56.705918 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Oct 31 00:55:56.705924 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Oct 31 00:55:56.705929 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Oct 31 00:55:56.705935 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Oct 31 00:55:56.705942 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Oct 31 00:55:56.705948 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Oct 31 00:55:56.705954 kernel: psci: probing for conduit method from ACPI. Oct 31 00:55:56.705960 kernel: psci: PSCIv1.1 detected in firmware. Oct 31 00:55:56.705966 kernel: psci: Using standard PSCI v0.2 function IDs Oct 31 00:55:56.705972 kernel: psci: Trusted OS migration not required Oct 31 00:55:56.705981 kernel: psci: SMC Calling Convention v1.1 Oct 31 00:55:56.705987 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Oct 31 00:55:56.705995 kernel: ACPI: SRAT not present Oct 31 00:55:56.706002 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Oct 31 00:55:56.706009 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Oct 31 00:55:56.706015 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Oct 31 00:55:56.706022 kernel: Detected PIPT I-cache on CPU0 Oct 31 00:55:56.706028 kernel: CPU features: detected: GIC system register CPU interface Oct 31 00:55:56.706034 kernel: CPU features: detected: Hardware dirty bit management Oct 31 00:55:56.706041 kernel: CPU features: detected: Spectre-v4 Oct 31 00:55:56.706047 kernel: CPU features: detected: Spectre-BHB Oct 31 00:55:56.706055 kernel: CPU features: kernel page table isolation forced ON by KASLR Oct 31 00:55:56.706061 kernel: CPU features: detected: Kernel page table isolation (KPTI) Oct 31 00:55:56.706068 kernel: CPU features: detected: ARM erratum 1418040 Oct 31 00:55:56.706074 kernel: CPU features: detected: SSBS not fully self-synchronizing Oct 31 00:55:56.706080 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Oct 31 00:55:56.706094 kernel: Policy zone: DMA Oct 31 00:55:56.706102 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=c54831d8f121b00ec4768e5b1793fd4b2eb83931891a70a1aede21bf2f1a9635 Oct 31 00:55:56.706109 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 31 00:55:56.706116 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 31 00:55:56.706122 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 31 00:55:56.706130 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 31 00:55:56.706140 kernel: Memory: 2457336K/2572288K available (9792K kernel code, 2094K rwdata, 7592K rodata, 36416K init, 777K bss, 114952K reserved, 0K cma-reserved) Oct 31 00:55:56.706147 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Oct 31 00:55:56.706154 kernel: trace event string verifier disabled Oct 31 00:55:56.706163 kernel: rcu: Preemptible hierarchical RCU implementation. Oct 31 00:55:56.706170 kernel: rcu: RCU event tracing is enabled. Oct 31 00:55:56.706177 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Oct 31 00:55:56.706183 kernel: Trampoline variant of Tasks RCU enabled. Oct 31 00:55:56.706190 kernel: Tracing variant of Tasks RCU enabled. Oct 31 00:55:56.706197 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 31 00:55:56.706203 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Oct 31 00:55:56.709475 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Oct 31 00:55:56.709494 kernel: GICv3: 256 SPIs implemented Oct 31 00:55:56.709501 kernel: GICv3: 0 Extended SPIs implemented Oct 31 00:55:56.709507 kernel: GICv3: Distributor has no Range Selector support Oct 31 00:55:56.709513 kernel: Root IRQ handler: gic_handle_irq Oct 31 00:55:56.709520 kernel: GICv3: 16 PPIs implemented Oct 31 00:55:56.709526 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Oct 31 00:55:56.709533 kernel: ACPI: SRAT not present Oct 31 00:55:56.709539 kernel: ITS [mem 0x08080000-0x0809ffff] Oct 31 00:55:56.709546 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Oct 31 00:55:56.709553 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Oct 31 00:55:56.709559 kernel: GICv3: using LPI property table @0x00000000400d0000 Oct 31 00:55:56.709566 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Oct 31 00:55:56.709601 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 31 00:55:56.709608 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Oct 31 00:55:56.709614 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Oct 31 00:55:56.709621 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Oct 31 00:55:56.709628 kernel: arm-pv: using stolen time PV Oct 31 00:55:56.709634 kernel: Console: colour dummy device 80x25 Oct 31 00:55:56.709641 kernel: ACPI: Core revision 20210730 Oct 31 00:55:56.709648 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Oct 31 00:55:56.709656 kernel: pid_max: default: 32768 minimum: 301 Oct 31 00:55:56.709663 kernel: LSM: Security Framework initializing Oct 31 00:55:56.709672 kernel: SELinux: Initializing. Oct 31 00:55:56.709678 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 31 00:55:56.709685 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 31 00:55:56.709692 kernel: rcu: Hierarchical SRCU implementation. Oct 31 00:55:56.709699 kernel: Platform MSI: ITS@0x8080000 domain created Oct 31 00:55:56.709706 kernel: PCI/MSI: ITS@0x8080000 domain created Oct 31 00:55:56.709713 kernel: Remapping and enabling EFI services. Oct 31 00:55:56.709719 kernel: smp: Bringing up secondary CPUs ... Oct 31 00:55:56.709726 kernel: Detected PIPT I-cache on CPU1 Oct 31 00:55:56.709734 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Oct 31 00:55:56.709741 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Oct 31 00:55:56.709748 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 31 00:55:56.709755 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Oct 31 00:55:56.709762 kernel: Detected PIPT I-cache on CPU2 Oct 31 00:55:56.709769 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Oct 31 00:55:56.709775 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Oct 31 00:55:56.709782 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 31 00:55:56.709789 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Oct 31 00:55:56.709796 kernel: Detected PIPT I-cache on CPU3 Oct 31 00:55:56.709804 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Oct 31 00:55:56.709811 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Oct 31 00:55:56.709818 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 31 00:55:56.709825 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Oct 31 00:55:56.709836 kernel: smp: Brought up 1 node, 4 CPUs Oct 31 00:55:56.709845 kernel: SMP: Total of 4 processors activated. Oct 31 00:55:56.709852 kernel: CPU features: detected: 32-bit EL0 Support Oct 31 00:55:56.709859 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Oct 31 00:55:56.709866 kernel: CPU features: detected: Common not Private translations Oct 31 00:55:56.709874 kernel: CPU features: detected: CRC32 instructions Oct 31 00:55:56.709881 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Oct 31 00:55:56.709889 kernel: CPU features: detected: LSE atomic instructions Oct 31 00:55:56.709898 kernel: CPU features: detected: Privileged Access Never Oct 31 00:55:56.709905 kernel: CPU features: detected: RAS Extension Support Oct 31 00:55:56.709912 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Oct 31 00:55:56.709919 kernel: CPU: All CPU(s) started at EL1 Oct 31 00:55:56.709926 kernel: alternatives: patching kernel code Oct 31 00:55:56.709935 kernel: devtmpfs: initialized Oct 31 00:55:56.709942 kernel: KASLR enabled Oct 31 00:55:56.709949 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 31 00:55:56.709956 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Oct 31 00:55:56.709964 kernel: pinctrl core: initialized pinctrl subsystem Oct 31 00:55:56.709971 kernel: SMBIOS 3.0.0 present. Oct 31 00:55:56.709978 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Oct 31 00:55:56.709985 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 31 00:55:56.709992 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Oct 31 00:55:56.710001 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Oct 31 00:55:56.710008 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Oct 31 00:55:56.710015 kernel: audit: initializing netlink subsys (disabled) Oct 31 00:55:56.710022 kernel: audit: type=2000 audit(0.035:1): state=initialized audit_enabled=0 res=1 Oct 31 00:55:56.710030 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 31 00:55:56.710037 kernel: cpuidle: using governor menu Oct 31 00:55:56.710044 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Oct 31 00:55:56.710051 kernel: ASID allocator initialised with 32768 entries Oct 31 00:55:56.710058 kernel: ACPI: bus type PCI registered Oct 31 00:55:56.710067 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 31 00:55:56.710074 kernel: Serial: AMBA PL011 UART driver Oct 31 00:55:56.710081 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 31 00:55:56.710099 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Oct 31 00:55:56.710107 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 31 00:55:56.710114 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Oct 31 00:55:56.710122 kernel: cryptd: max_cpu_qlen set to 1000 Oct 31 00:55:56.710129 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Oct 31 00:55:56.710136 kernel: ACPI: Added _OSI(Module Device) Oct 31 00:55:56.710146 kernel: ACPI: Added _OSI(Processor Device) Oct 31 00:55:56.710153 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 31 00:55:56.710160 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 31 00:55:56.710167 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 31 00:55:56.710174 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 31 00:55:56.710181 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 31 00:55:56.710188 kernel: ACPI: Interpreter enabled Oct 31 00:55:56.710195 kernel: ACPI: Using GIC for interrupt routing Oct 31 00:55:56.710203 kernel: ACPI: MCFG table detected, 1 entries Oct 31 00:55:56.710212 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Oct 31 00:55:56.710219 kernel: printk: console [ttyAMA0] enabled Oct 31 00:55:56.710226 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 31 00:55:56.710366 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 31 00:55:56.710434 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Oct 31 00:55:56.710496 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Oct 31 00:55:56.710557 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Oct 31 00:55:56.710634 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Oct 31 00:55:56.710659 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Oct 31 00:55:56.710667 kernel: PCI host bridge to bus 0000:00 Oct 31 00:55:56.710744 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Oct 31 00:55:56.710813 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Oct 31 00:55:56.710871 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Oct 31 00:55:56.710928 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 31 00:55:56.711012 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Oct 31 00:55:56.711103 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Oct 31 00:55:56.711171 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Oct 31 00:55:56.711234 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Oct 31 00:55:56.711297 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Oct 31 00:55:56.711358 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Oct 31 00:55:56.711421 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Oct 31 00:55:56.711486 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Oct 31 00:55:56.711541 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Oct 31 00:55:56.711610 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Oct 31 00:55:56.711667 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Oct 31 00:55:56.711676 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Oct 31 00:55:56.711683 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Oct 31 00:55:56.711690 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Oct 31 00:55:56.711699 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Oct 31 00:55:56.711706 kernel: iommu: Default domain type: Translated Oct 31 00:55:56.711713 kernel: iommu: DMA domain TLB invalidation policy: strict mode Oct 31 00:55:56.711720 kernel: vgaarb: loaded Oct 31 00:55:56.711727 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 31 00:55:56.711734 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 31 00:55:56.711742 kernel: PTP clock support registered Oct 31 00:55:56.711749 kernel: Registered efivars operations Oct 31 00:55:56.711756 kernel: clocksource: Switched to clocksource arch_sys_counter Oct 31 00:55:56.711763 kernel: VFS: Disk quotas dquot_6.6.0 Oct 31 00:55:56.711771 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 31 00:55:56.711778 kernel: pnp: PnP ACPI init Oct 31 00:55:56.711846 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Oct 31 00:55:56.711857 kernel: pnp: PnP ACPI: found 1 devices Oct 31 00:55:56.711865 kernel: NET: Registered PF_INET protocol family Oct 31 00:55:56.711872 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 31 00:55:56.711880 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Oct 31 00:55:56.711887 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 31 00:55:56.711896 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 31 00:55:56.711903 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Oct 31 00:55:56.711910 kernel: TCP: Hash tables configured (established 32768 bind 32768) Oct 31 00:55:56.711917 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 31 00:55:56.711925 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 31 00:55:56.711932 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 31 00:55:56.711939 kernel: PCI: CLS 0 bytes, default 64 Oct 31 00:55:56.711946 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Oct 31 00:55:56.711953 kernel: kvm [1]: HYP mode not available Oct 31 00:55:56.711962 kernel: Initialise system trusted keyrings Oct 31 00:55:56.711969 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Oct 31 00:55:56.711976 kernel: Key type asymmetric registered Oct 31 00:55:56.711983 kernel: Asymmetric key parser 'x509' registered Oct 31 00:55:56.711990 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 31 00:55:56.711997 kernel: io scheduler mq-deadline registered Oct 31 00:55:56.712005 kernel: io scheduler kyber registered Oct 31 00:55:56.712012 kernel: io scheduler bfq registered Oct 31 00:55:56.712019 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Oct 31 00:55:56.712032 kernel: ACPI: button: Power Button [PWRB] Oct 31 00:55:56.712039 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Oct 31 00:55:56.712110 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Oct 31 00:55:56.712121 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 31 00:55:56.712129 kernel: thunder_xcv, ver 1.0 Oct 31 00:55:56.712136 kernel: thunder_bgx, ver 1.0 Oct 31 00:55:56.712143 kernel: nicpf, ver 1.0 Oct 31 00:55:56.712150 kernel: nicvf, ver 1.0 Oct 31 00:55:56.712299 kernel: rtc-efi rtc-efi.0: registered as rtc0 Oct 31 00:55:56.712390 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-10-31T00:55:56 UTC (1761872156) Oct 31 00:55:56.712401 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 31 00:55:56.712409 kernel: NET: Registered PF_INET6 protocol family Oct 31 00:55:56.712416 kernel: Segment Routing with IPv6 Oct 31 00:55:56.712423 kernel: In-situ OAM (IOAM) with IPv6 Oct 31 00:55:56.712431 kernel: NET: Registered PF_PACKET protocol family Oct 31 00:55:56.712438 kernel: Key type dns_resolver registered Oct 31 00:55:56.712446 kernel: registered taskstats version 1 Oct 31 00:55:56.712455 kernel: Loading compiled-in X.509 certificates Oct 31 00:55:56.712462 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: e62237f95ba4ddc0e942e4538fe1019cd3c2f62a' Oct 31 00:55:56.712469 kernel: Key type .fscrypt registered Oct 31 00:55:56.712476 kernel: Key type fscrypt-provisioning registered Oct 31 00:55:56.712483 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 31 00:55:56.712491 kernel: ima: Allocated hash algorithm: sha1 Oct 31 00:55:56.712498 kernel: ima: No architecture policies found Oct 31 00:55:56.712505 kernel: clk: Disabling unused clocks Oct 31 00:55:56.712512 kernel: Freeing unused kernel memory: 36416K Oct 31 00:55:56.712520 kernel: Run /init as init process Oct 31 00:55:56.712527 kernel: with arguments: Oct 31 00:55:56.712534 kernel: /init Oct 31 00:55:56.712540 kernel: with environment: Oct 31 00:55:56.712547 kernel: HOME=/ Oct 31 00:55:56.712554 kernel: TERM=linux Oct 31 00:55:56.712561 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 31 00:55:56.712570 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 00:55:56.712594 systemd[1]: Detected virtualization kvm. Oct 31 00:55:56.712602 systemd[1]: Detected architecture arm64. Oct 31 00:55:56.712609 systemd[1]: Running in initrd. Oct 31 00:55:56.712616 systemd[1]: No hostname configured, using default hostname. Oct 31 00:55:56.712624 systemd[1]: Hostname set to . Oct 31 00:55:56.712632 systemd[1]: Initializing machine ID from VM UUID. Oct 31 00:55:56.712640 systemd[1]: Queued start job for default target initrd.target. Oct 31 00:55:56.712647 systemd[1]: Started systemd-ask-password-console.path. Oct 31 00:55:56.712656 systemd[1]: Reached target cryptsetup.target. Oct 31 00:55:56.712664 systemd[1]: Reached target paths.target. Oct 31 00:55:56.712671 systemd[1]: Reached target slices.target. Oct 31 00:55:56.712678 systemd[1]: Reached target swap.target. Oct 31 00:55:56.712686 systemd[1]: Reached target timers.target. Oct 31 00:55:56.712694 systemd[1]: Listening on iscsid.socket. Oct 31 00:55:56.712701 systemd[1]: Listening on iscsiuio.socket. Oct 31 00:55:56.712710 systemd[1]: Listening on systemd-journald-audit.socket. Oct 31 00:55:56.712718 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 31 00:55:56.712726 systemd[1]: Listening on systemd-journald.socket. Oct 31 00:55:56.712733 systemd[1]: Listening on systemd-networkd.socket. Oct 31 00:55:56.712741 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 00:55:56.712748 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 00:55:56.712756 systemd[1]: Reached target sockets.target. Oct 31 00:55:56.712763 systemd[1]: Starting kmod-static-nodes.service... Oct 31 00:55:56.712771 systemd[1]: Finished network-cleanup.service. Oct 31 00:55:56.712779 systemd[1]: Starting systemd-fsck-usr.service... Oct 31 00:55:56.712787 systemd[1]: Starting systemd-journald.service... Oct 31 00:55:56.712795 systemd[1]: Starting systemd-modules-load.service... Oct 31 00:55:56.712802 systemd[1]: Starting systemd-resolved.service... Oct 31 00:55:56.712810 systemd[1]: Starting systemd-vconsole-setup.service... Oct 31 00:55:56.712817 systemd[1]: Finished kmod-static-nodes.service. Oct 31 00:55:56.712825 systemd[1]: Finished systemd-fsck-usr.service. Oct 31 00:55:56.712833 kernel: audit: type=1130 audit(1761872156.706:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:56.712840 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 31 00:55:56.712853 systemd-journald[289]: Journal started Oct 31 00:55:56.712898 systemd-journald[289]: Runtime Journal (/run/log/journal/de581c69713843669810b2592700864e) is 6.0M, max 48.7M, 42.6M free. Oct 31 00:55:56.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:56.706480 systemd-modules-load[290]: Inserted module 'overlay' Oct 31 00:55:56.718465 systemd[1]: Started systemd-journald.service. Oct 31 00:55:56.718518 kernel: audit: type=1130 audit(1761872156.715:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:56.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:56.716541 systemd[1]: Finished systemd-vconsole-setup.service. Oct 31 00:55:56.722914 kernel: audit: type=1130 audit(1761872156.719:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:56.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:56.720184 systemd[1]: Starting dracut-cmdline-ask.service... Oct 31 00:55:56.724606 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 31 00:55:56.730766 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 31 00:55:56.730787 kernel: audit: type=1130 audit(1761872156.727:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:56.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:56.731600 kernel: Bridge firewalling registered Oct 31 00:55:56.731607 systemd-modules-load[290]: Inserted module 'br_netfilter' Oct 31 00:55:56.740148 systemd[1]: Finished dracut-cmdline-ask.service. Oct 31 00:55:56.744629 kernel: audit: type=1130 audit(1761872156.740:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:56.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:56.740809 systemd-resolved[291]: Positive Trust Anchors: Oct 31 00:55:56.746735 kernel: SCSI subsystem initialized Oct 31 00:55:56.740817 systemd-resolved[291]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 00:55:56.740844 systemd-resolved[291]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 00:55:56.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:56.741913 systemd[1]: Starting dracut-cmdline.service... Oct 31 00:55:56.761800 kernel: audit: type=1130 audit(1761872156.748:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:56.761820 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 31 00:55:56.761830 kernel: device-mapper: uevent: version 1.0.3 Oct 31 00:55:56.761840 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 31 00:55:56.746510 systemd-resolved[291]: Defaulting to hostname 'linux'. Oct 31 00:55:56.747724 systemd[1]: Started systemd-resolved.service. Oct 31 00:55:56.763510 dracut-cmdline[307]: dracut-dracut-053 Oct 31 00:55:56.749177 systemd[1]: Reached target nss-lookup.target. Oct 31 00:55:56.765230 dracut-cmdline[307]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=c54831d8f121b00ec4768e5b1793fd4b2eb83931891a70a1aede21bf2f1a9635 Oct 31 00:55:56.764654 systemd-modules-load[290]: Inserted module 'dm_multipath' Oct 31 00:55:56.765436 systemd[1]: Finished systemd-modules-load.service. Oct 31 00:55:56.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:56.775158 systemd[1]: Starting systemd-sysctl.service... Oct 31 00:55:56.776741 kernel: audit: type=1130 audit(1761872156.770:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:56.782585 systemd[1]: Finished systemd-sysctl.service. Oct 31 00:55:56.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:56.787611 kernel: audit: type=1130 audit(1761872156.782:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:56.829603 kernel: Loading iSCSI transport class v2.0-870. Oct 31 00:55:56.842601 kernel: iscsi: registered transport (tcp) Oct 31 00:55:56.857603 kernel: iscsi: registered transport (qla4xxx) Oct 31 00:55:56.857620 kernel: QLogic iSCSI HBA Driver Oct 31 00:55:56.892688 systemd[1]: Finished dracut-cmdline.service. Oct 31 00:55:56.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:56.894381 systemd[1]: Starting dracut-pre-udev.service... Oct 31 00:55:56.898344 kernel: audit: type=1130 audit(1761872156.892:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:56.937610 kernel: raid6: neonx8 gen() 13734 MB/s Oct 31 00:55:56.954597 kernel: raid6: neonx8 xor() 10762 MB/s Oct 31 00:55:56.971602 kernel: raid6: neonx4 gen() 13539 MB/s Oct 31 00:55:56.988609 kernel: raid6: neonx4 xor() 11112 MB/s Oct 31 00:55:57.005600 kernel: raid6: neonx2 gen() 13086 MB/s Oct 31 00:55:57.022594 kernel: raid6: neonx2 xor() 10237 MB/s Oct 31 00:55:57.039600 kernel: raid6: neonx1 gen() 10546 MB/s Oct 31 00:55:57.056597 kernel: raid6: neonx1 xor() 8779 MB/s Oct 31 00:55:57.073604 kernel: raid6: int64x8 gen() 6256 MB/s Oct 31 00:55:57.090615 kernel: raid6: int64x8 xor() 3536 MB/s Oct 31 00:55:57.107606 kernel: raid6: int64x4 gen() 7217 MB/s Oct 31 00:55:57.124607 kernel: raid6: int64x4 xor() 3849 MB/s Oct 31 00:55:57.141600 kernel: raid6: int64x2 gen() 6149 MB/s Oct 31 00:55:57.158591 kernel: raid6: int64x2 xor() 3316 MB/s Oct 31 00:55:57.175595 kernel: raid6: int64x1 gen() 5046 MB/s Oct 31 00:55:57.192838 kernel: raid6: int64x1 xor() 2641 MB/s Oct 31 00:55:57.192856 kernel: raid6: using algorithm neonx8 gen() 13734 MB/s Oct 31 00:55:57.192867 kernel: raid6: .... xor() 10762 MB/s, rmw enabled Oct 31 00:55:57.194065 kernel: raid6: using neon recovery algorithm Oct 31 00:55:57.204843 kernel: xor: measuring software checksum speed Oct 31 00:55:57.204874 kernel: 8regs : 16576 MB/sec Oct 31 00:55:57.205600 kernel: 32regs : 20655 MB/sec Oct 31 00:55:57.206956 kernel: arm64_neon : 23934 MB/sec Oct 31 00:55:57.206970 kernel: xor: using function: arm64_neon (23934 MB/sec) Oct 31 00:55:57.259601 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Oct 31 00:55:57.269388 systemd[1]: Finished dracut-pre-udev.service. Oct 31 00:55:57.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:57.270000 audit: BPF prog-id=7 op=LOAD Oct 31 00:55:57.270000 audit: BPF prog-id=8 op=LOAD Oct 31 00:55:57.271397 systemd[1]: Starting systemd-udevd.service... Oct 31 00:55:57.283590 systemd-udevd[492]: Using default interface naming scheme 'v252'. Oct 31 00:55:57.286909 systemd[1]: Started systemd-udevd.service. Oct 31 00:55:57.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:57.288901 systemd[1]: Starting dracut-pre-trigger.service... Oct 31 00:55:57.300444 dracut-pre-trigger[500]: rd.md=0: removing MD RAID activation Oct 31 00:55:57.327695 systemd[1]: Finished dracut-pre-trigger.service. Oct 31 00:55:57.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:57.329371 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 00:55:57.363881 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 00:55:57.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:57.397199 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Oct 31 00:55:57.401708 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 31 00:55:57.401729 kernel: GPT:9289727 != 19775487 Oct 31 00:55:57.401738 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 31 00:55:57.401747 kernel: GPT:9289727 != 19775487 Oct 31 00:55:57.401755 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 31 00:55:57.401763 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 00:55:57.414596 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (540) Oct 31 00:55:57.415213 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 31 00:55:57.416351 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 31 00:55:57.421146 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 31 00:55:57.430968 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 00:55:57.434358 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 31 00:55:57.436178 systemd[1]: Starting disk-uuid.service... Oct 31 00:55:57.442136 disk-uuid[561]: Primary Header is updated. Oct 31 00:55:57.442136 disk-uuid[561]: Secondary Entries is updated. Oct 31 00:55:57.442136 disk-uuid[561]: Secondary Header is updated. Oct 31 00:55:57.445626 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 00:55:57.448591 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 00:55:57.451584 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 00:55:58.451593 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 00:55:58.451643 disk-uuid[562]: The operation has completed successfully. Oct 31 00:55:58.479161 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 31 00:55:58.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:58.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:58.479254 systemd[1]: Finished disk-uuid.service. Oct 31 00:55:58.481013 systemd[1]: Starting verity-setup.service... Oct 31 00:55:58.493592 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Oct 31 00:55:58.514619 systemd[1]: Found device dev-mapper-usr.device. Oct 31 00:55:58.516837 systemd[1]: Mounting sysusr-usr.mount... Oct 31 00:55:58.519341 systemd[1]: Finished verity-setup.service. Oct 31 00:55:58.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:58.564536 systemd[1]: Mounted sysusr-usr.mount. Oct 31 00:55:58.566013 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 31 00:55:58.565431 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 31 00:55:58.566197 systemd[1]: Starting ignition-setup.service... Oct 31 00:55:58.568881 systemd[1]: Starting parse-ip-for-networkd.service... Oct 31 00:55:58.576322 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Oct 31 00:55:58.576358 kernel: BTRFS info (device vda6): using free space tree Oct 31 00:55:58.576369 kernel: BTRFS info (device vda6): has skinny extents Oct 31 00:55:58.584253 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 31 00:55:58.590421 systemd[1]: Finished ignition-setup.service. Oct 31 00:55:58.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:58.592198 systemd[1]: Starting ignition-fetch-offline.service... Oct 31 00:55:58.638437 ignition[645]: Ignition 2.14.0 Oct 31 00:55:58.638446 ignition[645]: Stage: fetch-offline Oct 31 00:55:58.638485 ignition[645]: no configs at "/usr/lib/ignition/base.d" Oct 31 00:55:58.638495 ignition[645]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 00:55:58.638648 ignition[645]: parsed url from cmdline: "" Oct 31 00:55:58.638651 ignition[645]: no config URL provided Oct 31 00:55:58.638656 ignition[645]: reading system config file "/usr/lib/ignition/user.ign" Oct 31 00:55:58.638663 ignition[645]: no config at "/usr/lib/ignition/user.ign" Oct 31 00:55:58.638681 ignition[645]: op(1): [started] loading QEMU firmware config module Oct 31 00:55:58.638688 ignition[645]: op(1): executing: "modprobe" "qemu_fw_cfg" Oct 31 00:55:58.643183 ignition[645]: op(1): [finished] loading QEMU firmware config module Oct 31 00:55:58.652904 ignition[645]: parsing config with SHA512: abb2f7fee6ba866fca4d8e33978e45954115f430c1c1d108259c01ec0814dac02330e140b857c8f1d81d52f6888eb6b04b2f07342aec1a9c2eb18721beb544f7 Oct 31 00:55:58.659731 systemd[1]: Finished parse-ip-for-networkd.service. Oct 31 00:55:58.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:58.660000 audit: BPF prog-id=9 op=LOAD Oct 31 00:55:58.661971 systemd[1]: Starting systemd-networkd.service... Oct 31 00:55:58.664528 unknown[645]: fetched base config from "system" Oct 31 00:55:58.664902 ignition[645]: fetch-offline: fetch-offline passed Oct 31 00:55:58.664540 unknown[645]: fetched user config from "qemu" Oct 31 00:55:58.664979 ignition[645]: Ignition finished successfully Oct 31 00:55:58.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:58.665767 systemd[1]: Finished ignition-fetch-offline.service. Oct 31 00:55:58.684173 systemd-networkd[741]: lo: Link UP Oct 31 00:55:58.684186 systemd-networkd[741]: lo: Gained carrier Oct 31 00:55:58.684616 systemd-networkd[741]: Enumeration completed Oct 31 00:55:58.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:58.684809 systemd-networkd[741]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 31 00:55:58.684929 systemd[1]: Started systemd-networkd.service. Oct 31 00:55:58.685787 systemd-networkd[741]: eth0: Link UP Oct 31 00:55:58.685790 systemd-networkd[741]: eth0: Gained carrier Oct 31 00:55:58.686237 systemd[1]: Reached target network.target. Oct 31 00:55:58.687639 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Oct 31 00:55:58.688481 systemd[1]: Starting ignition-kargs.service... Oct 31 00:55:58.690066 systemd[1]: Starting iscsiuio.service... Oct 31 00:55:58.697331 systemd[1]: Started iscsiuio.service. Oct 31 00:55:58.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:58.698543 ignition[743]: Ignition 2.14.0 Oct 31 00:55:58.698549 ignition[743]: Stage: kargs Oct 31 00:55:58.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:58.699607 systemd[1]: Starting iscsid.service... Oct 31 00:55:58.698672 ignition[743]: no configs at "/usr/lib/ignition/base.d" Oct 31 00:55:58.700542 systemd[1]: Finished ignition-kargs.service. Oct 31 00:55:58.705239 iscsid[753]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 31 00:55:58.705239 iscsid[753]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Oct 31 00:55:58.705239 iscsid[753]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 31 00:55:58.705239 iscsid[753]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 31 00:55:58.705239 iscsid[753]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 31 00:55:58.705239 iscsid[753]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 31 00:55:58.705239 iscsid[753]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 31 00:55:58.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:58.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:58.698681 ignition[743]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 00:55:58.702412 systemd[1]: Starting ignition-disks.service... Oct 31 00:55:58.699392 ignition[743]: kargs: kargs passed Oct 31 00:55:58.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:58.706506 systemd[1]: Started iscsid.service. Oct 31 00:55:58.699434 ignition[743]: Ignition finished successfully Oct 31 00:55:58.707672 systemd-networkd[741]: eth0: DHCPv4 address 10.0.0.104/16, gateway 10.0.0.1 acquired from 10.0.0.1 Oct 31 00:55:58.709195 ignition[754]: Ignition 2.14.0 Oct 31 00:55:58.710754 systemd[1]: Starting dracut-initqueue.service... Oct 31 00:55:58.709202 ignition[754]: Stage: disks Oct 31 00:55:58.712025 systemd[1]: Finished ignition-disks.service. Oct 31 00:55:58.709288 ignition[754]: no configs at "/usr/lib/ignition/base.d" Oct 31 00:55:58.715117 systemd[1]: Reached target initrd-root-device.target. Oct 31 00:55:58.709297 ignition[754]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 00:55:58.716746 systemd[1]: Reached target local-fs-pre.target. Oct 31 00:55:58.710307 ignition[754]: disks: disks passed Oct 31 00:55:58.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:58.718451 systemd[1]: Reached target local-fs.target. Oct 31 00:55:58.710349 ignition[754]: Ignition finished successfully Oct 31 00:55:58.720435 systemd[1]: Reached target sysinit.target. Oct 31 00:55:58.722317 systemd[1]: Reached target basic.target. Oct 31 00:55:58.724279 systemd[1]: Finished dracut-initqueue.service. Oct 31 00:55:58.725508 systemd[1]: Reached target remote-fs-pre.target. Oct 31 00:55:58.726732 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 00:55:58.728233 systemd[1]: Reached target remote-fs.target. Oct 31 00:55:58.730605 systemd[1]: Starting dracut-pre-mount.service... Oct 31 00:55:58.738303 systemd[1]: Finished dracut-pre-mount.service. Oct 31 00:55:58.739939 systemd[1]: Starting systemd-fsck-root.service... Oct 31 00:55:58.753910 systemd-fsck[775]: ROOT: clean, 637/553520 files, 56031/553472 blocks Oct 31 00:55:58.758663 systemd[1]: Finished systemd-fsck-root.service. Oct 31 00:55:58.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:58.760354 systemd[1]: Mounting sysroot.mount... Oct 31 00:55:58.767452 systemd[1]: Mounted sysroot.mount. Oct 31 00:55:58.768937 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 31 00:55:58.768382 systemd[1]: Reached target initrd-root-fs.target. Oct 31 00:55:58.772204 systemd[1]: Mounting sysroot-usr.mount... Oct 31 00:55:58.773183 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 31 00:55:58.773221 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 31 00:55:58.773246 systemd[1]: Reached target ignition-diskful.target. Oct 31 00:55:58.775285 systemd[1]: Mounted sysroot-usr.mount. Oct 31 00:55:58.777359 systemd[1]: Starting initrd-setup-root.service... Oct 31 00:55:58.781742 initrd-setup-root[785]: cut: /sysroot/etc/passwd: No such file or directory Oct 31 00:55:58.785517 initrd-setup-root[793]: cut: /sysroot/etc/group: No such file or directory Oct 31 00:55:58.789562 initrd-setup-root[801]: cut: /sysroot/etc/shadow: No such file or directory Oct 31 00:55:58.793899 initrd-setup-root[809]: cut: /sysroot/etc/gshadow: No such file or directory Oct 31 00:55:58.819142 systemd[1]: Finished initrd-setup-root.service. Oct 31 00:55:58.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:58.820954 systemd[1]: Starting ignition-mount.service... Oct 31 00:55:58.822344 systemd[1]: Starting sysroot-boot.service... Oct 31 00:55:58.826854 bash[826]: umount: /sysroot/usr/share/oem: not mounted. Oct 31 00:55:58.834549 ignition[828]: INFO : Ignition 2.14.0 Oct 31 00:55:58.834549 ignition[828]: INFO : Stage: mount Oct 31 00:55:58.836215 ignition[828]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 31 00:55:58.836215 ignition[828]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 00:55:58.836215 ignition[828]: INFO : mount: mount passed Oct 31 00:55:58.836215 ignition[828]: INFO : Ignition finished successfully Oct 31 00:55:58.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:58.837215 systemd[1]: Finished ignition-mount.service. Oct 31 00:55:58.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:55:58.841065 systemd[1]: Finished sysroot-boot.service. Oct 31 00:55:59.526454 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 31 00:55:59.532584 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by mount (837) Oct 31 00:55:59.534686 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Oct 31 00:55:59.534701 kernel: BTRFS info (device vda6): using free space tree Oct 31 00:55:59.534711 kernel: BTRFS info (device vda6): has skinny extents Oct 31 00:55:59.538328 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 31 00:55:59.540038 systemd[1]: Starting ignition-files.service... Oct 31 00:55:59.554167 ignition[857]: INFO : Ignition 2.14.0 Oct 31 00:55:59.554167 ignition[857]: INFO : Stage: files Oct 31 00:55:59.556057 ignition[857]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 31 00:55:59.556057 ignition[857]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 00:55:59.556057 ignition[857]: DEBUG : files: compiled without relabeling support, skipping Oct 31 00:55:59.559809 ignition[857]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 31 00:55:59.559809 ignition[857]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 31 00:55:59.563269 ignition[857]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 31 00:55:59.564873 ignition[857]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 31 00:55:59.564873 ignition[857]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 31 00:55:59.564873 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Oct 31 00:55:59.564873 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Oct 31 00:55:59.564873 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 00:55:59.564055 unknown[857]: wrote ssh authorized keys file for user: core Oct 31 00:55:59.574850 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 00:55:59.574850 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.34.1-arm64.raw" Oct 31 00:55:59.574850 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.34.1-arm64.raw" Oct 31 00:55:59.574850 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.34.1-arm64.raw" Oct 31 00:55:59.574850 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.34.1-arm64.raw: attempt #1 Oct 31 00:55:59.728744 systemd-networkd[741]: eth0: Gained IPv6LL Oct 31 00:55:59.988918 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 31 00:56:00.270247 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.34.1-arm64.raw" Oct 31 00:56:00.270247 ignition[857]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Oct 31 00:56:00.274636 ignition[857]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 31 00:56:00.274636 ignition[857]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 31 00:56:00.274636 ignition[857]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Oct 31 00:56:00.274636 ignition[857]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Oct 31 00:56:00.274636 ignition[857]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Oct 31 00:56:00.303593 ignition[857]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Oct 31 00:56:00.306130 ignition[857]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Oct 31 00:56:00.306130 ignition[857]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 31 00:56:00.306130 ignition[857]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 31 00:56:00.306130 ignition[857]: INFO : files: files passed Oct 31 00:56:00.306130 ignition[857]: INFO : Ignition finished successfully Oct 31 00:56:00.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.306308 systemd[1]: Finished ignition-files.service. Oct 31 00:56:00.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.309517 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 31 00:56:00.318440 initrd-setup-root-after-ignition[883]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Oct 31 00:56:00.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.311353 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 31 00:56:00.323876 initrd-setup-root-after-ignition[885]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 31 00:56:00.312110 systemd[1]: Starting ignition-quench.service... Oct 31 00:56:00.315606 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 31 00:56:00.315693 systemd[1]: Finished ignition-quench.service. Oct 31 00:56:00.318454 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 31 00:56:00.319727 systemd[1]: Reached target ignition-complete.target. Oct 31 00:56:00.322729 systemd[1]: Starting initrd-parse-etc.service... Oct 31 00:56:00.337087 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 31 00:56:00.337190 systemd[1]: Finished initrd-parse-etc.service. Oct 31 00:56:00.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.339026 systemd[1]: Reached target initrd-fs.target. Oct 31 00:56:00.340408 systemd[1]: Reached target initrd.target. Oct 31 00:56:00.341897 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 31 00:56:00.342721 systemd[1]: Starting dracut-pre-pivot.service... Oct 31 00:56:00.353415 systemd[1]: Finished dracut-pre-pivot.service. Oct 31 00:56:00.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.355157 systemd[1]: Starting initrd-cleanup.service... Oct 31 00:56:00.363682 systemd[1]: Stopped target nss-lookup.target. Oct 31 00:56:00.364670 systemd[1]: Stopped target remote-cryptsetup.target. Oct 31 00:56:00.366320 systemd[1]: Stopped target timers.target. Oct 31 00:56:00.367818 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 31 00:56:00.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.367928 systemd[1]: Stopped dracut-pre-pivot.service. Oct 31 00:56:00.369590 systemd[1]: Stopped target initrd.target. Oct 31 00:56:00.371211 systemd[1]: Stopped target basic.target. Oct 31 00:56:00.372620 systemd[1]: Stopped target ignition-complete.target. Oct 31 00:56:00.374238 systemd[1]: Stopped target ignition-diskful.target. Oct 31 00:56:00.375630 systemd[1]: Stopped target initrd-root-device.target. Oct 31 00:56:00.377366 systemd[1]: Stopped target remote-fs.target. Oct 31 00:56:00.379044 systemd[1]: Stopped target remote-fs-pre.target. Oct 31 00:56:00.380664 systemd[1]: Stopped target sysinit.target. Oct 31 00:56:00.382226 systemd[1]: Stopped target local-fs.target. Oct 31 00:56:00.383774 systemd[1]: Stopped target local-fs-pre.target. Oct 31 00:56:00.385224 systemd[1]: Stopped target swap.target. Oct 31 00:56:00.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.386648 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 31 00:56:00.386788 systemd[1]: Stopped dracut-pre-mount.service. Oct 31 00:56:00.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.388535 systemd[1]: Stopped target cryptsetup.target. Oct 31 00:56:00.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.389864 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 31 00:56:00.389969 systemd[1]: Stopped dracut-initqueue.service. Oct 31 00:56:00.391676 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 31 00:56:00.391779 systemd[1]: Stopped ignition-fetch-offline.service. Oct 31 00:56:00.393350 systemd[1]: Stopped target paths.target. Oct 31 00:56:00.394724 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 31 00:56:00.398602 systemd[1]: Stopped systemd-ask-password-console.path. Oct 31 00:56:00.400069 systemd[1]: Stopped target slices.target. Oct 31 00:56:00.401771 systemd[1]: Stopped target sockets.target. Oct 31 00:56:00.403318 systemd[1]: iscsid.socket: Deactivated successfully. Oct 31 00:56:00.403391 systemd[1]: Closed iscsid.socket. Oct 31 00:56:00.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.404585 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 31 00:56:00.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.404655 systemd[1]: Closed iscsiuio.socket. Oct 31 00:56:00.405856 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 31 00:56:00.405958 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 31 00:56:00.407524 systemd[1]: ignition-files.service: Deactivated successfully. Oct 31 00:56:00.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.407650 systemd[1]: Stopped ignition-files.service. Oct 31 00:56:00.409603 systemd[1]: Stopping ignition-mount.service... Oct 31 00:56:00.411490 systemd[1]: Stopping sysroot-boot.service... Oct 31 00:56:00.419097 ignition[898]: INFO : Ignition 2.14.0 Oct 31 00:56:00.419097 ignition[898]: INFO : Stage: umount Oct 31 00:56:00.419097 ignition[898]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 31 00:56:00.419097 ignition[898]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 00:56:00.419097 ignition[898]: INFO : umount: umount passed Oct 31 00:56:00.419097 ignition[898]: INFO : Ignition finished successfully Oct 31 00:56:00.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.412409 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 31 00:56:00.412525 systemd[1]: Stopped systemd-udev-trigger.service. Oct 31 00:56:00.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.414338 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 31 00:56:00.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.414426 systemd[1]: Stopped dracut-pre-trigger.service. Oct 31 00:56:00.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.421018 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 31 00:56:00.422133 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 31 00:56:00.422221 systemd[1]: Finished initrd-cleanup.service. Oct 31 00:56:00.424617 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 31 00:56:00.424698 systemd[1]: Stopped ignition-mount.service. Oct 31 00:56:00.426262 systemd[1]: Stopped target network.target. Oct 31 00:56:00.428170 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 31 00:56:00.428229 systemd[1]: Stopped ignition-disks.service. Oct 31 00:56:00.430114 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 31 00:56:00.430158 systemd[1]: Stopped ignition-kargs.service. Oct 31 00:56:00.431897 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 31 00:56:00.431960 systemd[1]: Stopped ignition-setup.service. Oct 31 00:56:00.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.433705 systemd[1]: Stopping systemd-networkd.service... Oct 31 00:56:00.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.435028 systemd[1]: Stopping systemd-resolved.service... Oct 31 00:56:00.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.444629 systemd-networkd[741]: eth0: DHCPv6 lease lost Oct 31 00:56:00.446158 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 31 00:56:00.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.446255 systemd[1]: Stopped systemd-resolved.service. Oct 31 00:56:00.454000 audit: BPF prog-id=6 op=UNLOAD Oct 31 00:56:00.448054 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 31 00:56:00.456000 audit: BPF prog-id=9 op=UNLOAD Oct 31 00:56:00.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.448152 systemd[1]: Stopped systemd-networkd.service. Oct 31 00:56:00.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.449476 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 31 00:56:00.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.449554 systemd[1]: Stopped sysroot-boot.service. Oct 31 00:56:00.450859 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 31 00:56:00.450886 systemd[1]: Closed systemd-networkd.socket. Oct 31 00:56:00.452180 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 31 00:56:00.452225 systemd[1]: Stopped initrd-setup-root.service. Oct 31 00:56:00.454387 systemd[1]: Stopping network-cleanup.service... Oct 31 00:56:00.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.455519 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 31 00:56:00.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.455591 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 31 00:56:00.457560 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 31 00:56:00.457618 systemd[1]: Stopped systemd-sysctl.service. Oct 31 00:56:00.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.460097 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 31 00:56:00.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.460139 systemd[1]: Stopped systemd-modules-load.service. Oct 31 00:56:00.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.461213 systemd[1]: Stopping systemd-udevd.service... Oct 31 00:56:00.465535 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 31 00:56:00.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.468790 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 31 00:56:00.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.468901 systemd[1]: Stopped network-cleanup.service. Oct 31 00:56:00.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.470702 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 31 00:56:00.470821 systemd[1]: Stopped systemd-udevd.service. Oct 31 00:56:00.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.472208 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 31 00:56:00.472243 systemd[1]: Closed systemd-udevd-control.socket. Oct 31 00:56:00.473760 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 31 00:56:00.473793 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 31 00:56:00.475342 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 31 00:56:00.475384 systemd[1]: Stopped dracut-pre-udev.service. Oct 31 00:56:00.477101 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 31 00:56:00.477141 systemd[1]: Stopped dracut-cmdline.service. Oct 31 00:56:00.478653 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 31 00:56:00.478694 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 31 00:56:00.481256 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 31 00:56:00.482249 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 31 00:56:00.482308 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 31 00:56:00.485277 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 31 00:56:00.485319 systemd[1]: Stopped kmod-static-nodes.service. Oct 31 00:56:00.486246 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 31 00:56:00.486287 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 31 00:56:00.488851 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Oct 31 00:56:00.489300 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 31 00:56:00.489398 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 31 00:56:00.490962 systemd[1]: Reached target initrd-switch-root.target. Oct 31 00:56:00.493233 systemd[1]: Starting initrd-switch-root.service... Oct 31 00:56:00.518413 systemd-journald[289]: Received SIGTERM from PID 1 (n/a). Oct 31 00:56:00.518451 iscsid[753]: iscsid shutting down. Oct 31 00:56:00.499946 systemd[1]: Switching root. Oct 31 00:56:00.519977 systemd-journald[289]: Journal stopped Oct 31 00:56:02.554127 kernel: SELinux: Class mctp_socket not defined in policy. Oct 31 00:56:02.554182 kernel: SELinux: Class anon_inode not defined in policy. Oct 31 00:56:02.554193 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 31 00:56:02.554204 kernel: SELinux: policy capability network_peer_controls=1 Oct 31 00:56:02.554215 kernel: SELinux: policy capability open_perms=1 Oct 31 00:56:02.554225 kernel: SELinux: policy capability extended_socket_class=1 Oct 31 00:56:02.554241 kernel: SELinux: policy capability always_check_network=0 Oct 31 00:56:02.554251 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 31 00:56:02.554260 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 31 00:56:02.554270 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 31 00:56:02.554279 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 31 00:56:02.554291 systemd[1]: Successfully loaded SELinux policy in 35.608ms. Oct 31 00:56:02.554312 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.222ms. Oct 31 00:56:02.554324 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 00:56:02.554335 systemd[1]: Detected virtualization kvm. Oct 31 00:56:02.554346 systemd[1]: Detected architecture arm64. Oct 31 00:56:02.554356 systemd[1]: Detected first boot. Oct 31 00:56:02.554366 systemd[1]: Initializing machine ID from VM UUID. Oct 31 00:56:02.554376 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Oct 31 00:56:02.554390 systemd[1]: Populated /etc with preset unit settings. Oct 31 00:56:02.554400 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 00:56:02.554412 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 00:56:02.554426 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 00:56:02.554436 kernel: kauditd_printk_skb: 80 callbacks suppressed Oct 31 00:56:02.554446 kernel: audit: type=1334 audit(1761872162.396:84): prog-id=12 op=LOAD Oct 31 00:56:02.554455 kernel: audit: type=1334 audit(1761872162.396:85): prog-id=3 op=UNLOAD Oct 31 00:56:02.554464 kernel: audit: type=1334 audit(1761872162.397:86): prog-id=13 op=LOAD Oct 31 00:56:02.554478 kernel: audit: type=1334 audit(1761872162.398:87): prog-id=14 op=LOAD Oct 31 00:56:02.554487 kernel: audit: type=1334 audit(1761872162.398:88): prog-id=4 op=UNLOAD Oct 31 00:56:02.554496 kernel: audit: type=1334 audit(1761872162.398:89): prog-id=5 op=UNLOAD Oct 31 00:56:02.554509 kernel: audit: type=1334 audit(1761872162.399:90): prog-id=15 op=LOAD Oct 31 00:56:02.554518 kernel: audit: type=1334 audit(1761872162.399:91): prog-id=12 op=UNLOAD Oct 31 00:56:02.554528 kernel: audit: type=1334 audit(1761872162.400:92): prog-id=16 op=LOAD Oct 31 00:56:02.554539 kernel: audit: type=1334 audit(1761872162.401:93): prog-id=17 op=LOAD Oct 31 00:56:02.554551 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 31 00:56:02.554561 systemd[1]: Stopped iscsiuio.service. Oct 31 00:56:02.554594 systemd[1]: iscsid.service: Deactivated successfully. Oct 31 00:56:02.554605 systemd[1]: Stopped iscsid.service. Oct 31 00:56:02.554615 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 31 00:56:02.554625 systemd[1]: Stopped initrd-switch-root.service. Oct 31 00:56:02.554637 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 31 00:56:02.554647 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 31 00:56:02.554657 systemd[1]: Created slice system-addon\x2drun.slice. Oct 31 00:56:02.554668 systemd[1]: Created slice system-getty.slice. Oct 31 00:56:02.554678 systemd[1]: Created slice system-modprobe.slice. Oct 31 00:56:02.554689 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 31 00:56:02.554700 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 31 00:56:02.554711 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 31 00:56:02.554722 systemd[1]: Created slice user.slice. Oct 31 00:56:02.554732 systemd[1]: Started systemd-ask-password-console.path. Oct 31 00:56:02.554742 systemd[1]: Started systemd-ask-password-wall.path. Oct 31 00:56:02.554755 systemd[1]: Set up automount boot.automount. Oct 31 00:56:02.554770 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 31 00:56:02.554783 systemd[1]: Stopped target initrd-switch-root.target. Oct 31 00:56:02.554793 systemd[1]: Stopped target initrd-fs.target. Oct 31 00:56:02.554804 systemd[1]: Stopped target initrd-root-fs.target. Oct 31 00:56:02.554814 systemd[1]: Reached target integritysetup.target. Oct 31 00:56:02.554825 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 00:56:02.554835 systemd[1]: Reached target remote-fs.target. Oct 31 00:56:02.554846 systemd[1]: Reached target slices.target. Oct 31 00:56:02.554857 systemd[1]: Reached target swap.target. Oct 31 00:56:02.555546 systemd[1]: Reached target torcx.target. Oct 31 00:56:02.555569 systemd[1]: Reached target veritysetup.target. Oct 31 00:56:02.555596 systemd[1]: Listening on systemd-coredump.socket. Oct 31 00:56:02.555608 systemd[1]: Listening on systemd-initctl.socket. Oct 31 00:56:02.555618 systemd[1]: Listening on systemd-networkd.socket. Oct 31 00:56:02.555629 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 00:56:02.555640 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 00:56:02.555651 systemd[1]: Listening on systemd-userdbd.socket. Oct 31 00:56:02.555662 systemd[1]: Mounting dev-hugepages.mount... Oct 31 00:56:02.555673 systemd[1]: Mounting dev-mqueue.mount... Oct 31 00:56:02.555684 systemd[1]: Mounting media.mount... Oct 31 00:56:02.555697 systemd[1]: Mounting sys-kernel-debug.mount... Oct 31 00:56:02.555710 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 31 00:56:02.555721 systemd[1]: Mounting tmp.mount... Oct 31 00:56:02.555732 systemd[1]: Starting flatcar-tmpfiles.service... Oct 31 00:56:02.555755 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 00:56:02.555766 systemd[1]: Starting kmod-static-nodes.service... Oct 31 00:56:02.555776 systemd[1]: Starting modprobe@configfs.service... Oct 31 00:56:02.555786 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 00:56:02.555797 systemd[1]: Starting modprobe@drm.service... Oct 31 00:56:02.555808 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 00:56:02.555818 systemd[1]: Starting modprobe@fuse.service... Oct 31 00:56:02.555828 systemd[1]: Starting modprobe@loop.service... Oct 31 00:56:02.555840 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 31 00:56:02.555851 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 31 00:56:02.555862 systemd[1]: Stopped systemd-fsck-root.service. Oct 31 00:56:02.555872 kernel: fuse: init (API version 7.34) Oct 31 00:56:02.555883 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 31 00:56:02.555892 systemd[1]: Stopped systemd-fsck-usr.service. Oct 31 00:56:02.555904 systemd[1]: Stopped systemd-journald.service. Oct 31 00:56:02.555914 systemd[1]: Starting systemd-journald.service... Oct 31 00:56:02.555924 kernel: loop: module loaded Oct 31 00:56:02.555934 systemd[1]: Starting systemd-modules-load.service... Oct 31 00:56:02.555945 systemd[1]: Starting systemd-network-generator.service... Oct 31 00:56:02.555956 systemd[1]: Starting systemd-remount-fs.service... Oct 31 00:56:02.555965 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 00:56:02.555976 systemd[1]: verity-setup.service: Deactivated successfully. Oct 31 00:56:02.555989 systemd-journald[1006]: Journal started Oct 31 00:56:02.556037 systemd-journald[1006]: Runtime Journal (/run/log/journal/de581c69713843669810b2592700864e) is 6.0M, max 48.7M, 42.6M free. Oct 31 00:56:00.576000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 31 00:56:00.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 00:56:00.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 00:56:00.649000 audit: BPF prog-id=10 op=LOAD Oct 31 00:56:00.649000 audit: BPF prog-id=10 op=UNLOAD Oct 31 00:56:00.649000 audit: BPF prog-id=11 op=LOAD Oct 31 00:56:00.649000 audit: BPF prog-id=11 op=UNLOAD Oct 31 00:56:00.689000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Oct 31 00:56:00.689000 audit[932]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c589c a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:00.689000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 00:56:00.690000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Oct 31 00:56:00.690000 audit[932]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000022105 a2=1ed a3=0 items=2 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:00.690000 audit: CWD cwd="/" Oct 31 00:56:00.690000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 00:56:00.690000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 00:56:00.690000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 00:56:02.396000 audit: BPF prog-id=12 op=LOAD Oct 31 00:56:02.396000 audit: BPF prog-id=3 op=UNLOAD Oct 31 00:56:02.397000 audit: BPF prog-id=13 op=LOAD Oct 31 00:56:02.398000 audit: BPF prog-id=14 op=LOAD Oct 31 00:56:02.398000 audit: BPF prog-id=4 op=UNLOAD Oct 31 00:56:02.398000 audit: BPF prog-id=5 op=UNLOAD Oct 31 00:56:02.399000 audit: BPF prog-id=15 op=LOAD Oct 31 00:56:02.399000 audit: BPF prog-id=12 op=UNLOAD Oct 31 00:56:02.400000 audit: BPF prog-id=16 op=LOAD Oct 31 00:56:02.401000 audit: BPF prog-id=17 op=LOAD Oct 31 00:56:02.401000 audit: BPF prog-id=13 op=UNLOAD Oct 31 00:56:02.401000 audit: BPF prog-id=14 op=UNLOAD Oct 31 00:56:02.404000 audit: BPF prog-id=18 op=LOAD Oct 31 00:56:02.404000 audit: BPF prog-id=15 op=UNLOAD Oct 31 00:56:02.405000 audit: BPF prog-id=19 op=LOAD Oct 31 00:56:02.406000 audit: BPF prog-id=20 op=LOAD Oct 31 00:56:02.406000 audit: BPF prog-id=16 op=UNLOAD Oct 31 00:56:02.406000 audit: BPF prog-id=17 op=UNLOAD Oct 31 00:56:02.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.556909 systemd[1]: Stopped verity-setup.service. Oct 31 00:56:02.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.420000 audit: BPF prog-id=18 op=UNLOAD Oct 31 00:56:02.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.531000 audit: BPF prog-id=21 op=LOAD Oct 31 00:56:02.532000 audit: BPF prog-id=22 op=LOAD Oct 31 00:56:02.532000 audit: BPF prog-id=23 op=LOAD Oct 31 00:56:02.532000 audit: BPF prog-id=19 op=UNLOAD Oct 31 00:56:02.532000 audit: BPF prog-id=20 op=UNLOAD Oct 31 00:56:02.552000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 31 00:56:02.552000 audit[1006]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=ffffce337840 a2=4000 a3=1 items=0 ppid=1 pid=1006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:02.552000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 31 00:56:00.687557 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 00:56:02.395175 systemd[1]: Queued start job for default target multi-user.target. Oct 31 00:56:00.687885 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:00Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 00:56:02.395189 systemd[1]: Unnecessary job was removed for dev-vda6.device. Oct 31 00:56:00.687904 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:00Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 00:56:02.407205 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 31 00:56:00.687936 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:00Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 31 00:56:02.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:00.687946 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:00Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 31 00:56:00.687977 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:00Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 31 00:56:00.687989 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:00Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 31 00:56:00.688266 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:00Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 31 00:56:00.688305 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:00Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 00:56:00.688317 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:00Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 00:56:00.689375 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:00Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 31 00:56:00.689420 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:00Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 31 00:56:00.689443 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:00Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Oct 31 00:56:00.689457 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:00Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 31 00:56:00.689475 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:00Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Oct 31 00:56:00.689489 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:00Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 31 00:56:02.130811 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:02Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 00:56:02.131094 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:02Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 00:56:02.131209 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:02Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 00:56:02.131381 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:02Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 00:56:02.131432 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:02Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 31 00:56:02.131490 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-31T00:56:02Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 31 00:56:02.561415 systemd[1]: Started systemd-journald.service. Oct 31 00:56:02.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.562243 systemd[1]: Mounted dev-hugepages.mount. Oct 31 00:56:02.563362 systemd[1]: Mounted dev-mqueue.mount. Oct 31 00:56:02.564437 systemd[1]: Mounted media.mount. Oct 31 00:56:02.565398 systemd[1]: Mounted sys-kernel-debug.mount. Oct 31 00:56:02.566488 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 31 00:56:02.567619 systemd[1]: Mounted tmp.mount. Oct 31 00:56:02.568929 systemd[1]: Finished flatcar-tmpfiles.service. Oct 31 00:56:02.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.570223 systemd[1]: Finished kmod-static-nodes.service. Oct 31 00:56:02.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.571464 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 31 00:56:02.571764 systemd[1]: Finished modprobe@configfs.service. Oct 31 00:56:02.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.572954 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 00:56:02.573176 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 00:56:02.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.574589 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 00:56:02.574753 systemd[1]: Finished modprobe@drm.service. Oct 31 00:56:02.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.575884 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 00:56:02.576075 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 00:56:02.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.577415 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 31 00:56:02.577606 systemd[1]: Finished modprobe@fuse.service. Oct 31 00:56:02.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.578786 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 00:56:02.578960 systemd[1]: Finished modprobe@loop.service. Oct 31 00:56:02.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.580310 systemd[1]: Finished systemd-modules-load.service. Oct 31 00:56:02.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.581659 systemd[1]: Finished systemd-network-generator.service. Oct 31 00:56:02.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.583020 systemd[1]: Finished systemd-remount-fs.service. Oct 31 00:56:02.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.584676 systemd[1]: Reached target network-pre.target. Oct 31 00:56:02.586957 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 31 00:56:02.589240 systemd[1]: Mounting sys-kernel-config.mount... Oct 31 00:56:02.590412 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 31 00:56:02.593097 systemd[1]: Starting systemd-hwdb-update.service... Oct 31 00:56:02.595316 systemd[1]: Starting systemd-journal-flush.service... Oct 31 00:56:02.596435 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 00:56:02.597685 systemd[1]: Starting systemd-random-seed.service... Oct 31 00:56:02.598730 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 00:56:02.600064 systemd[1]: Starting systemd-sysctl.service... Oct 31 00:56:02.602279 systemd[1]: Starting systemd-sysusers.service... Oct 31 00:56:02.604239 systemd-journald[1006]: Time spent on flushing to /var/log/journal/de581c69713843669810b2592700864e is 13.512ms for 988 entries. Oct 31 00:56:02.604239 systemd-journald[1006]: System Journal (/var/log/journal/de581c69713843669810b2592700864e) is 8.0M, max 195.6M, 187.6M free. Oct 31 00:56:02.629810 systemd-journald[1006]: Received client request to flush runtime journal. Oct 31 00:56:02.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.605883 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 00:56:02.607192 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 31 00:56:02.608431 systemd[1]: Mounted sys-kernel-config.mount. Oct 31 00:56:02.610816 systemd[1]: Starting systemd-udev-settle.service... Oct 31 00:56:02.611945 systemd[1]: Finished systemd-random-seed.service. Oct 31 00:56:02.613220 systemd[1]: Reached target first-boot-complete.target. Oct 31 00:56:02.621924 systemd[1]: Finished systemd-sysusers.service. Oct 31 00:56:02.626940 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 31 00:56:02.630752 systemd[1]: Finished systemd-journal-flush.service. Oct 31 00:56:02.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.632318 systemd[1]: Finished systemd-sysctl.service. Oct 31 00:56:02.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.633762 udevadm[1032]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 31 00:56:02.643997 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 31 00:56:02.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.996662 systemd[1]: Finished systemd-hwdb-update.service. Oct 31 00:56:02.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:02.997000 audit: BPF prog-id=24 op=LOAD Oct 31 00:56:02.997000 audit: BPF prog-id=25 op=LOAD Oct 31 00:56:02.997000 audit: BPF prog-id=7 op=UNLOAD Oct 31 00:56:02.997000 audit: BPF prog-id=8 op=UNLOAD Oct 31 00:56:02.999174 systemd[1]: Starting systemd-udevd.service... Oct 31 00:56:03.016469 systemd-udevd[1038]: Using default interface naming scheme 'v252'. Oct 31 00:56:03.030958 systemd[1]: Started systemd-udevd.service. Oct 31 00:56:03.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.032000 audit: BPF prog-id=26 op=LOAD Oct 31 00:56:03.034638 systemd[1]: Starting systemd-networkd.service... Oct 31 00:56:03.040000 audit: BPF prog-id=27 op=LOAD Oct 31 00:56:03.040000 audit: BPF prog-id=28 op=LOAD Oct 31 00:56:03.041000 audit: BPF prog-id=29 op=LOAD Oct 31 00:56:03.042717 systemd[1]: Starting systemd-userdbd.service... Oct 31 00:56:03.058882 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Oct 31 00:56:03.076726 systemd[1]: Started systemd-userdbd.service. Oct 31 00:56:03.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.107001 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 00:56:03.132340 systemd-networkd[1047]: lo: Link UP Oct 31 00:56:03.132355 systemd-networkd[1047]: lo: Gained carrier Oct 31 00:56:03.132916 systemd-networkd[1047]: Enumeration completed Oct 31 00:56:03.133054 systemd-networkd[1047]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 31 00:56:03.133072 systemd[1]: Started systemd-networkd.service. Oct 31 00:56:03.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.134451 systemd-networkd[1047]: eth0: Link UP Oct 31 00:56:03.134463 systemd-networkd[1047]: eth0: Gained carrier Oct 31 00:56:03.147723 systemd-networkd[1047]: eth0: DHCPv4 address 10.0.0.104/16, gateway 10.0.0.1 acquired from 10.0.0.1 Oct 31 00:56:03.149034 systemd[1]: Finished systemd-udev-settle.service. Oct 31 00:56:03.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.151511 systemd[1]: Starting lvm2-activation-early.service... Oct 31 00:56:03.160984 lvm[1071]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 00:56:03.186633 systemd[1]: Finished lvm2-activation-early.service. Oct 31 00:56:03.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.187847 systemd[1]: Reached target cryptsetup.target. Oct 31 00:56:03.190163 systemd[1]: Starting lvm2-activation.service... Oct 31 00:56:03.194256 lvm[1072]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 00:56:03.231654 systemd[1]: Finished lvm2-activation.service. Oct 31 00:56:03.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.232714 systemd[1]: Reached target local-fs-pre.target. Oct 31 00:56:03.233623 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 31 00:56:03.233659 systemd[1]: Reached target local-fs.target. Oct 31 00:56:03.234521 systemd[1]: Reached target machines.target. Oct 31 00:56:03.236929 systemd[1]: Starting ldconfig.service... Oct 31 00:56:03.238217 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 00:56:03.238282 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 00:56:03.239525 systemd[1]: Starting systemd-boot-update.service... Oct 31 00:56:03.241825 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 31 00:56:03.244520 systemd[1]: Starting systemd-machine-id-commit.service... Oct 31 00:56:03.247120 systemd[1]: Starting systemd-sysext.service... Oct 31 00:56:03.248386 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1074 (bootctl) Oct 31 00:56:03.249677 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 31 00:56:03.257193 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 31 00:56:03.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.261652 systemd[1]: Unmounting usr-share-oem.mount... Oct 31 00:56:03.266380 systemd[1]: usr-share-oem.mount: Deactivated successfully. Oct 31 00:56:03.266636 systemd[1]: Unmounted usr-share-oem.mount. Oct 31 00:56:03.281611 kernel: loop0: detected capacity change from 0 to 200800 Oct 31 00:56:03.327208 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 31 00:56:03.328713 systemd[1]: Finished systemd-machine-id-commit.service. Oct 31 00:56:03.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.338600 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Oct 31 00:56:03.339900 systemd-fsck[1082]: fsck.fat 4.2 (2021-01-31) Oct 31 00:56:03.339900 systemd-fsck[1082]: /dev/vda1: 236 files, 117310/258078 clusters Oct 31 00:56:03.341802 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 31 00:56:03.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.345205 systemd[1]: Mounting boot.mount... Oct 31 00:56:03.353020 systemd[1]: Mounted boot.mount. Oct 31 00:56:03.361664 systemd[1]: Finished systemd-boot-update.service. Oct 31 00:56:03.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.366595 kernel: loop1: detected capacity change from 0 to 200800 Oct 31 00:56:03.371504 (sd-sysext)[1087]: Using extensions 'kubernetes'. Oct 31 00:56:03.371968 (sd-sysext)[1087]: Merged extensions into '/usr'. Oct 31 00:56:03.391058 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 00:56:03.392661 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 00:56:03.395058 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 00:56:03.397267 systemd[1]: Starting modprobe@loop.service... Oct 31 00:56:03.398516 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 00:56:03.398696 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 00:56:03.399533 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 00:56:03.399709 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 00:56:03.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.401523 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 00:56:03.401690 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 00:56:03.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.403702 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 00:56:03.403928 systemd[1]: Finished modprobe@loop.service. Oct 31 00:56:03.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.405954 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 00:56:03.406099 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 00:56:03.451431 ldconfig[1073]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 31 00:56:03.454825 systemd[1]: Finished ldconfig.service. Oct 31 00:56:03.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.561272 systemd[1]: Mounting usr-share-oem.mount... Oct 31 00:56:03.566502 systemd[1]: Mounted usr-share-oem.mount. Oct 31 00:56:03.568636 systemd[1]: Finished systemd-sysext.service. Oct 31 00:56:03.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.570901 systemd[1]: Starting ensure-sysext.service... Oct 31 00:56:03.572828 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 31 00:56:03.577641 systemd[1]: Reloading. Oct 31 00:56:03.583267 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 31 00:56:03.584026 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 31 00:56:03.585528 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 31 00:56:03.622249 /usr/lib/systemd/system-generators/torcx-generator[1114]: time="2025-10-31T00:56:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 00:56:03.622672 /usr/lib/systemd/system-generators/torcx-generator[1114]: time="2025-10-31T00:56:03Z" level=info msg="torcx already run" Oct 31 00:56:03.682716 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 00:56:03.682737 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 00:56:03.701087 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 00:56:03.750000 audit: BPF prog-id=30 op=LOAD Oct 31 00:56:03.751000 audit: BPF prog-id=21 op=UNLOAD Oct 31 00:56:03.751000 audit: BPF prog-id=31 op=LOAD Oct 31 00:56:03.751000 audit: BPF prog-id=32 op=LOAD Oct 31 00:56:03.751000 audit: BPF prog-id=22 op=UNLOAD Oct 31 00:56:03.751000 audit: BPF prog-id=23 op=UNLOAD Oct 31 00:56:03.752000 audit: BPF prog-id=33 op=LOAD Oct 31 00:56:03.752000 audit: BPF prog-id=34 op=LOAD Oct 31 00:56:03.752000 audit: BPF prog-id=24 op=UNLOAD Oct 31 00:56:03.752000 audit: BPF prog-id=25 op=UNLOAD Oct 31 00:56:03.753000 audit: BPF prog-id=35 op=LOAD Oct 31 00:56:03.753000 audit: BPF prog-id=27 op=UNLOAD Oct 31 00:56:03.753000 audit: BPF prog-id=36 op=LOAD Oct 31 00:56:03.753000 audit: BPF prog-id=37 op=LOAD Oct 31 00:56:03.753000 audit: BPF prog-id=28 op=UNLOAD Oct 31 00:56:03.753000 audit: BPF prog-id=29 op=UNLOAD Oct 31 00:56:03.754000 audit: BPF prog-id=38 op=LOAD Oct 31 00:56:03.754000 audit: BPF prog-id=26 op=UNLOAD Oct 31 00:56:03.757448 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 31 00:56:03.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.762537 systemd[1]: Starting audit-rules.service... Oct 31 00:56:03.764639 systemd[1]: Starting clean-ca-certificates.service... Oct 31 00:56:03.766852 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 31 00:56:03.768000 audit: BPF prog-id=39 op=LOAD Oct 31 00:56:03.769658 systemd[1]: Starting systemd-resolved.service... Oct 31 00:56:03.770000 audit: BPF prog-id=40 op=LOAD Oct 31 00:56:03.772324 systemd[1]: Starting systemd-timesyncd.service... Oct 31 00:56:03.774466 systemd[1]: Starting systemd-update-utmp.service... Oct 31 00:56:03.776117 systemd[1]: Finished clean-ca-certificates.service. Oct 31 00:56:03.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.779283 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 00:56:03.779000 audit[1163]: SYSTEM_BOOT pid=1163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.783402 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 00:56:03.784972 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 00:56:03.788147 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 00:56:03.790456 systemd[1]: Starting modprobe@loop.service... Oct 31 00:56:03.791444 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 00:56:03.791678 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 00:56:03.791858 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 00:56:03.793285 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 31 00:56:03.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.795061 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 00:56:03.795205 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 00:56:03.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.797335 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 00:56:03.797484 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 00:56:03.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.799178 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 00:56:03.799316 systemd[1]: Finished modprobe@loop.service. Oct 31 00:56:03.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.801095 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 00:56:03.801235 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 00:56:03.802893 systemd[1]: Starting systemd-update-done.service... Oct 31 00:56:03.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.804621 systemd[1]: Finished systemd-update-utmp.service. Oct 31 00:56:03.808338 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 00:56:03.809825 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 00:56:03.812080 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 00:56:03.814320 systemd[1]: Starting modprobe@loop.service... Oct 31 00:56:03.815281 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 00:56:03.815450 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 00:56:03.815593 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 00:56:03.816539 systemd[1]: Finished systemd-update-done.service. Oct 31 00:56:03.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.819009 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 00:56:03.819163 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 00:56:03.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.820566 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 00:56:03.820730 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 00:56:03.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.821000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 31 00:56:03.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:03.821000 audit[1179]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffef78af50 a2=420 a3=0 items=0 ppid=1152 pid=1179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:03.821000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 31 00:56:03.822313 augenrules[1179]: No rules Oct 31 00:56:03.822392 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 00:56:03.822518 systemd[1]: Finished modprobe@loop.service. Oct 31 00:56:03.824071 systemd[1]: Finished audit-rules.service. Oct 31 00:56:03.827861 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 00:56:03.829256 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 00:56:03.831440 systemd[1]: Starting modprobe@drm.service... Oct 31 00:56:03.833743 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 00:56:04.278409 systemd-timesyncd[1160]: Contacted time server 10.0.0.1:123 (10.0.0.1). Oct 31 00:56:04.278459 systemd-timesyncd[1160]: Initial clock synchronization to Fri 2025-10-31 00:56:04.278309 UTC. Oct 31 00:56:04.280350 systemd[1]: Starting modprobe@loop.service... Oct 31 00:56:04.281240 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 00:56:04.281385 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 00:56:04.282784 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 31 00:56:04.283983 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 00:56:04.284969 systemd[1]: Started systemd-timesyncd.service. Oct 31 00:56:04.286720 systemd-resolved[1156]: Positive Trust Anchors: Oct 31 00:56:04.286781 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 00:56:04.286926 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 00:56:04.287043 systemd-resolved[1156]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 00:56:04.287175 systemd-resolved[1156]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 00:56:04.288547 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 00:56:04.288685 systemd[1]: Finished modprobe@drm.service. Oct 31 00:56:04.290251 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 00:56:04.290507 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 00:56:04.292072 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 00:56:04.292209 systemd[1]: Finished modprobe@loop.service. Oct 31 00:56:04.294041 systemd[1]: Reached target time-set.target. Oct 31 00:56:04.295033 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 00:56:04.295099 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 00:56:04.295405 systemd[1]: Finished ensure-sysext.service. Oct 31 00:56:04.301127 systemd-resolved[1156]: Defaulting to hostname 'linux'. Oct 31 00:56:04.302806 systemd[1]: Started systemd-resolved.service. Oct 31 00:56:04.303796 systemd[1]: Reached target network.target. Oct 31 00:56:04.304811 systemd[1]: Reached target nss-lookup.target. Oct 31 00:56:04.305698 systemd[1]: Reached target sysinit.target. Oct 31 00:56:04.306620 systemd[1]: Started motdgen.path. Oct 31 00:56:04.307394 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 31 00:56:04.308707 systemd[1]: Started logrotate.timer. Oct 31 00:56:04.309656 systemd[1]: Started mdadm.timer. Oct 31 00:56:04.310395 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 31 00:56:04.311276 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 31 00:56:04.311314 systemd[1]: Reached target paths.target. Oct 31 00:56:04.312091 systemd[1]: Reached target timers.target. Oct 31 00:56:04.313327 systemd[1]: Listening on dbus.socket. Oct 31 00:56:04.315237 systemd[1]: Starting docker.socket... Oct 31 00:56:04.318596 systemd[1]: Listening on sshd.socket. Oct 31 00:56:04.319498 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 00:56:04.319967 systemd[1]: Listening on docker.socket. Oct 31 00:56:04.320937 systemd[1]: Reached target sockets.target. Oct 31 00:56:04.321806 systemd[1]: Reached target basic.target. Oct 31 00:56:04.322677 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 00:56:04.322715 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 00:56:04.323807 systemd[1]: Starting containerd.service... Oct 31 00:56:04.325783 systemd[1]: Starting dbus.service... Oct 31 00:56:04.327623 systemd[1]: Starting enable-oem-cloudinit.service... Oct 31 00:56:04.329684 systemd[1]: Starting extend-filesystems.service... Oct 31 00:56:04.330715 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 31 00:56:04.332149 jq[1194]: false Oct 31 00:56:04.331795 systemd[1]: Starting motdgen.service... Oct 31 00:56:04.333647 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 31 00:56:04.335803 systemd[1]: Starting sshd-keygen.service... Oct 31 00:56:04.339192 systemd[1]: Starting systemd-logind.service... Oct 31 00:56:04.340348 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 00:56:04.340424 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 31 00:56:04.340842 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 31 00:56:04.341668 systemd[1]: Starting update-engine.service... Oct 31 00:56:04.343675 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 31 00:56:04.346236 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 31 00:56:04.346411 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 31 00:56:04.346507 jq[1208]: true Oct 31 00:56:04.346718 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 31 00:56:04.347220 extend-filesystems[1195]: Found loop1 Oct 31 00:56:04.347220 extend-filesystems[1195]: Found vda Oct 31 00:56:04.347220 extend-filesystems[1195]: Found vda1 Oct 31 00:56:04.347220 extend-filesystems[1195]: Found vda2 Oct 31 00:56:04.347220 extend-filesystems[1195]: Found vda3 Oct 31 00:56:04.358224 extend-filesystems[1195]: Found usr Oct 31 00:56:04.358224 extend-filesystems[1195]: Found vda4 Oct 31 00:56:04.358224 extend-filesystems[1195]: Found vda6 Oct 31 00:56:04.358224 extend-filesystems[1195]: Found vda7 Oct 31 00:56:04.358224 extend-filesystems[1195]: Found vda9 Oct 31 00:56:04.358224 extend-filesystems[1195]: Checking size of /dev/vda9 Oct 31 00:56:04.380168 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Oct 31 00:56:04.348401 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 31 00:56:04.357870 dbus-daemon[1193]: [system] SELinux support is enabled Oct 31 00:56:04.380551 extend-filesystems[1195]: Resized partition /dev/vda9 Oct 31 00:56:04.358082 systemd[1]: Started dbus.service. Oct 31 00:56:04.382132 extend-filesystems[1221]: resize2fs 1.46.5 (30-Dec-2021) Oct 31 00:56:04.361636 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 31 00:56:04.385963 jq[1216]: true Oct 31 00:56:04.361675 systemd[1]: Reached target system-config.target. Oct 31 00:56:04.362669 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 31 00:56:04.362693 systemd[1]: Reached target user-config.target. Oct 31 00:56:04.365678 systemd[1]: motdgen.service: Deactivated successfully. Oct 31 00:56:04.365847 systemd[1]: Finished motdgen.service. Oct 31 00:56:04.404309 systemd-logind[1201]: Watching system buttons on /dev/input/event0 (Power Button) Oct 31 00:56:04.405442 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Oct 31 00:56:04.404957 systemd-logind[1201]: New seat seat0. Oct 31 00:56:04.406370 systemd[1]: Started systemd-logind.service. Oct 31 00:56:04.419273 extend-filesystems[1221]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Oct 31 00:56:04.419273 extend-filesystems[1221]: old_desc_blocks = 1, new_desc_blocks = 1 Oct 31 00:56:04.419273 extend-filesystems[1221]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Oct 31 00:56:04.425795 extend-filesystems[1195]: Resized filesystem in /dev/vda9 Oct 31 00:56:04.421007 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 31 00:56:04.431084 update_engine[1207]: I1031 00:56:04.420671 1207 main.cc:92] Flatcar Update Engine starting Oct 31 00:56:04.431084 update_engine[1207]: I1031 00:56:04.426147 1207 update_check_scheduler.cc:74] Next update check in 10m28s Oct 31 00:56:04.421189 systemd[1]: Finished extend-filesystems.service. Oct 31 00:56:04.426799 systemd[1]: Started update-engine.service. Oct 31 00:56:04.429797 systemd[1]: Started locksmithd.service. Oct 31 00:56:04.431746 env[1217]: time="2025-10-31T00:56:04.431632878Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 31 00:56:04.434440 bash[1241]: Updated "/home/core/.ssh/authorized_keys" Oct 31 00:56:04.435259 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 31 00:56:04.452063 env[1217]: time="2025-10-31T00:56:04.451986918Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 31 00:56:04.452288 env[1217]: time="2025-10-31T00:56:04.452215638Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 31 00:56:04.454074 env[1217]: time="2025-10-31T00:56:04.453840638Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 31 00:56:04.454074 env[1217]: time="2025-10-31T00:56:04.453888158Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 31 00:56:04.454182 env[1217]: time="2025-10-31T00:56:04.454157078Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 00:56:04.454232 env[1217]: time="2025-10-31T00:56:04.454181518Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 31 00:56:04.454232 env[1217]: time="2025-10-31T00:56:04.454195998Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 31 00:56:04.454232 env[1217]: time="2025-10-31T00:56:04.454206118Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 31 00:56:04.454302 env[1217]: time="2025-10-31T00:56:04.454286278Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 31 00:56:04.454661 env[1217]: time="2025-10-31T00:56:04.454640358Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 31 00:56:04.454795 env[1217]: time="2025-10-31T00:56:04.454776678Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 00:56:04.454823 env[1217]: time="2025-10-31T00:56:04.454795718Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 31 00:56:04.454871 env[1217]: time="2025-10-31T00:56:04.454856038Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 31 00:56:04.454902 env[1217]: time="2025-10-31T00:56:04.454872518Z" level=info msg="metadata content store policy set" policy=shared Oct 31 00:56:04.458535 env[1217]: time="2025-10-31T00:56:04.458491278Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 31 00:56:04.458612 env[1217]: time="2025-10-31T00:56:04.458537598Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 31 00:56:04.458612 env[1217]: time="2025-10-31T00:56:04.458552078Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 31 00:56:04.458612 env[1217]: time="2025-10-31T00:56:04.458588598Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 31 00:56:04.458612 env[1217]: time="2025-10-31T00:56:04.458603558Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 31 00:56:04.458708 env[1217]: time="2025-10-31T00:56:04.458618758Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 31 00:56:04.458708 env[1217]: time="2025-10-31T00:56:04.458631718Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 31 00:56:04.458996 env[1217]: time="2025-10-31T00:56:04.458978278Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 31 00:56:04.459031 env[1217]: time="2025-10-31T00:56:04.459001478Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 31 00:56:04.459031 env[1217]: time="2025-10-31T00:56:04.459016438Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 31 00:56:04.459124 env[1217]: time="2025-10-31T00:56:04.459031398Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 31 00:56:04.459124 env[1217]: time="2025-10-31T00:56:04.459044998Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 31 00:56:04.459221 env[1217]: time="2025-10-31T00:56:04.459200678Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 31 00:56:04.459299 env[1217]: time="2025-10-31T00:56:04.459285038Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 31 00:56:04.459534 env[1217]: time="2025-10-31T00:56:04.459508838Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 31 00:56:04.459583 env[1217]: time="2025-10-31T00:56:04.459547478Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 31 00:56:04.459583 env[1217]: time="2025-10-31T00:56:04.459571678Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 31 00:56:04.459729 env[1217]: time="2025-10-31T00:56:04.459716958Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 31 00:56:04.459762 env[1217]: time="2025-10-31T00:56:04.459733798Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 31 00:56:04.459762 env[1217]: time="2025-10-31T00:56:04.459747118Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 31 00:56:04.459762 env[1217]: time="2025-10-31T00:56:04.459759238Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 31 00:56:04.459830 env[1217]: time="2025-10-31T00:56:04.459771758Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 31 00:56:04.459830 env[1217]: time="2025-10-31T00:56:04.459787078Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 31 00:56:04.459830 env[1217]: time="2025-10-31T00:56:04.459799198Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 31 00:56:04.459830 env[1217]: time="2025-10-31T00:56:04.459810998Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 31 00:56:04.459830 env[1217]: time="2025-10-31T00:56:04.459823958Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 31 00:56:04.460023 env[1217]: time="2025-10-31T00:56:04.459948158Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 31 00:56:04.460023 env[1217]: time="2025-10-31T00:56:04.459977038Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 31 00:56:04.460023 env[1217]: time="2025-10-31T00:56:04.459991518Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 31 00:56:04.460023 env[1217]: time="2025-10-31T00:56:04.460004478Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 31 00:56:04.460133 env[1217]: time="2025-10-31T00:56:04.460028958Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 31 00:56:04.460133 env[1217]: time="2025-10-31T00:56:04.460039678Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 31 00:56:04.460133 env[1217]: time="2025-10-31T00:56:04.460079958Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 31 00:56:04.460133 env[1217]: time="2025-10-31T00:56:04.460116478Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 31 00:56:04.460361 env[1217]: time="2025-10-31T00:56:04.460311358Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 31 00:56:04.460997 env[1217]: time="2025-10-31T00:56:04.460378118Z" level=info msg="Connect containerd service" Oct 31 00:56:04.460997 env[1217]: time="2025-10-31T00:56:04.460408998Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 31 00:56:04.461199 env[1217]: time="2025-10-31T00:56:04.461037438Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 00:56:04.461394 env[1217]: time="2025-10-31T00:56:04.461341358Z" level=info msg="Start subscribing containerd event" Oct 31 00:56:04.461944 env[1217]: time="2025-10-31T00:56:04.461745198Z" level=info msg="Start recovering state" Oct 31 00:56:04.461944 env[1217]: time="2025-10-31T00:56:04.461835278Z" level=info msg="Start event monitor" Oct 31 00:56:04.461944 env[1217]: time="2025-10-31T00:56:04.461857678Z" level=info msg="Start snapshots syncer" Oct 31 00:56:04.462065 env[1217]: time="2025-10-31T00:56:04.462006038Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 31 00:56:04.462103 env[1217]: time="2025-10-31T00:56:04.462086198Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 31 00:56:04.462829 env[1217]: time="2025-10-31T00:56:04.461874318Z" level=info msg="Start cni network conf syncer for default" Oct 31 00:56:04.462829 env[1217]: time="2025-10-31T00:56:04.462159278Z" level=info msg="Start streaming server" Oct 31 00:56:04.462213 systemd[1]: Started containerd.service. Oct 31 00:56:04.463446 env[1217]: time="2025-10-31T00:56:04.463389078Z" level=info msg="containerd successfully booted in 0.033075s" Oct 31 00:56:04.466472 locksmithd[1244]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 31 00:56:04.717287 systemd-networkd[1047]: eth0: Gained IPv6LL Oct 31 00:56:04.719370 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 31 00:56:04.720826 systemd[1]: Reached target network-online.target. Oct 31 00:56:04.723410 systemd[1]: Starting kubelet.service... Oct 31 00:56:05.272166 systemd[1]: Started kubelet.service. Oct 31 00:56:05.346221 sshd_keygen[1215]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 31 00:56:05.363653 systemd[1]: Finished sshd-keygen.service. Oct 31 00:56:05.366118 systemd[1]: Starting issuegen.service... Oct 31 00:56:05.370769 systemd[1]: issuegen.service: Deactivated successfully. Oct 31 00:56:05.370938 systemd[1]: Finished issuegen.service. Oct 31 00:56:05.373330 systemd[1]: Starting systemd-user-sessions.service... Oct 31 00:56:05.379116 systemd[1]: Finished systemd-user-sessions.service. Oct 31 00:56:05.381450 systemd[1]: Started getty@tty1.service. Oct 31 00:56:05.383685 systemd[1]: Started serial-getty@ttyAMA0.service. Oct 31 00:56:05.384872 systemd[1]: Reached target getty.target. Oct 31 00:56:05.385857 systemd[1]: Reached target multi-user.target. Oct 31 00:56:05.388151 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 31 00:56:05.394838 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 31 00:56:05.394998 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 31 00:56:05.396255 systemd[1]: Startup finished in 569ms (kernel) + 3.983s (initrd) + 4.412s (userspace) = 8.966s. Oct 31 00:56:05.606697 kubelet[1258]: E1031 00:56:05.606593 1258 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 00:56:05.608913 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 00:56:05.609031 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 00:56:09.736781 systemd[1]: Created slice system-sshd.slice. Oct 31 00:56:09.737890 systemd[1]: Started sshd@0-10.0.0.104:22-10.0.0.1:59430.service. Oct 31 00:56:09.779945 sshd[1280]: Accepted publickey for core from 10.0.0.1 port 59430 ssh2: RSA SHA256:U8uh4tNlAoztP9XwPhxxRCHpcOqZ9ym/JukaPHih73U Oct 31 00:56:09.782099 sshd[1280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 00:56:09.791308 systemd-logind[1201]: New session 1 of user core. Oct 31 00:56:09.792258 systemd[1]: Created slice user-500.slice. Oct 31 00:56:09.793386 systemd[1]: Starting user-runtime-dir@500.service... Oct 31 00:56:09.801921 systemd[1]: Finished user-runtime-dir@500.service. Oct 31 00:56:09.803280 systemd[1]: Starting user@500.service... Oct 31 00:56:09.806307 (systemd)[1283]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 31 00:56:09.866031 systemd[1283]: Queued start job for default target default.target. Oct 31 00:56:09.866541 systemd[1283]: Reached target paths.target. Oct 31 00:56:09.866575 systemd[1283]: Reached target sockets.target. Oct 31 00:56:09.866586 systemd[1283]: Reached target timers.target. Oct 31 00:56:09.866596 systemd[1283]: Reached target basic.target. Oct 31 00:56:09.866639 systemd[1283]: Reached target default.target. Oct 31 00:56:09.866663 systemd[1283]: Startup finished in 54ms. Oct 31 00:56:09.866733 systemd[1]: Started user@500.service. Oct 31 00:56:09.867706 systemd[1]: Started session-1.scope. Oct 31 00:56:09.919631 systemd[1]: Started sshd@1-10.0.0.104:22-10.0.0.1:59432.service. Oct 31 00:56:09.957882 sshd[1292]: Accepted publickey for core from 10.0.0.1 port 59432 ssh2: RSA SHA256:U8uh4tNlAoztP9XwPhxxRCHpcOqZ9ym/JukaPHih73U Oct 31 00:56:09.959359 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 00:56:09.964126 systemd-logind[1201]: New session 2 of user core. Oct 31 00:56:09.965356 systemd[1]: Started session-2.scope. Oct 31 00:56:10.020862 sshd[1292]: pam_unix(sshd:session): session closed for user core Oct 31 00:56:10.023821 systemd[1]: sshd@1-10.0.0.104:22-10.0.0.1:59432.service: Deactivated successfully. Oct 31 00:56:10.024533 systemd[1]: session-2.scope: Deactivated successfully. Oct 31 00:56:10.025039 systemd-logind[1201]: Session 2 logged out. Waiting for processes to exit. Oct 31 00:56:10.026164 systemd[1]: Started sshd@2-10.0.0.104:22-10.0.0.1:59434.service. Oct 31 00:56:10.026883 systemd-logind[1201]: Removed session 2. Oct 31 00:56:10.063849 sshd[1298]: Accepted publickey for core from 10.0.0.1 port 59434 ssh2: RSA SHA256:U8uh4tNlAoztP9XwPhxxRCHpcOqZ9ym/JukaPHih73U Oct 31 00:56:10.065424 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 00:56:10.069204 systemd-logind[1201]: New session 3 of user core. Oct 31 00:56:10.069719 systemd[1]: Started session-3.scope. Oct 31 00:56:10.118271 sshd[1298]: pam_unix(sshd:session): session closed for user core Oct 31 00:56:10.121925 systemd[1]: sshd@2-10.0.0.104:22-10.0.0.1:59434.service: Deactivated successfully. Oct 31 00:56:10.122546 systemd[1]: session-3.scope: Deactivated successfully. Oct 31 00:56:10.123076 systemd-logind[1201]: Session 3 logged out. Waiting for processes to exit. Oct 31 00:56:10.124249 systemd[1]: Started sshd@3-10.0.0.104:22-10.0.0.1:59436.service. Oct 31 00:56:10.124950 systemd-logind[1201]: Removed session 3. Oct 31 00:56:10.161480 sshd[1304]: Accepted publickey for core from 10.0.0.1 port 59436 ssh2: RSA SHA256:U8uh4tNlAoztP9XwPhxxRCHpcOqZ9ym/JukaPHih73U Oct 31 00:56:10.162760 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 00:56:10.166331 systemd-logind[1201]: New session 4 of user core. Oct 31 00:56:10.167240 systemd[1]: Started session-4.scope. Oct 31 00:56:10.221600 sshd[1304]: pam_unix(sshd:session): session closed for user core Oct 31 00:56:10.225123 systemd[1]: sshd@3-10.0.0.104:22-10.0.0.1:59436.service: Deactivated successfully. Oct 31 00:56:10.225737 systemd[1]: session-4.scope: Deactivated successfully. Oct 31 00:56:10.226643 systemd-logind[1201]: Session 4 logged out. Waiting for processes to exit. Oct 31 00:56:10.227395 systemd[1]: Started sshd@4-10.0.0.104:22-10.0.0.1:59446.service. Oct 31 00:56:10.228147 systemd-logind[1201]: Removed session 4. Oct 31 00:56:10.265264 sshd[1310]: Accepted publickey for core from 10.0.0.1 port 59446 ssh2: RSA SHA256:U8uh4tNlAoztP9XwPhxxRCHpcOqZ9ym/JukaPHih73U Oct 31 00:56:10.266504 sshd[1310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 00:56:10.270374 systemd-logind[1201]: New session 5 of user core. Oct 31 00:56:10.270837 systemd[1]: Started session-5.scope. Oct 31 00:56:10.328461 sudo[1313]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 31 00:56:10.328706 sudo[1313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 00:56:10.341243 dbus-daemon[1193]: avc: received setenforce notice (enforcing=1) Oct 31 00:56:10.342013 sudo[1313]: pam_unix(sudo:session): session closed for user root Oct 31 00:56:10.344148 sshd[1310]: pam_unix(sshd:session): session closed for user core Oct 31 00:56:10.347134 systemd[1]: sshd@4-10.0.0.104:22-10.0.0.1:59446.service: Deactivated successfully. Oct 31 00:56:10.347738 systemd[1]: session-5.scope: Deactivated successfully. Oct 31 00:56:10.348338 systemd-logind[1201]: Session 5 logged out. Waiting for processes to exit. Oct 31 00:56:10.349553 systemd[1]: Started sshd@5-10.0.0.104:22-10.0.0.1:59454.service. Oct 31 00:56:10.350206 systemd-logind[1201]: Removed session 5. Oct 31 00:56:10.387410 sshd[1317]: Accepted publickey for core from 10.0.0.1 port 59454 ssh2: RSA SHA256:U8uh4tNlAoztP9XwPhxxRCHpcOqZ9ym/JukaPHih73U Oct 31 00:56:10.388772 sshd[1317]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 00:56:10.392411 systemd-logind[1201]: New session 6 of user core. Oct 31 00:56:10.393316 systemd[1]: Started session-6.scope. Oct 31 00:56:10.446373 sudo[1321]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 31 00:56:10.446618 sudo[1321]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 00:56:10.449215 sudo[1321]: pam_unix(sudo:session): session closed for user root Oct 31 00:56:10.453981 sudo[1320]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 31 00:56:10.454234 sudo[1320]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 00:56:10.463349 systemd[1]: Stopping audit-rules.service... Oct 31 00:56:10.463000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 00:56:10.465284 kernel: kauditd_printk_skb: 117 callbacks suppressed Oct 31 00:56:10.465329 kernel: audit: type=1305 audit(1761872170.463:207): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 00:56:10.465580 auditctl[1324]: No rules Oct 31 00:56:10.465791 systemd[1]: audit-rules.service: Deactivated successfully. Oct 31 00:56:10.465956 systemd[1]: Stopped audit-rules.service. Oct 31 00:56:10.463000 audit[1324]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffff46eb00 a2=420 a3=0 items=0 ppid=1 pid=1324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:10.467529 systemd[1]: Starting audit-rules.service... Oct 31 00:56:10.471071 kernel: audit: type=1300 audit(1761872170.463:207): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffff46eb00 a2=420 a3=0 items=0 ppid=1 pid=1324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:10.471136 kernel: audit: type=1327 audit(1761872170.463:207): proctitle=2F7362696E2F617564697463746C002D44 Oct 31 00:56:10.463000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 31 00:56:10.474805 kernel: audit: type=1131 audit(1761872170.464:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:10.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:10.486732 augenrules[1341]: No rules Oct 31 00:56:10.487431 systemd[1]: Finished audit-rules.service. Oct 31 00:56:10.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:10.488301 sudo[1320]: pam_unix(sudo:session): session closed for user root Oct 31 00:56:10.487000 audit[1320]: USER_END pid=1320 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 00:56:10.493917 kernel: audit: type=1130 audit(1761872170.486:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:10.493961 kernel: audit: type=1106 audit(1761872170.487:210): pid=1320 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 00:56:10.487000 audit[1320]: CRED_DISP pid=1320 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 00:56:10.494433 sshd[1317]: pam_unix(sshd:session): session closed for user core Oct 31 00:56:10.497073 kernel: audit: type=1104 audit(1761872170.487:211): pid=1320 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 00:56:10.497128 kernel: audit: type=1106 audit(1761872170.494:212): pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 00:56:10.494000 audit[1317]: USER_END pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 00:56:10.497783 systemd[1]: sshd@5-10.0.0.104:22-10.0.0.1:59454.service: Deactivated successfully. Oct 31 00:56:10.498426 systemd[1]: session-6.scope: Deactivated successfully. Oct 31 00:56:10.498976 systemd-logind[1201]: Session 6 logged out. Waiting for processes to exit. Oct 31 00:56:10.500225 systemd[1]: Started sshd@6-10.0.0.104:22-10.0.0.1:59470.service. Oct 31 00:56:10.501029 systemd-logind[1201]: Removed session 6. Oct 31 00:56:10.494000 audit[1317]: CRED_DISP pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 00:56:10.504042 kernel: audit: type=1104 audit(1761872170.494:213): pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 00:56:10.504099 kernel: audit: type=1131 audit(1761872170.496:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.104:22-10.0.0.1:59454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:10.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.104:22-10.0.0.1:59454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:10.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.104:22-10.0.0.1:59470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:10.537000 audit[1347]: USER_ACCT pid=1347 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 00:56:10.539219 sshd[1347]: Accepted publickey for core from 10.0.0.1 port 59470 ssh2: RSA SHA256:U8uh4tNlAoztP9XwPhxxRCHpcOqZ9ym/JukaPHih73U Oct 31 00:56:10.539000 audit[1347]: CRED_ACQ pid=1347 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 00:56:10.539000 audit[1347]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed8abe50 a2=3 a3=1 items=0 ppid=1 pid=1347 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:10.539000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 00:56:10.540431 sshd[1347]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 00:56:10.543808 systemd-logind[1201]: New session 7 of user core. Oct 31 00:56:10.544725 systemd[1]: Started session-7.scope. Oct 31 00:56:10.546000 audit[1347]: USER_START pid=1347 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 00:56:10.548000 audit[1349]: CRED_ACQ pid=1349 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 00:56:10.595000 audit[1350]: USER_ACCT pid=1350 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 00:56:10.595000 audit[1350]: CRED_REFR pid=1350 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 00:56:10.596790 sudo[1350]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 31 00:56:10.597007 sudo[1350]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 00:56:10.597000 audit[1350]: USER_START pid=1350 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 00:56:10.609373 systemd[1]: Starting coreos-metadata.service... Oct 31 00:56:10.615851 systemd[1]: coreos-metadata.service: Deactivated successfully. Oct 31 00:56:10.616031 systemd[1]: Finished coreos-metadata.service. Oct 31 00:56:10.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:10.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:11.048450 systemd[1]: Stopped kubelet.service. Oct 31 00:56:11.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:11.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:11.051401 systemd[1]: Starting kubelet.service... Oct 31 00:56:11.078442 systemd[1]: Reloading. Oct 31 00:56:11.137247 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-10-31T00:56:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 00:56:11.137280 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-10-31T00:56:11Z" level=info msg="torcx already run" Oct 31 00:56:11.311442 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 00:56:11.311472 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 00:56:11.329377 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit: BPF prog-id=46 op=LOAD Oct 31 00:56:11.386000 audit: BPF prog-id=30 op=UNLOAD Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit: BPF prog-id=47 op=LOAD Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.386000 audit: BPF prog-id=48 op=LOAD Oct 31 00:56:11.386000 audit: BPF prog-id=31 op=UNLOAD Oct 31 00:56:11.386000 audit: BPF prog-id=32 op=UNLOAD Oct 31 00:56:11.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.387000 audit: BPF prog-id=49 op=LOAD Oct 31 00:56:11.387000 audit: BPF prog-id=40 op=UNLOAD Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit: BPF prog-id=50 op=LOAD Oct 31 00:56:11.389000 audit: BPF prog-id=44 op=UNLOAD Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit: BPF prog-id=51 op=LOAD Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.389000 audit: BPF prog-id=52 op=LOAD Oct 31 00:56:11.389000 audit: BPF prog-id=33 op=UNLOAD Oct 31 00:56:11.389000 audit: BPF prog-id=34 op=UNLOAD Oct 31 00:56:11.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit: BPF prog-id=53 op=LOAD Oct 31 00:56:11.391000 audit: BPF prog-id=35 op=UNLOAD Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit: BPF prog-id=54 op=LOAD Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit: BPF prog-id=55 op=LOAD Oct 31 00:56:11.391000 audit: BPF prog-id=36 op=UNLOAD Oct 31 00:56:11.391000 audit: BPF prog-id=37 op=UNLOAD Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.392000 audit: BPF prog-id=56 op=LOAD Oct 31 00:56:11.392000 audit: BPF prog-id=39 op=UNLOAD Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit: BPF prog-id=57 op=LOAD Oct 31 00:56:11.393000 audit: BPF prog-id=41 op=UNLOAD Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit: BPF prog-id=58 op=LOAD Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.393000 audit: BPF prog-id=59 op=LOAD Oct 31 00:56:11.393000 audit: BPF prog-id=42 op=UNLOAD Oct 31 00:56:11.393000 audit: BPF prog-id=43 op=UNLOAD Oct 31 00:56:11.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:11.394000 audit: BPF prog-id=60 op=LOAD Oct 31 00:56:11.394000 audit: BPF prog-id=38 op=UNLOAD Oct 31 00:56:11.407609 systemd[1]: Started kubelet.service. Oct 31 00:56:11.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:11.410684 systemd[1]: Stopping kubelet.service... Oct 31 00:56:11.411384 systemd[1]: kubelet.service: Deactivated successfully. Oct 31 00:56:11.411571 systemd[1]: Stopped kubelet.service. Oct 31 00:56:11.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:11.413094 systemd[1]: Starting kubelet.service... Oct 31 00:56:11.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:11.532651 systemd[1]: Started kubelet.service. Oct 31 00:56:11.573683 kubelet[1453]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 31 00:56:11.573683 kubelet[1453]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 00:56:11.573683 kubelet[1453]: I1031 00:56:11.573657 1453 server.go:213] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 31 00:56:12.599592 kubelet[1453]: I1031 00:56:12.599546 1453 server.go:529] "Kubelet version" kubeletVersion="v1.34.1" Oct 31 00:56:12.599592 kubelet[1453]: I1031 00:56:12.599578 1453 server.go:531] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 31 00:56:12.601080 kubelet[1453]: I1031 00:56:12.601046 1453 watchdog_linux.go:95] "Systemd watchdog is not enabled" Oct 31 00:56:12.601257 kubelet[1453]: I1031 00:56:12.601244 1453 watchdog_linux.go:137] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 31 00:56:12.601509 kubelet[1453]: I1031 00:56:12.601488 1453 server.go:956] "Client rotation is on, will bootstrap in background" Oct 31 00:56:12.605404 kubelet[1453]: I1031 00:56:12.605384 1453 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 31 00:56:12.608012 kubelet[1453]: E1031 00:56:12.607976 1453 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 31 00:56:12.608197 kubelet[1453]: I1031 00:56:12.608177 1453 server.go:1400] "CRI implementation should be updated to support RuntimeConfig. Falling back to using cgroupDriver from kubelet config." Oct 31 00:56:12.611010 kubelet[1453]: I1031 00:56:12.610982 1453 server.go:781] "--cgroups-per-qos enabled, but --cgroup-root was not specified. Defaulting to /" Oct 31 00:56:12.611574 kubelet[1453]: I1031 00:56:12.611534 1453 container_manager_linux.go:270] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 31 00:56:12.611792 kubelet[1453]: I1031 00:56:12.611646 1453 container_manager_linux.go:275] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.104","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 31 00:56:12.611934 kubelet[1453]: I1031 00:56:12.611919 1453 topology_manager.go:138] "Creating topology manager with none policy" Oct 31 00:56:12.611993 kubelet[1453]: I1031 00:56:12.611983 1453 container_manager_linux.go:306] "Creating device plugin manager" Oct 31 00:56:12.612155 kubelet[1453]: I1031 00:56:12.612140 1453 container_manager_linux.go:315] "Creating Dynamic Resource Allocation (DRA) manager" Oct 31 00:56:12.688598 kubelet[1453]: I1031 00:56:12.688556 1453 state_mem.go:36] "Initialized new in-memory state store" Oct 31 00:56:12.692084 kubelet[1453]: I1031 00:56:12.692038 1453 kubelet.go:475] "Attempting to sync node with API server" Oct 31 00:56:12.692227 kubelet[1453]: I1031 00:56:12.692213 1453 kubelet.go:376] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 31 00:56:12.692315 kubelet[1453]: I1031 00:56:12.692303 1453 kubelet.go:387] "Adding apiserver pod source" Oct 31 00:56:12.692380 kubelet[1453]: I1031 00:56:12.692370 1453 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 31 00:56:12.692609 kubelet[1453]: E1031 00:56:12.692389 1453 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:12.692609 kubelet[1453]: E1031 00:56:12.692421 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:12.693938 kubelet[1453]: I1031 00:56:12.693914 1453 kuberuntime_manager.go:291] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 31 00:56:12.694658 kubelet[1453]: I1031 00:56:12.694622 1453 kubelet.go:940] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Oct 31 00:56:12.694658 kubelet[1453]: I1031 00:56:12.694660 1453 kubelet.go:964] "Not starting PodCertificateRequest manager because we are in static kubelet mode or the PodCertificateProjection feature gate is disabled" Oct 31 00:56:12.694743 kubelet[1453]: W1031 00:56:12.694693 1453 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 31 00:56:12.697880 kubelet[1453]: I1031 00:56:12.697765 1453 server.go:1262] "Started kubelet" Oct 31 00:56:12.702469 kubelet[1453]: I1031 00:56:12.702416 1453 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Oct 31 00:56:12.701000 audit[1453]: AVC avc: denied { mac_admin } for pid=1453 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:12.701000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 00:56:12.701000 audit[1453]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40002d2240 a1=400052b110 a2=40002d2210 a3=25 items=0 ppid=1 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:12.701000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 00:56:12.702803 kubelet[1453]: I1031 00:56:12.702417 1453 ratelimit.go:56] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 31 00:56:12.702898 kubelet[1453]: I1031 00:56:12.702880 1453 server_v1.go:49] "podresources" method="list" useActivePods=true Oct 31 00:56:12.703515 kubelet[1453]: I1031 00:56:12.703464 1453 server.go:249] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 31 00:56:12.703645 kubelet[1453]: I1031 00:56:12.702622 1453 kubelet.go:1567] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 31 00:56:12.702000 audit[1453]: AVC avc: denied { mac_admin } for pid=1453 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:12.703751 kubelet[1453]: I1031 00:56:12.703738 1453 server.go:310] "Adding debug handlers to kubelet server" Oct 31 00:56:12.702000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 00:56:12.702000 audit[1453]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400052c680 a1=40009ae060 a2=40008f2330 a3=25 items=0 ppid=1 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:12.704447 kubelet[1453]: E1031 00:56:12.704424 1453 kubelet.go:1615] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 31 00:56:12.702000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 00:56:12.704820 kubelet[1453]: I1031 00:56:12.704800 1453 kubelet.go:1571] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 31 00:56:12.705171 kubelet[1453]: I1031 00:56:12.705148 1453 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 31 00:56:12.705405 kubelet[1453]: I1031 00:56:12.705277 1453 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 31 00:56:12.706776 kubelet[1453]: I1031 00:56:12.706746 1453 volume_manager.go:313] "Starting Kubelet Volume Manager" Oct 31 00:56:12.707184 kubelet[1453]: I1031 00:56:12.707113 1453 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Oct 31 00:56:12.707428 kubelet[1453]: E1031 00:56:12.707373 1453 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"10.0.0.104\" not found" Oct 31 00:56:12.707547 kubelet[1453]: I1031 00:56:12.707515 1453 factory.go:223] Registration of the systemd container factory successfully Oct 31 00:56:12.707670 kubelet[1453]: I1031 00:56:12.707630 1453 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 31 00:56:12.707747 kubelet[1453]: I1031 00:56:12.707728 1453 reconciler.go:29] "Reconciler: start to sync state" Oct 31 00:56:12.710562 kubelet[1453]: I1031 00:56:12.710540 1453 factory.go:223] Registration of the containerd container factory successfully Oct 31 00:56:12.710969 kubelet[1453]: E1031 00:56:12.710926 1453 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.104\" not found" node="10.0.0.104" Oct 31 00:56:12.720315 kubelet[1453]: I1031 00:56:12.720264 1453 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 31 00:56:12.720315 kubelet[1453]: I1031 00:56:12.720305 1453 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 31 00:56:12.720416 kubelet[1453]: I1031 00:56:12.720327 1453 state_mem.go:36] "Initialized new in-memory state store" Oct 31 00:56:12.721957 kubelet[1453]: I1031 00:56:12.721930 1453 policy_none.go:49] "None policy: Start" Oct 31 00:56:12.721957 kubelet[1453]: I1031 00:56:12.721954 1453 memory_manager.go:187] "Starting memorymanager" policy="None" Oct 31 00:56:12.722065 kubelet[1453]: I1031 00:56:12.721965 1453 state_mem.go:36] "Initializing new in-memory state store" logger="Memory Manager state checkpoint" Oct 31 00:56:12.725394 kubelet[1453]: I1031 00:56:12.725227 1453 policy_none.go:47] "Start" Oct 31 00:56:12.729623 systemd[1]: Created slice kubepods.slice. Oct 31 00:56:12.736103 systemd[1]: Created slice kubepods-burstable.slice. Oct 31 00:56:12.738832 systemd[1]: Created slice kubepods-besteffort.slice. Oct 31 00:56:12.741000 audit[1477]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:12.741000 audit[1477]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff4d2c220 a2=0 a3=1 items=0 ppid=1453 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:12.741000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 00:56:12.742000 audit[1478]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:12.742000 audit[1478]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffe5227870 a2=0 a3=1 items=0 ppid=1453 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:12.742000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 00:56:12.750871 kubelet[1453]: E1031 00:56:12.750838 1453 manager.go:513] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Oct 31 00:56:12.749000 audit[1453]: AVC avc: denied { mac_admin } for pid=1453 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:12.749000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 00:56:12.749000 audit[1453]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d55b30 a1=4000d6d188 a2=4000d55b00 a3=25 items=0 ppid=1 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:12.749000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 00:56:12.751107 kubelet[1453]: E1031 00:56:12.750916 1453 server.go:96] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Oct 31 00:56:12.751322 kubelet[1453]: I1031 00:56:12.751279 1453 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 31 00:56:12.751358 kubelet[1453]: I1031 00:56:12.751312 1453 container_log_manager.go:146] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 31 00:56:12.752355 kubelet[1453]: I1031 00:56:12.752320 1453 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 31 00:56:12.752790 kubelet[1453]: E1031 00:56:12.752758 1453 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 31 00:56:12.752839 kubelet[1453]: E1031 00:56:12.752799 1453 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.104\" not found" Oct 31 00:56:12.744000 audit[1480]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:12.744000 audit[1480]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffec019770 a2=0 a3=1 items=0 ppid=1453 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:12.744000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 00:56:12.763000 audit[1485]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:12.763000 audit[1485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe2936100 a2=0 a3=1 items=0 ppid=1453 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:12.763000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 00:56:12.794000 audit[1490]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1490 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:12.794000 audit[1490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffeb514150 a2=0 a3=1 items=0 ppid=1453 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:12.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F380000002D2D737263003132372E Oct 31 00:56:12.796524 kubelet[1453]: I1031 00:56:12.796484 1453 kubelet_network_linux.go:54] "Initialized iptables rules." protocol="IPv4" Oct 31 00:56:12.796000 audit[1491]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:12.796000 audit[1491]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc4c4d210 a2=0 a3=1 items=0 ppid=1453 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:12.796000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 00:56:12.796000 audit[1492]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1492 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:12.796000 audit[1492]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff5937fb0 a2=0 a3=1 items=0 ppid=1453 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:12.796000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 00:56:12.797657 kubelet[1453]: I1031 00:56:12.797636 1453 kubelet_network_linux.go:54] "Initialized iptables rules." protocol="IPv6" Oct 31 00:56:12.797689 kubelet[1453]: I1031 00:56:12.797664 1453 status_manager.go:244] "Starting to sync pod status with apiserver" Oct 31 00:56:12.797689 kubelet[1453]: I1031 00:56:12.797688 1453 kubelet.go:2427] "Starting kubelet main sync loop" Oct 31 00:56:12.797814 kubelet[1453]: E1031 00:56:12.797790 1453 kubelet.go:2451] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 31 00:56:12.797000 audit[1494]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:12.797000 audit[1494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff3aaa2f0 a2=0 a3=1 items=0 ppid=1453 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:12.797000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 00:56:12.798000 audit[1493]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1493 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:12.798000 audit[1493]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc7998740 a2=0 a3=1 items=0 ppid=1453 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:12.798000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 00:56:12.798000 audit[1495]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1495 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:12.798000 audit[1495]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff565a680 a2=0 a3=1 items=0 ppid=1453 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:12.798000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 00:56:12.799000 audit[1496]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1496 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:12.799000 audit[1496]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff5cee110 a2=0 a3=1 items=0 ppid=1453 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:12.799000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 00:56:12.800000 audit[1497]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1497 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:12.800000 audit[1497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffed1c61d0 a2=0 a3=1 items=0 ppid=1453 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:12.800000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 00:56:12.853394 kubelet[1453]: I1031 00:56:12.852704 1453 kubelet_node_status.go:75] "Attempting to register node" node="10.0.0.104" Oct 31 00:56:12.860581 kubelet[1453]: I1031 00:56:12.860540 1453 kubelet_node_status.go:78] "Successfully registered node" node="10.0.0.104" Oct 31 00:56:12.967646 kubelet[1453]: I1031 00:56:12.967608 1453 kuberuntime_manager.go:1828] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Oct 31 00:56:12.967938 env[1217]: time="2025-10-31T00:56:12.967899078Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 31 00:56:12.968215 kubelet[1453]: I1031 00:56:12.968091 1453 kubelet_network.go:47] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Oct 31 00:56:13.053524 sudo[1350]: pam_unix(sudo:session): session closed for user root Oct 31 00:56:13.052000 audit[1350]: USER_END pid=1350 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 00:56:13.052000 audit[1350]: CRED_DISP pid=1350 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 00:56:13.055008 sshd[1347]: pam_unix(sshd:session): session closed for user core Oct 31 00:56:13.054000 audit[1347]: USER_END pid=1347 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 00:56:13.054000 audit[1347]: CRED_DISP pid=1347 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 00:56:13.057767 systemd-logind[1201]: Session 7 logged out. Waiting for processes to exit. Oct 31 00:56:13.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.104:22-10.0.0.1:59470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 00:56:13.057937 systemd[1]: sshd@6-10.0.0.104:22-10.0.0.1:59470.service: Deactivated successfully. Oct 31 00:56:13.058627 systemd[1]: session-7.scope: Deactivated successfully. Oct 31 00:56:13.059280 systemd-logind[1201]: Removed session 7. Oct 31 00:56:13.603110 kubelet[1453]: I1031 00:56:13.603075 1453 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Oct 31 00:56:13.603548 kubelet[1453]: I1031 00:56:13.603429 1453 reflector.go:568] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Oct 31 00:56:13.603548 kubelet[1453]: I1031 00:56:13.603502 1453 reflector.go:568] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Oct 31 00:56:13.603548 kubelet[1453]: I1031 00:56:13.603517 1453 reflector.go:568] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Oct 31 00:56:13.693272 kubelet[1453]: I1031 00:56:13.693242 1453 apiserver.go:52] "Watching apiserver" Oct 31 00:56:13.693430 kubelet[1453]: E1031 00:56:13.693393 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:13.699299 kubelet[1453]: E1031 00:56:13.699261 1453 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-25rs6" podUID="d345c4a0-4f61-44c8-b9e5-8260eebc6222" Oct 31 00:56:13.702252 systemd[1]: Created slice kubepods-besteffort-pod9bf73431_9f4a_4864_a468_bbb4d0f6fdf1.slice. Oct 31 00:56:13.707618 kubelet[1453]: I1031 00:56:13.707590 1453 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Oct 31 00:56:13.711973 kubelet[1453]: I1031 00:56:13.711943 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e8294d56-2155-4802-8fdd-de392a06928c-lib-modules\") pod \"kube-proxy-47gw8\" (UID: \"e8294d56-2155-4802-8fdd-de392a06928c\") " pod="kube-system/kube-proxy-47gw8" Oct 31 00:56:13.712037 kubelet[1453]: I1031 00:56:13.711982 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qhm84\" (UniqueName: \"kubernetes.io/projected/e8294d56-2155-4802-8fdd-de392a06928c-kube-api-access-qhm84\") pod \"kube-proxy-47gw8\" (UID: \"e8294d56-2155-4802-8fdd-de392a06928c\") " pod="kube-system/kube-proxy-47gw8" Oct 31 00:56:13.712037 kubelet[1453]: I1031 00:56:13.712001 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9bf73431-9f4a-4864-a468-bbb4d0f6fdf1-cni-net-dir\") pod \"calico-node-zr4fw\" (UID: \"9bf73431-9f4a-4864-a468-bbb4d0f6fdf1\") " pod="calico-system/calico-node-zr4fw" Oct 31 00:56:13.712123 kubelet[1453]: I1031 00:56:13.712046 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9bf73431-9f4a-4864-a468-bbb4d0f6fdf1-flexvol-driver-host\") pod \"calico-node-zr4fw\" (UID: \"9bf73431-9f4a-4864-a468-bbb4d0f6fdf1\") " pod="calico-system/calico-node-zr4fw" Oct 31 00:56:13.712123 kubelet[1453]: I1031 00:56:13.712096 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/d345c4a0-4f61-44c8-b9e5-8260eebc6222-registration-dir\") pod \"csi-node-driver-25rs6\" (UID: \"d345c4a0-4f61-44c8-b9e5-8260eebc6222\") " pod="calico-system/csi-node-driver-25rs6" Oct 31 00:56:13.712123 kubelet[1453]: I1031 00:56:13.712119 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-677wm\" (UniqueName: \"kubernetes.io/projected/d345c4a0-4f61-44c8-b9e5-8260eebc6222-kube-api-access-677wm\") pod \"csi-node-driver-25rs6\" (UID: \"d345c4a0-4f61-44c8-b9e5-8260eebc6222\") " pod="calico-system/csi-node-driver-25rs6" Oct 31 00:56:13.712187 kubelet[1453]: I1031 00:56:13.712136 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9bf73431-9f4a-4864-a468-bbb4d0f6fdf1-cni-log-dir\") pod \"calico-node-zr4fw\" (UID: \"9bf73431-9f4a-4864-a468-bbb4d0f6fdf1\") " pod="calico-system/calico-node-zr4fw" Oct 31 00:56:13.712187 kubelet[1453]: I1031 00:56:13.712166 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cwgrr\" (UniqueName: \"kubernetes.io/projected/9bf73431-9f4a-4864-a468-bbb4d0f6fdf1-kube-api-access-cwgrr\") pod \"calico-node-zr4fw\" (UID: \"9bf73431-9f4a-4864-a468-bbb4d0f6fdf1\") " pod="calico-system/calico-node-zr4fw" Oct 31 00:56:13.712187 kubelet[1453]: I1031 00:56:13.712185 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9bf73431-9f4a-4864-a468-bbb4d0f6fdf1-lib-modules\") pod \"calico-node-zr4fw\" (UID: \"9bf73431-9f4a-4864-a468-bbb4d0f6fdf1\") " pod="calico-system/calico-node-zr4fw" Oct 31 00:56:13.712248 kubelet[1453]: I1031 00:56:13.712199 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9bf73431-9f4a-4864-a468-bbb4d0f6fdf1-node-certs\") pod \"calico-node-zr4fw\" (UID: \"9bf73431-9f4a-4864-a468-bbb4d0f6fdf1\") " pod="calico-system/calico-node-zr4fw" Oct 31 00:56:13.712248 kubelet[1453]: I1031 00:56:13.712212 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9bf73431-9f4a-4864-a468-bbb4d0f6fdf1-policysync\") pod \"calico-node-zr4fw\" (UID: \"9bf73431-9f4a-4864-a468-bbb4d0f6fdf1\") " pod="calico-system/calico-node-zr4fw" Oct 31 00:56:13.712248 kubelet[1453]: I1031 00:56:13.712227 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9bf73431-9f4a-4864-a468-bbb4d0f6fdf1-var-lib-calico\") pod \"calico-node-zr4fw\" (UID: \"9bf73431-9f4a-4864-a468-bbb4d0f6fdf1\") " pod="calico-system/calico-node-zr4fw" Oct 31 00:56:13.712248 kubelet[1453]: I1031 00:56:13.712243 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9bf73431-9f4a-4864-a468-bbb4d0f6fdf1-xtables-lock\") pod \"calico-node-zr4fw\" (UID: \"9bf73431-9f4a-4864-a468-bbb4d0f6fdf1\") " pod="calico-system/calico-node-zr4fw" Oct 31 00:56:13.712327 kubelet[1453]: I1031 00:56:13.712262 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/d345c4a0-4f61-44c8-b9e5-8260eebc6222-socket-dir\") pod \"csi-node-driver-25rs6\" (UID: \"d345c4a0-4f61-44c8-b9e5-8260eebc6222\") " pod="calico-system/csi-node-driver-25rs6" Oct 31 00:56:13.712327 kubelet[1453]: I1031 00:56:13.712280 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e8294d56-2155-4802-8fdd-de392a06928c-kube-proxy\") pod \"kube-proxy-47gw8\" (UID: \"e8294d56-2155-4802-8fdd-de392a06928c\") " pod="kube-system/kube-proxy-47gw8" Oct 31 00:56:13.712327 kubelet[1453]: I1031 00:56:13.712292 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e8294d56-2155-4802-8fdd-de392a06928c-xtables-lock\") pod \"kube-proxy-47gw8\" (UID: \"e8294d56-2155-4802-8fdd-de392a06928c\") " pod="kube-system/kube-proxy-47gw8" Oct 31 00:56:13.712327 kubelet[1453]: I1031 00:56:13.712306 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9bf73431-9f4a-4864-a468-bbb4d0f6fdf1-cni-bin-dir\") pod \"calico-node-zr4fw\" (UID: \"9bf73431-9f4a-4864-a468-bbb4d0f6fdf1\") " pod="calico-system/calico-node-zr4fw" Oct 31 00:56:13.712327 kubelet[1453]: I1031 00:56:13.712323 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9bf73431-9f4a-4864-a468-bbb4d0f6fdf1-tigera-ca-bundle\") pod \"calico-node-zr4fw\" (UID: \"9bf73431-9f4a-4864-a468-bbb4d0f6fdf1\") " pod="calico-system/calico-node-zr4fw" Oct 31 00:56:13.712469 kubelet[1453]: I1031 00:56:13.712343 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9bf73431-9f4a-4864-a468-bbb4d0f6fdf1-var-run-calico\") pod \"calico-node-zr4fw\" (UID: \"9bf73431-9f4a-4864-a468-bbb4d0f6fdf1\") " pod="calico-system/calico-node-zr4fw" Oct 31 00:56:13.712469 kubelet[1453]: I1031 00:56:13.712365 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/d345c4a0-4f61-44c8-b9e5-8260eebc6222-kubelet-dir\") pod \"csi-node-driver-25rs6\" (UID: \"d345c4a0-4f61-44c8-b9e5-8260eebc6222\") " pod="calico-system/csi-node-driver-25rs6" Oct 31 00:56:13.712469 kubelet[1453]: I1031 00:56:13.712391 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/d345c4a0-4f61-44c8-b9e5-8260eebc6222-varrun\") pod \"csi-node-driver-25rs6\" (UID: \"d345c4a0-4f61-44c8-b9e5-8260eebc6222\") " pod="calico-system/csi-node-driver-25rs6" Oct 31 00:56:13.714404 systemd[1]: Created slice kubepods-besteffort-pode8294d56_2155_4802_8fdd_de392a06928c.slice. Oct 31 00:56:13.814112 kubelet[1453]: I1031 00:56:13.814033 1453 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Oct 31 00:56:13.815370 kubelet[1453]: E1031 00:56:13.815333 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:13.815370 kubelet[1453]: W1031 00:56:13.815359 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:13.815370 kubelet[1453]: E1031 00:56:13.815377 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:13.815606 kubelet[1453]: E1031 00:56:13.815585 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:13.815606 kubelet[1453]: W1031 00:56:13.815600 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:13.815678 kubelet[1453]: E1031 00:56:13.815616 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:13.815785 kubelet[1453]: E1031 00:56:13.815766 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:13.815785 kubelet[1453]: W1031 00:56:13.815784 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:13.815840 kubelet[1453]: E1031 00:56:13.815797 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:13.815941 kubelet[1453]: E1031 00:56:13.815920 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:13.815941 kubelet[1453]: W1031 00:56:13.815936 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:13.815997 kubelet[1453]: E1031 00:56:13.815944 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:13.816143 kubelet[1453]: E1031 00:56:13.816124 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:13.816184 kubelet[1453]: W1031 00:56:13.816145 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:13.816184 kubelet[1453]: E1031 00:56:13.816155 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:13.816344 kubelet[1453]: E1031 00:56:13.816325 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:13.816344 kubelet[1453]: W1031 00:56:13.816338 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:13.816409 kubelet[1453]: E1031 00:56:13.816349 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:13.816564 kubelet[1453]: E1031 00:56:13.816512 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:13.818871 kubelet[1453]: W1031 00:56:13.816591 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:13.818871 kubelet[1453]: E1031 00:56:13.816608 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:13.818871 kubelet[1453]: E1031 00:56:13.816892 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:13.818871 kubelet[1453]: W1031 00:56:13.816902 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:13.818871 kubelet[1453]: E1031 00:56:13.816913 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:13.818871 kubelet[1453]: E1031 00:56:13.817095 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:13.818871 kubelet[1453]: W1031 00:56:13.817103 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:13.818871 kubelet[1453]: E1031 00:56:13.817111 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:13.819080 kubelet[1453]: E1031 00:56:13.818934 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:13.819080 kubelet[1453]: W1031 00:56:13.818947 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:13.819080 kubelet[1453]: E1031 00:56:13.818960 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:13.819227 kubelet[1453]: E1031 00:56:13.819214 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:13.819227 kubelet[1453]: W1031 00:56:13.819227 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:13.819307 kubelet[1453]: E1031 00:56:13.819237 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:13.820269 kubelet[1453]: E1031 00:56:13.819398 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:13.820269 kubelet[1453]: W1031 00:56:13.819409 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:13.820269 kubelet[1453]: E1031 00:56:13.819417 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:13.826880 kubelet[1453]: E1031 00:56:13.826858 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:13.826880 kubelet[1453]: W1031 00:56:13.826875 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:13.826993 kubelet[1453]: E1031 00:56:13.826888 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:13.833641 kubelet[1453]: E1031 00:56:13.833609 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:13.833641 kubelet[1453]: W1031 00:56:13.833626 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:13.833641 kubelet[1453]: E1031 00:56:13.833639 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:13.834202 kubelet[1453]: E1031 00:56:13.834184 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:13.834297 kubelet[1453]: W1031 00:56:13.834283 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:13.834393 kubelet[1453]: E1031 00:56:13.834379 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:14.014621 kubelet[1453]: E1031 00:56:14.014513 1453 dns.go:154] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 00:56:14.016374 env[1217]: time="2025-10-31T00:56:14.016035918Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zr4fw,Uid:9bf73431-9f4a-4864-a468-bbb4d0f6fdf1,Namespace:calico-system,Attempt:0,}" Oct 31 00:56:14.019625 kubelet[1453]: E1031 00:56:14.019601 1453 dns.go:154] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 00:56:14.020267 env[1217]: time="2025-10-31T00:56:14.019968998Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-47gw8,Uid:e8294d56-2155-4802-8fdd-de392a06928c,Namespace:kube-system,Attempt:0,}" Oct 31 00:56:14.537749 env[1217]: time="2025-10-31T00:56:14.537706878Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:14.541535 env[1217]: time="2025-10-31T00:56:14.541498998Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:14.542646 env[1217]: time="2025-10-31T00:56:14.542615358Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:14.544363 env[1217]: time="2025-10-31T00:56:14.544337838Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:14.546802 env[1217]: time="2025-10-31T00:56:14.546772838Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:14.547690 env[1217]: time="2025-10-31T00:56:14.547660958Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:14.550248 env[1217]: time="2025-10-31T00:56:14.550216078Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:14.551980 env[1217]: time="2025-10-31T00:56:14.551952438Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:14.569711 env[1217]: time="2025-10-31T00:56:14.569620638Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 00:56:14.569711 env[1217]: time="2025-10-31T00:56:14.569662918Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 00:56:14.569711 env[1217]: time="2025-10-31T00:56:14.569673758Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 00:56:14.569946 env[1217]: time="2025-10-31T00:56:14.569903318Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/078798d88335c75b5ad5ef820c615a482b82309b5b394fc5a93913381c3562bf pid=1535 runtime=io.containerd.runc.v2 Oct 31 00:56:14.569992 env[1217]: time="2025-10-31T00:56:14.569915918Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 00:56:14.570020 env[1217]: time="2025-10-31T00:56:14.569993318Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 00:56:14.570046 env[1217]: time="2025-10-31T00:56:14.570019518Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 00:56:14.571096 env[1217]: time="2025-10-31T00:56:14.570199798Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/707020056bdf3e777eed1ab177fa496eb616e6849cdacde31b60f61978e07457 pid=1536 runtime=io.containerd.runc.v2 Oct 31 00:56:14.587188 systemd[1]: Started cri-containerd-078798d88335c75b5ad5ef820c615a482b82309b5b394fc5a93913381c3562bf.scope. Oct 31 00:56:14.588220 systemd[1]: Started cri-containerd-707020056bdf3e777eed1ab177fa496eb616e6849cdacde31b60f61978e07457.scope. Oct 31 00:56:14.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit: BPF prog-id=61 op=LOAD Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1536 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:14.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730373032303035366264663365373737656564316162313737666134 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1536 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:14.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730373032303035366264663365373737656564316162313737666134 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit: BPF prog-id=62 op=LOAD Oct 31 00:56:14.603000 audit[1555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1536 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:14.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730373032303035366264663365373737656564316162313737666134 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.603000 audit: BPF prog-id=63 op=LOAD Oct 31 00:56:14.603000 audit[1555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1536 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:14.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730373032303035366264663365373737656564316162313737666134 Oct 31 00:56:14.603000 audit: BPF prog-id=63 op=UNLOAD Oct 31 00:56:14.604000 audit: BPF prog-id=62 op=UNLOAD Oct 31 00:56:14.604000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.604000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.604000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.604000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.604000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.604000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.604000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.604000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.604000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.604000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.604000 audit: BPF prog-id=64 op=LOAD Oct 31 00:56:14.604000 audit[1555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1536 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:14.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730373032303035366264663365373737656564316162313737666134 Oct 31 00:56:14.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.605000 audit: BPF prog-id=65 op=LOAD Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1535 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:14.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037383739386438383333356337356235616435656638323063363135 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1535 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:14.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037383739386438383333356337356235616435656638323063363135 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit: BPF prog-id=66 op=LOAD Oct 31 00:56:14.606000 audit[1554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1535 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:14.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037383739386438383333356337356235616435656638323063363135 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit: BPF prog-id=67 op=LOAD Oct 31 00:56:14.606000 audit[1554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1535 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:14.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037383739386438383333356337356235616435656638323063363135 Oct 31 00:56:14.606000 audit: BPF prog-id=67 op=UNLOAD Oct 31 00:56:14.606000 audit: BPF prog-id=66 op=UNLOAD Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:14.606000 audit: BPF prog-id=68 op=LOAD Oct 31 00:56:14.606000 audit[1554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1535 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:14.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037383739386438383333356337356235616435656638323063363135 Oct 31 00:56:14.618006 env[1217]: time="2025-10-31T00:56:14.617969838Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zr4fw,Uid:9bf73431-9f4a-4864-a468-bbb4d0f6fdf1,Namespace:calico-system,Attempt:0,} returns sandbox id \"078798d88335c75b5ad5ef820c615a482b82309b5b394fc5a93913381c3562bf\"" Oct 31 00:56:14.619156 env[1217]: time="2025-10-31T00:56:14.619129078Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-47gw8,Uid:e8294d56-2155-4802-8fdd-de392a06928c,Namespace:kube-system,Attempt:0,} returns sandbox id \"707020056bdf3e777eed1ab177fa496eb616e6849cdacde31b60f61978e07457\"" Oct 31 00:56:14.619689 kubelet[1453]: E1031 00:56:14.619339 1453 dns.go:154] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 00:56:14.619689 kubelet[1453]: E1031 00:56:14.619670 1453 dns.go:154] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 00:56:14.620584 env[1217]: time="2025-10-31T00:56:14.620553478Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.34.1\"" Oct 31 00:56:14.693517 kubelet[1453]: E1031 00:56:14.693482 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:14.821102 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount906501655.mount: Deactivated successfully. Oct 31 00:56:15.654449 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount275927739.mount: Deactivated successfully. Oct 31 00:56:15.694334 kubelet[1453]: E1031 00:56:15.694296 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:15.798772 kubelet[1453]: E1031 00:56:15.798718 1453 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-25rs6" podUID="d345c4a0-4f61-44c8-b9e5-8260eebc6222" Oct 31 00:56:16.031590 env[1217]: time="2025-10-31T00:56:16.031484438Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.34.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:16.033739 env[1217]: time="2025-10-31T00:56:16.033704358Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:05baa95f5142d87797a2bc1d3d11edfb0bf0a9236d436243d15061fae8b58cb9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:16.035128 env[1217]: time="2025-10-31T00:56:16.035095998Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.34.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:16.036289 env[1217]: time="2025-10-31T00:56:16.036260398Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:913cc83ca0b5588a81d86ce8eedeb3ed1e9c1326e81852a1ea4f622b74ff749a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:16.036635 env[1217]: time="2025-10-31T00:56:16.036612318Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.34.1\" returns image reference \"sha256:05baa95f5142d87797a2bc1d3d11edfb0bf0a9236d436243d15061fae8b58cb9\"" Oct 31 00:56:16.038718 env[1217]: time="2025-10-31T00:56:16.038676838Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Oct 31 00:56:16.041744 env[1217]: time="2025-10-31T00:56:16.041705798Z" level=info msg="CreateContainer within sandbox \"707020056bdf3e777eed1ab177fa496eb616e6849cdacde31b60f61978e07457\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 31 00:56:16.053948 env[1217]: time="2025-10-31T00:56:16.053911878Z" level=info msg="CreateContainer within sandbox \"707020056bdf3e777eed1ab177fa496eb616e6849cdacde31b60f61978e07457\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3f976094cdd35dd7524271f96f0f95e166d7ed4fe3c1986caa70f9dc9d5c73a7\"" Oct 31 00:56:16.054907 env[1217]: time="2025-10-31T00:56:16.054876598Z" level=info msg="StartContainer for \"3f976094cdd35dd7524271f96f0f95e166d7ed4fe3c1986caa70f9dc9d5c73a7\"" Oct 31 00:56:16.072886 systemd[1]: run-containerd-runc-k8s.io-3f976094cdd35dd7524271f96f0f95e166d7ed4fe3c1986caa70f9dc9d5c73a7-runc.jeu0AA.mount: Deactivated successfully. Oct 31 00:56:16.074312 systemd[1]: Started cri-containerd-3f976094cdd35dd7524271f96f0f95e166d7ed4fe3c1986caa70f9dc9d5c73a7.scope. Oct 31 00:56:16.095800 kernel: kauditd_printk_skb: 357 callbacks suppressed Oct 31 00:56:16.095939 kernel: audit: type=1400 audit(1761872176.093:459): avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.093000 audit[1608]: AVC avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.093000 audit[1608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1536 pid=1608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.103254 kernel: audit: type=1300 audit(1761872176.093:459): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1536 pid=1608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.103373 kernel: audit: type=1327 audit(1761872176.093:459): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366393736303934636464333564643735323432373166393666306639 Oct 31 00:56:16.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366393736303934636464333564643735323432373166393666306639 Oct 31 00:56:16.093000 audit[1608]: AVC avc: denied { bpf } for pid=1608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.110709 kernel: audit: type=1400 audit(1761872176.093:460): avc: denied { bpf } for pid=1608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.110752 kernel: audit: type=1400 audit(1761872176.093:460): avc: denied { bpf } for pid=1608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.093000 audit[1608]: AVC avc: denied { bpf } for pid=1608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.093000 audit[1608]: AVC avc: denied { bpf } for pid=1608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.117302 kernel: audit: type=1400 audit(1761872176.093:460): avc: denied { bpf } for pid=1608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.093000 audit[1608]: AVC avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.120144 kernel: audit: type=1400 audit(1761872176.093:460): avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.120202 kernel: audit: type=1400 audit(1761872176.093:460): avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.093000 audit[1608]: AVC avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.093000 audit[1608]: AVC avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.125244 kernel: audit: type=1400 audit(1761872176.093:460): avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.125288 kernel: audit: type=1400 audit(1761872176.093:460): avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.093000 audit[1608]: AVC avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.093000 audit[1608]: AVC avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.093000 audit[1608]: AVC avc: denied { bpf } for pid=1608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.093000 audit[1608]: AVC avc: denied { bpf } for pid=1608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.093000 audit: BPF prog-id=69 op=LOAD Oct 31 00:56:16.093000 audit[1608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=1536 pid=1608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366393736303934636464333564643735323432373166393666306639 Oct 31 00:56:16.094000 audit[1608]: AVC avc: denied { bpf } for pid=1608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.094000 audit[1608]: AVC avc: denied { bpf } for pid=1608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.094000 audit[1608]: AVC avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.094000 audit[1608]: AVC avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.094000 audit[1608]: AVC avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.094000 audit[1608]: AVC avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.094000 audit[1608]: AVC avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.094000 audit[1608]: AVC avc: denied { bpf } for pid=1608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.094000 audit[1608]: AVC avc: denied { bpf } for pid=1608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.094000 audit: BPF prog-id=70 op=LOAD Oct 31 00:56:16.094000 audit[1608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=1536 pid=1608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366393736303934636464333564643735323432373166393666306639 Oct 31 00:56:16.097000 audit: BPF prog-id=70 op=UNLOAD Oct 31 00:56:16.097000 audit: BPF prog-id=69 op=UNLOAD Oct 31 00:56:16.097000 audit[1608]: AVC avc: denied { bpf } for pid=1608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.097000 audit[1608]: AVC avc: denied { bpf } for pid=1608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.097000 audit[1608]: AVC avc: denied { bpf } for pid=1608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.097000 audit[1608]: AVC avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.097000 audit[1608]: AVC avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.097000 audit[1608]: AVC avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.097000 audit[1608]: AVC avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.097000 audit[1608]: AVC avc: denied { perfmon } for pid=1608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.097000 audit[1608]: AVC avc: denied { bpf } for pid=1608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.097000 audit[1608]: AVC avc: denied { bpf } for pid=1608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:16.097000 audit: BPF prog-id=71 op=LOAD Oct 31 00:56:16.097000 audit[1608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1536 pid=1608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366393736303934636464333564643735323432373166393666306639 Oct 31 00:56:16.134497 env[1217]: time="2025-10-31T00:56:16.134443598Z" level=info msg="StartContainer for \"3f976094cdd35dd7524271f96f0f95e166d7ed4fe3c1986caa70f9dc9d5c73a7\" returns successfully" Oct 31 00:56:16.349000 audit[1673]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.349000 audit[1673]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff9340030 a2=0 a3=1 items=0 ppid=1619 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.349000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 00:56:16.350000 audit[1672]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1672 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.350000 audit[1672]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcfe892d0 a2=0 a3=1 items=0 ppid=1619 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 00:56:16.351000 audit[1675]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1675 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.351000 audit[1675]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe87b0540 a2=0 a3=1 items=0 ppid=1619 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.351000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 00:56:16.351000 audit[1676]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.351000 audit[1676]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc7edbb80 a2=0 a3=1 items=0 ppid=1619 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.351000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 00:56:16.352000 audit[1678]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1678 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.352000 audit[1678]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcb92aad0 a2=0 a3=1 items=0 ppid=1619 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.352000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 00:56:16.353000 audit[1679]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.353000 audit[1679]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeb0249c0 a2=0 a3=1 items=0 ppid=1619 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.353000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 00:56:16.453000 audit[1681]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.453000 audit[1681]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffee67cf0 a2=0 a3=1 items=0 ppid=1619 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.453000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 00:56:16.455000 audit[1683]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.455000 audit[1683]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffffd4a02d0 a2=0 a3=1 items=0 ppid=1619 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.455000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C73002D Oct 31 00:56:16.459000 audit[1686]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.459000 audit[1686]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff716bcd0 a2=0 a3=1 items=0 ppid=1619 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C73 Oct 31 00:56:16.460000 audit[1687]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.460000 audit[1687]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc59bb2f0 a2=0 a3=1 items=0 ppid=1619 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.460000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 00:56:16.463000 audit[1689]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.463000 audit[1689]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd0c66eb0 a2=0 a3=1 items=0 ppid=1619 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.463000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 00:56:16.464000 audit[1690]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.464000 audit[1690]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffda755850 a2=0 a3=1 items=0 ppid=1619 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.464000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 00:56:16.466000 audit[1692]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.466000 audit[1692]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff9616f10 a2=0 a3=1 items=0 ppid=1619 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 00:56:16.469000 audit[1695]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.469000 audit[1695]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffce64e880 a2=0 a3=1 items=0 ppid=1619 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.469000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 00:56:16.470000 audit[1696]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.470000 audit[1696]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe269fd70 a2=0 a3=1 items=0 ppid=1619 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.470000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 00:56:16.473000 audit[1698]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.473000 audit[1698]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd765a7a0 a2=0 a3=1 items=0 ppid=1619 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.473000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 00:56:16.474000 audit[1699]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.474000 audit[1699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd0550f60 a2=0 a3=1 items=0 ppid=1619 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.474000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 00:56:16.476000 audit[1701]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.476000 audit[1701]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe298cfb0 a2=0 a3=1 items=0 ppid=1619 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.476000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F5859 Oct 31 00:56:16.479000 audit[1704]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.479000 audit[1704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffef046500 a2=0 a3=1 items=0 ppid=1619 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.479000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F58 Oct 31 00:56:16.487000 audit[1707]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.487000 audit[1707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffedfd1680 a2=0 a3=1 items=0 ppid=1619 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.487000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F Oct 31 00:56:16.488000 audit[1708]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.488000 audit[1708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe0eca8a0 a2=0 a3=1 items=0 ppid=1619 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.488000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 00:56:16.490000 audit[1710]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.490000 audit[1710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffcb5ae540 a2=0 a3=1 items=0 ppid=1619 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.490000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 00:56:16.525000 audit[1714]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.525000 audit[1714]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe3838730 a2=0 a3=1 items=0 ppid=1619 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.525000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 00:56:16.526000 audit[1715]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.526000 audit[1715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffecf811e0 a2=0 a3=1 items=0 ppid=1619 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.526000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 00:56:16.530000 audit[1717]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 00:56:16.530000 audit[1717]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe0ba2320 a2=0 a3=1 items=0 ppid=1619 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.530000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 00:56:16.555000 audit[1723]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 00:56:16.555000 audit[1723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffe14693f0 a2=0 a3=1 items=0 ppid=1619 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.555000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 00:56:16.577000 audit[1723]: NETFILTER_CFG table=nat:40 family=2 entries=47 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 00:56:16.577000 audit[1723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21900 a0=3 a1=ffffe14693f0 a2=0 a3=1 items=0 ppid=1619 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.577000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 00:56:16.587000 audit[1732]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.587000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe0baaca0 a2=0 a3=1 items=0 ppid=1619 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.587000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 00:56:16.589000 audit[1735]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.589000 audit[1735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffed41eb70 a2=0 a3=1 items=0 ppid=1619 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.589000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C73 Oct 31 00:56:16.592000 audit[1736]: NETFILTER_CFG table=filter:43 family=2 entries=15 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 00:56:16.592000 audit[1736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffdfa5d9e0 a2=0 a3=1 items=0 ppid=1619 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.592000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 00:56:16.604000 audit[1736]: NETFILTER_CFG table=nat:44 family=2 entries=25 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 00:56:16.604000 audit[1736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8580 a0=3 a1=ffffdfa5d9e0 a2=0 a3=1 items=0 ppid=1619 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.604000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 00:56:16.614000 audit[1739]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.614000 audit[1739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe55472c0 a2=0 a3=1 items=0 ppid=1619 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.614000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C Oct 31 00:56:16.615000 audit[1740]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.615000 audit[1740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc055d9e0 a2=0 a3=1 items=0 ppid=1619 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.615000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 00:56:16.619000 audit[1742]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.619000 audit[1742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcf917cb0 a2=0 a3=1 items=0 ppid=1619 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.619000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 00:56:16.621000 audit[1743]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.621000 audit[1743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd71b0170 a2=0 a3=1 items=0 ppid=1619 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.621000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 00:56:16.623000 audit[1745]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.623000 audit[1745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe0f35590 a2=0 a3=1 items=0 ppid=1619 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.623000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 00:56:16.626000 audit[1748]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.626000 audit[1748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc0c3aef0 a2=0 a3=1 items=0 ppid=1619 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.626000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 00:56:16.627000 audit[1749]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.627000 audit[1749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe3a01fc0 a2=0 a3=1 items=0 ppid=1619 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.627000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 00:56:16.630000 audit[1751]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.630000 audit[1751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc584d770 a2=0 a3=1 items=0 ppid=1619 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.630000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 00:56:16.631000 audit[1752]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.631000 audit[1752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcc507b20 a2=0 a3=1 items=0 ppid=1619 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.631000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 00:56:16.637000 audit[1754]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.637000 audit[1754]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffcf5b970 a2=0 a3=1 items=0 ppid=1619 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.637000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F58 Oct 31 00:56:16.641000 audit[1757]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=1757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.641000 audit[1757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff2ef5470 a2=0 a3=1 items=0 ppid=1619 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.641000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F Oct 31 00:56:16.645000 audit[1760]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.645000 audit[1760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdc0622d0 a2=0 a3=1 items=0 ppid=1619 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.645000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D5052 Oct 31 00:56:16.646000 audit[1761]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.646000 audit[1761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd68b93d0 a2=0 a3=1 items=0 ppid=1619 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.646000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 00:56:16.648000 audit[1763]: NETFILTER_CFG table=nat:58 family=10 entries=2 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.648000 audit[1763]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc47b00d0 a2=0 a3=1 items=0 ppid=1619 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 00:56:16.651000 audit[1766]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.651000 audit[1766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffef204480 a2=0 a3=1 items=0 ppid=1619 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.651000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 00:56:16.652000 audit[1767]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.652000 audit[1767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd51e2dd0 a2=0 a3=1 items=0 ppid=1619 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.652000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 00:56:16.653000 audit[1769]: NETFILTER_CFG table=nat:61 family=10 entries=2 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.653000 audit[1769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffed9c6a00 a2=0 a3=1 items=0 ppid=1619 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.653000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 00:56:16.654000 audit[1770]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.654000 audit[1770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc523e1f0 a2=0 a3=1 items=0 ppid=1619 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.654000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 00:56:16.656000 audit[1772]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_rule pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.656000 audit[1772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd69125b0 a2=0 a3=1 items=0 ppid=1619 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.656000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 00:56:16.659000 audit[1775]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 00:56:16.659000 audit[1775]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc460cd30 a2=0 a3=1 items=0 ppid=1619 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 00:56:16.662000 audit[1777]: NETFILTER_CFG table=filter:65 family=10 entries=3 op=nft_register_rule pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 00:56:16.662000 audit[1777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffe8e587b0 a2=0 a3=1 items=0 ppid=1619 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.662000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 00:56:16.662000 audit[1777]: NETFILTER_CFG table=nat:66 family=10 entries=7 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 00:56:16.662000 audit[1777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffe8e587b0 a2=0 a3=1 items=0 ppid=1619 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:16.662000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 00:56:16.695209 kubelet[1453]: E1031 00:56:16.695154 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:16.807625 kubelet[1453]: E1031 00:56:16.807224 1453 dns.go:154] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 00:56:16.818400 kubelet[1453]: I1031 00:56:16.818253 1453 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-47gw8" podStartSLOduration=3.400146878 podStartE2EDuration="4.818239398s" podCreationTimestamp="2025-10-31 00:56:12 +0000 UTC" firstStartedPulling="2025-10-31 00:56:14.620185598 +0000 UTC m=+3.082476921" lastFinishedPulling="2025-10-31 00:56:16.038278118 +0000 UTC m=+4.500569441" observedRunningTime="2025-10-31 00:56:16.818187118 +0000 UTC m=+5.280478441" watchObservedRunningTime="2025-10-31 00:56:16.818239398 +0000 UTC m=+5.280530681" Oct 31 00:56:16.826638 kubelet[1453]: E1031 00:56:16.826601 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.826638 kubelet[1453]: W1031 00:56:16.826623 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.826638 kubelet[1453]: E1031 00:56:16.826643 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.826820 kubelet[1453]: E1031 00:56:16.826813 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.826858 kubelet[1453]: W1031 00:56:16.826821 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.826858 kubelet[1453]: E1031 00:56:16.826857 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.827025 kubelet[1453]: E1031 00:56:16.827007 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.827025 kubelet[1453]: W1031 00:56:16.827018 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.827025 kubelet[1453]: E1031 00:56:16.827027 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.827217 kubelet[1453]: E1031 00:56:16.827207 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.827217 kubelet[1453]: W1031 00:56:16.827216 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.827283 kubelet[1453]: E1031 00:56:16.827225 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.827386 kubelet[1453]: E1031 00:56:16.827376 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.827386 kubelet[1453]: W1031 00:56:16.827385 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.827438 kubelet[1453]: E1031 00:56:16.827393 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.827538 kubelet[1453]: E1031 00:56:16.827528 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.827538 kubelet[1453]: W1031 00:56:16.827537 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.827584 kubelet[1453]: E1031 00:56:16.827544 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.827687 kubelet[1453]: E1031 00:56:16.827677 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.827710 kubelet[1453]: W1031 00:56:16.827688 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.827710 kubelet[1453]: E1031 00:56:16.827695 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.827850 kubelet[1453]: E1031 00:56:16.827838 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.827850 kubelet[1453]: W1031 00:56:16.827849 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.827902 kubelet[1453]: E1031 00:56:16.827857 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.828024 kubelet[1453]: E1031 00:56:16.828012 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.828024 kubelet[1453]: W1031 00:56:16.828024 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.828091 kubelet[1453]: E1031 00:56:16.828032 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.828191 kubelet[1453]: E1031 00:56:16.828182 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.828221 kubelet[1453]: W1031 00:56:16.828191 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.828221 kubelet[1453]: E1031 00:56:16.828198 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.828341 kubelet[1453]: E1031 00:56:16.828330 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.828341 kubelet[1453]: W1031 00:56:16.828339 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.828392 kubelet[1453]: E1031 00:56:16.828346 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.828486 kubelet[1453]: E1031 00:56:16.828475 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.828486 kubelet[1453]: W1031 00:56:16.828484 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.828537 kubelet[1453]: E1031 00:56:16.828491 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.828635 kubelet[1453]: E1031 00:56:16.828625 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.828635 kubelet[1453]: W1031 00:56:16.828634 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.828676 kubelet[1453]: E1031 00:56:16.828641 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.828850 kubelet[1453]: E1031 00:56:16.828763 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.828850 kubelet[1453]: W1031 00:56:16.828771 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.828850 kubelet[1453]: E1031 00:56:16.828777 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.828933 kubelet[1453]: E1031 00:56:16.828887 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.828933 kubelet[1453]: W1031 00:56:16.828894 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.828933 kubelet[1453]: E1031 00:56:16.828900 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.829027 kubelet[1453]: E1031 00:56:16.829017 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.829027 kubelet[1453]: W1031 00:56:16.829025 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.829099 kubelet[1453]: E1031 00:56:16.829032 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.829199 kubelet[1453]: E1031 00:56:16.829190 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.829223 kubelet[1453]: W1031 00:56:16.829199 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.829223 kubelet[1453]: E1031 00:56:16.829206 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.829336 kubelet[1453]: E1031 00:56:16.829327 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.829359 kubelet[1453]: W1031 00:56:16.829337 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.829359 kubelet[1453]: E1031 00:56:16.829345 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.829476 kubelet[1453]: E1031 00:56:16.829466 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.829476 kubelet[1453]: W1031 00:56:16.829475 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.829530 kubelet[1453]: E1031 00:56:16.829482 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.829608 kubelet[1453]: E1031 00:56:16.829599 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.829608 kubelet[1453]: W1031 00:56:16.829608 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.829656 kubelet[1453]: E1031 00:56:16.829615 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.833395 kubelet[1453]: E1031 00:56:16.833376 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.833395 kubelet[1453]: W1031 00:56:16.833392 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.833494 kubelet[1453]: E1031 00:56:16.833405 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.833881 kubelet[1453]: E1031 00:56:16.833867 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.833881 kubelet[1453]: W1031 00:56:16.833881 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.833966 kubelet[1453]: E1031 00:56:16.833892 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.834203 kubelet[1453]: E1031 00:56:16.834190 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.834240 kubelet[1453]: W1031 00:56:16.834203 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.834240 kubelet[1453]: E1031 00:56:16.834213 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.834384 kubelet[1453]: E1031 00:56:16.834374 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.834384 kubelet[1453]: W1031 00:56:16.834384 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.834454 kubelet[1453]: E1031 00:56:16.834391 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.834550 kubelet[1453]: E1031 00:56:16.834538 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.834550 kubelet[1453]: W1031 00:56:16.834548 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.834606 kubelet[1453]: E1031 00:56:16.834556 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.834757 kubelet[1453]: E1031 00:56:16.834746 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.834757 kubelet[1453]: W1031 00:56:16.834755 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.834827 kubelet[1453]: E1031 00:56:16.834763 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.835021 kubelet[1453]: E1031 00:56:16.835009 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.835060 kubelet[1453]: W1031 00:56:16.835021 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.835060 kubelet[1453]: E1031 00:56:16.835031 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.835245 kubelet[1453]: E1031 00:56:16.835234 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.835245 kubelet[1453]: W1031 00:56:16.835244 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.835314 kubelet[1453]: E1031 00:56:16.835253 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.835409 kubelet[1453]: E1031 00:56:16.835400 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.835447 kubelet[1453]: W1031 00:56:16.835410 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.835447 kubelet[1453]: E1031 00:56:16.835418 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.835720 kubelet[1453]: E1031 00:56:16.835707 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.835758 kubelet[1453]: W1031 00:56:16.835720 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.835758 kubelet[1453]: E1031 00:56:16.835730 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.836214 kubelet[1453]: E1031 00:56:16.836094 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.836214 kubelet[1453]: W1031 00:56:16.836109 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.836214 kubelet[1453]: E1031 00:56:16.836121 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:16.836416 kubelet[1453]: E1031 00:56:16.836372 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 00:56:16.836416 kubelet[1453]: W1031 00:56:16.836386 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 00:56:16.836416 kubelet[1453]: E1031 00:56:16.836396 1453 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 00:56:17.052364 env[1217]: time="2025-10-31T00:56:17.052236998Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:17.055248 env[1217]: time="2025-10-31T00:56:17.055201518Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:90ff755393144dc5a3c05f95ffe1a3ecd2f89b98ecf36d9e4721471b80af4640,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:17.060063 env[1217]: time="2025-10-31T00:56:17.060008478Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:17.060616 env[1217]: time="2025-10-31T00:56:17.060586918Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:17.061788 env[1217]: time="2025-10-31T00:56:17.061749318Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:90ff755393144dc5a3c05f95ffe1a3ecd2f89b98ecf36d9e4721471b80af4640\"" Oct 31 00:56:17.065558 env[1217]: time="2025-10-31T00:56:17.065521558Z" level=info msg="CreateContainer within sandbox \"078798d88335c75b5ad5ef820c615a482b82309b5b394fc5a93913381c3562bf\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 31 00:56:17.077638 env[1217]: time="2025-10-31T00:56:17.077594438Z" level=info msg="CreateContainer within sandbox \"078798d88335c75b5ad5ef820c615a482b82309b5b394fc5a93913381c3562bf\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"7fd2b7ce9a97545b5640fb6f4874c4451ecf7b453a15da6c6a9e2d6ce338276c\"" Oct 31 00:56:17.078442 env[1217]: time="2025-10-31T00:56:17.078401718Z" level=info msg="StartContainer for \"7fd2b7ce9a97545b5640fb6f4874c4451ecf7b453a15da6c6a9e2d6ce338276c\"" Oct 31 00:56:17.099217 systemd[1]: Started cri-containerd-7fd2b7ce9a97545b5640fb6f4874c4451ecf7b453a15da6c6a9e2d6ce338276c.scope. Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1535 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:17.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766643262376365396139373534356235363430666236663438373463 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit: BPF prog-id=72 op=LOAD Oct 31 00:56:17.116000 audit[1819]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1535 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:17.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766643262376365396139373534356235363430666236663438373463 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit: BPF prog-id=73 op=LOAD Oct 31 00:56:17.116000 audit[1819]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1535 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:17.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766643262376365396139373534356235363430666236663438373463 Oct 31 00:56:17.116000 audit: BPF prog-id=73 op=UNLOAD Oct 31 00:56:17.116000 audit: BPF prog-id=72 op=UNLOAD Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:17.116000 audit: BPF prog-id=74 op=LOAD Oct 31 00:56:17.116000 audit[1819]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1535 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:17.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766643262376365396139373534356235363430666236663438373463 Oct 31 00:56:17.133241 env[1217]: time="2025-10-31T00:56:17.132935318Z" level=info msg="StartContainer for \"7fd2b7ce9a97545b5640fb6f4874c4451ecf7b453a15da6c6a9e2d6ce338276c\" returns successfully" Oct 31 00:56:17.141004 systemd[1]: cri-containerd-7fd2b7ce9a97545b5640fb6f4874c4451ecf7b453a15da6c6a9e2d6ce338276c.scope: Deactivated successfully. Oct 31 00:56:17.146000 audit: BPF prog-id=74 op=UNLOAD Oct 31 00:56:17.283287 env[1217]: time="2025-10-31T00:56:17.283220718Z" level=info msg="shim disconnected" id=7fd2b7ce9a97545b5640fb6f4874c4451ecf7b453a15da6c6a9e2d6ce338276c Oct 31 00:56:17.283287 env[1217]: time="2025-10-31T00:56:17.283270958Z" level=warning msg="cleaning up after shim disconnected" id=7fd2b7ce9a97545b5640fb6f4874c4451ecf7b453a15da6c6a9e2d6ce338276c namespace=k8s.io Oct 31 00:56:17.283287 env[1217]: time="2025-10-31T00:56:17.283281118Z" level=info msg="cleaning up dead shim" Oct 31 00:56:17.291090 env[1217]: time="2025-10-31T00:56:17.291033558Z" level=warning msg="cleanup warnings time=\"2025-10-31T00:56:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1858 runtime=io.containerd.runc.v2\n" Oct 31 00:56:17.695826 kubelet[1453]: E1031 00:56:17.695740 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:17.798137 kubelet[1453]: E1031 00:56:17.797975 1453 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-25rs6" podUID="d345c4a0-4f61-44c8-b9e5-8260eebc6222" Oct 31 00:56:17.810674 kubelet[1453]: E1031 00:56:17.810630 1453 dns.go:154] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 00:56:17.810817 kubelet[1453]: E1031 00:56:17.810690 1453 dns.go:154] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 00:56:17.811779 env[1217]: time="2025-10-31T00:56:17.811723438Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Oct 31 00:56:18.050120 systemd[1]: run-containerd-runc-k8s.io-7fd2b7ce9a97545b5640fb6f4874c4451ecf7b453a15da6c6a9e2d6ce338276c-runc.nq2min.mount: Deactivated successfully. Oct 31 00:56:18.050211 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7fd2b7ce9a97545b5640fb6f4874c4451ecf7b453a15da6c6a9e2d6ce338276c-rootfs.mount: Deactivated successfully. Oct 31 00:56:18.696077 kubelet[1453]: E1031 00:56:18.695936 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:19.697464 kubelet[1453]: E1031 00:56:19.697429 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:19.798870 kubelet[1453]: E1031 00:56:19.798821 1453 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-25rs6" podUID="d345c4a0-4f61-44c8-b9e5-8260eebc6222" Oct 31 00:56:19.969950 env[1217]: time="2025-10-31T00:56:19.969719398Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:19.971130 env[1217]: time="2025-10-31T00:56:19.971103958Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e60d442b6496497355efdf45eaa3ea72f5a2b28a5187aeab33442933f3c735d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:19.972795 env[1217]: time="2025-10-31T00:56:19.972770798Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:19.974665 env[1217]: time="2025-10-31T00:56:19.974629878Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:19.975242 env[1217]: time="2025-10-31T00:56:19.975210598Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:e60d442b6496497355efdf45eaa3ea72f5a2b28a5187aeab33442933f3c735d2\"" Oct 31 00:56:19.980830 env[1217]: time="2025-10-31T00:56:19.980789318Z" level=info msg="CreateContainer within sandbox \"078798d88335c75b5ad5ef820c615a482b82309b5b394fc5a93913381c3562bf\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 31 00:56:19.992940 env[1217]: time="2025-10-31T00:56:19.992897478Z" level=info msg="CreateContainer within sandbox \"078798d88335c75b5ad5ef820c615a482b82309b5b394fc5a93913381c3562bf\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"78b561a043576d989aadc2f8f369efefaa94b481b93f769afb724fe0c47ff118\"" Oct 31 00:56:19.993628 env[1217]: time="2025-10-31T00:56:19.993472678Z" level=info msg="StartContainer for \"78b561a043576d989aadc2f8f369efefaa94b481b93f769afb724fe0c47ff118\"" Oct 31 00:56:20.014304 systemd[1]: Started cri-containerd-78b561a043576d989aadc2f8f369efefaa94b481b93f769afb724fe0c47ff118.scope. Oct 31 00:56:20.031000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.031000 audit[1883]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1535 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:20.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738623536316130343335373664393839616164633266386633363965 Oct 31 00:56:20.032000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.032000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.032000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.032000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.032000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.032000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.032000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.032000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.032000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.032000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.032000 audit: BPF prog-id=75 op=LOAD Oct 31 00:56:20.032000 audit[1883]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1535 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:20.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738623536316130343335373664393839616164633266386633363965 Oct 31 00:56:20.032000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.032000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.032000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.032000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.032000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.032000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.032000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.032000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.032000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.032000 audit: BPF prog-id=76 op=LOAD Oct 31 00:56:20.032000 audit[1883]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1535 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:20.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738623536316130343335373664393839616164633266386633363965 Oct 31 00:56:20.033000 audit: BPF prog-id=76 op=UNLOAD Oct 31 00:56:20.033000 audit: BPF prog-id=75 op=UNLOAD Oct 31 00:56:20.033000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.033000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.033000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.033000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.033000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.033000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.033000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.033000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.033000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.033000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:20.033000 audit: BPF prog-id=77 op=LOAD Oct 31 00:56:20.033000 audit[1883]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1535 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:20.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738623536316130343335373664393839616164633266386633363965 Oct 31 00:56:20.048690 env[1217]: time="2025-10-31T00:56:20.048091118Z" level=info msg="StartContainer for \"78b561a043576d989aadc2f8f369efefaa94b481b93f769afb724fe0c47ff118\" returns successfully" Oct 31 00:56:20.588861 env[1217]: time="2025-10-31T00:56:20.588776958Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 00:56:20.590907 systemd[1]: cri-containerd-78b561a043576d989aadc2f8f369efefaa94b481b93f769afb724fe0c47ff118.scope: Deactivated successfully. Oct 31 00:56:20.597000 audit: BPF prog-id=77 op=UNLOAD Oct 31 00:56:20.626496 kubelet[1453]: I1031 00:56:20.626454 1453 kubelet_node_status.go:439] "Fast updating node status as it just became ready" Oct 31 00:56:20.698134 kubelet[1453]: E1031 00:56:20.698097 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:20.769853 env[1217]: time="2025-10-31T00:56:20.769806918Z" level=info msg="shim disconnected" id=78b561a043576d989aadc2f8f369efefaa94b481b93f769afb724fe0c47ff118 Oct 31 00:56:20.769853 env[1217]: time="2025-10-31T00:56:20.769856358Z" level=warning msg="cleaning up after shim disconnected" id=78b561a043576d989aadc2f8f369efefaa94b481b93f769afb724fe0c47ff118 namespace=k8s.io Oct 31 00:56:20.770025 env[1217]: time="2025-10-31T00:56:20.769865558Z" level=info msg="cleaning up dead shim" Oct 31 00:56:20.776700 env[1217]: time="2025-10-31T00:56:20.776660398Z" level=warning msg="cleanup warnings time=\"2025-10-31T00:56:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1923 runtime=io.containerd.runc.v2\n" Oct 31 00:56:20.815331 kubelet[1453]: E1031 00:56:20.815303 1453 dns.go:154] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 00:56:20.816493 env[1217]: time="2025-10-31T00:56:20.816459838Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Oct 31 00:56:20.989281 systemd[1]: run-containerd-runc-k8s.io-78b561a043576d989aadc2f8f369efefaa94b481b93f769afb724fe0c47ff118-runc.qXnN9M.mount: Deactivated successfully. Oct 31 00:56:20.989380 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-78b561a043576d989aadc2f8f369efefaa94b481b93f769afb724fe0c47ff118-rootfs.mount: Deactivated successfully. Oct 31 00:56:21.698425 kubelet[1453]: E1031 00:56:21.698358 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:21.802347 systemd[1]: Created slice kubepods-besteffort-podd345c4a0_4f61_44c8_b9e5_8260eebc6222.slice. Oct 31 00:56:21.805878 env[1217]: time="2025-10-31T00:56:21.805834398Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-25rs6,Uid:d345c4a0-4f61-44c8-b9e5-8260eebc6222,Namespace:calico-system,Attempt:0,}" Oct 31 00:56:21.902313 env[1217]: time="2025-10-31T00:56:21.902229598Z" level=error msg="Failed to destroy network for sandbox \"e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 00:56:21.902689 env[1217]: time="2025-10-31T00:56:21.902642038Z" level=error msg="encountered an error cleaning up failed sandbox \"e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 00:56:21.902738 env[1217]: time="2025-10-31T00:56:21.902696678Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-25rs6,Uid:d345c4a0-4f61-44c8-b9e5-8260eebc6222,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 00:56:21.903801 kubelet[1453]: E1031 00:56:21.902943 1453 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 00:56:21.903801 kubelet[1453]: E1031 00:56:21.903147 1453 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-25rs6" Oct 31 00:56:21.903801 kubelet[1453]: E1031 00:56:21.903201 1453 kuberuntime_manager.go:1343] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-25rs6" Oct 31 00:56:21.903721 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e-shm.mount: Deactivated successfully. Oct 31 00:56:21.904030 kubelet[1453]: E1031 00:56:21.903301 1453 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-25rs6_calico-system(d345c4a0-4f61-44c8-b9e5-8260eebc6222)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-25rs6_calico-system(d345c4a0-4f61-44c8-b9e5-8260eebc6222)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-25rs6" podUID="d345c4a0-4f61-44c8-b9e5-8260eebc6222" Oct 31 00:56:22.699396 kubelet[1453]: E1031 00:56:22.699343 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:22.818928 kubelet[1453]: I1031 00:56:22.818327 1453 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e" Oct 31 00:56:22.819111 env[1217]: time="2025-10-31T00:56:22.819035238Z" level=info msg="StopPodSandbox for \"e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e\"" Oct 31 00:56:22.841811 env[1217]: time="2025-10-31T00:56:22.841732398Z" level=error msg="StopPodSandbox for \"e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e\" failed" error="failed to destroy network for sandbox \"e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 00:56:22.842183 kubelet[1453]: E1031 00:56:22.842141 1453 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e" Oct 31 00:56:22.842256 kubelet[1453]: E1031 00:56:22.842207 1453 kuberuntime_manager.go:1665] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e"} Oct 31 00:56:22.842290 kubelet[1453]: E1031 00:56:22.842257 1453 kuberuntime_manager.go:1233] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d345c4a0-4f61-44c8-b9e5-8260eebc6222\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 00:56:22.842350 kubelet[1453]: E1031 00:56:22.842282 1453 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d345c4a0-4f61-44c8-b9e5-8260eebc6222\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-25rs6" podUID="d345c4a0-4f61-44c8-b9e5-8260eebc6222" Oct 31 00:56:23.700526 kubelet[1453]: E1031 00:56:23.700486 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:24.141236 systemd[1]: Created slice kubepods-besteffort-podc1fd58e4_8f8c_4d50_9295_b0d62eec01f0.slice. Oct 31 00:56:24.274448 kubelet[1453]: I1031 00:56:24.274353 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xzhlc\" (UniqueName: \"kubernetes.io/projected/c1fd58e4-8f8c-4d50-9295-b0d62eec01f0-kube-api-access-xzhlc\") pod \"nginx-deployment-bb8f74bfb-2v9vh\" (UID: \"c1fd58e4-8f8c-4d50-9295-b0d62eec01f0\") " pod="default/nginx-deployment-bb8f74bfb-2v9vh" Oct 31 00:56:24.446309 env[1217]: time="2025-10-31T00:56:24.446045118Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-bb8f74bfb-2v9vh,Uid:c1fd58e4-8f8c-4d50-9295-b0d62eec01f0,Namespace:default,Attempt:0,}" Oct 31 00:56:24.498531 env[1217]: time="2025-10-31T00:56:24.498440078Z" level=error msg="Failed to destroy network for sandbox \"f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 00:56:24.499163 env[1217]: time="2025-10-31T00:56:24.499123278Z" level=error msg="encountered an error cleaning up failed sandbox \"f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 00:56:24.499305 env[1217]: time="2025-10-31T00:56:24.499277358Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-bb8f74bfb-2v9vh,Uid:c1fd58e4-8f8c-4d50-9295-b0d62eec01f0,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 00:56:24.499693 kubelet[1453]: E1031 00:56:24.499629 1453 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 00:56:24.499765 kubelet[1453]: E1031 00:56:24.499693 1453 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-bb8f74bfb-2v9vh" Oct 31 00:56:24.499765 kubelet[1453]: E1031 00:56:24.499714 1453 kuberuntime_manager.go:1343] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-bb8f74bfb-2v9vh" Oct 31 00:56:24.499824 kubelet[1453]: E1031 00:56:24.499761 1453 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-bb8f74bfb-2v9vh_default(c1fd58e4-8f8c-4d50-9295-b0d62eec01f0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-bb8f74bfb-2v9vh_default(c1fd58e4-8f8c-4d50-9295-b0d62eec01f0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-bb8f74bfb-2v9vh" podUID="c1fd58e4-8f8c-4d50-9295-b0d62eec01f0" Oct 31 00:56:24.500367 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9-shm.mount: Deactivated successfully. Oct 31 00:56:24.701555 kubelet[1453]: E1031 00:56:24.701124 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:24.822780 kubelet[1453]: I1031 00:56:24.822740 1453 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9" Oct 31 00:56:24.823489 env[1217]: time="2025-10-31T00:56:24.823450118Z" level=info msg="StopPodSandbox for \"f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9\"" Oct 31 00:56:24.862479 env[1217]: time="2025-10-31T00:56:24.862396518Z" level=error msg="StopPodSandbox for \"f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9\" failed" error="failed to destroy network for sandbox \"f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 00:56:24.862700 kubelet[1453]: E1031 00:56:24.862654 1453 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9" Oct 31 00:56:24.862797 kubelet[1453]: E1031 00:56:24.862712 1453 kuberuntime_manager.go:1665] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9"} Oct 31 00:56:24.862797 kubelet[1453]: E1031 00:56:24.862748 1453 kuberuntime_manager.go:1233] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c1fd58e4-8f8c-4d50-9295-b0d62eec01f0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 00:56:24.862797 kubelet[1453]: E1031 00:56:24.862773 1453 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c1fd58e4-8f8c-4d50-9295-b0d62eec01f0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-bb8f74bfb-2v9vh" podUID="c1fd58e4-8f8c-4d50-9295-b0d62eec01f0" Oct 31 00:56:24.883857 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1775058273.mount: Deactivated successfully. Oct 31 00:56:25.018833 env[1217]: time="2025-10-31T00:56:25.018414278Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:25.020154 env[1217]: time="2025-10-31T00:56:25.020121998Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:43a5290057a103af76996c108856f92ed902f34573d7a864f55f15b8aaf4683b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:25.021512 env[1217]: time="2025-10-31T00:56:25.021483798Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:25.022996 env[1217]: time="2025-10-31T00:56:25.022968398Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:25.023515 env[1217]: time="2025-10-31T00:56:25.023484198Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:43a5290057a103af76996c108856f92ed902f34573d7a864f55f15b8aaf4683b\"" Oct 31 00:56:25.033330 env[1217]: time="2025-10-31T00:56:25.033284078Z" level=info msg="CreateContainer within sandbox \"078798d88335c75b5ad5ef820c615a482b82309b5b394fc5a93913381c3562bf\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 31 00:56:25.046651 env[1217]: time="2025-10-31T00:56:25.046597358Z" level=info msg="CreateContainer within sandbox \"078798d88335c75b5ad5ef820c615a482b82309b5b394fc5a93913381c3562bf\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4c9d37aa7cfa9891067466ab6c7620e98f0c428c2960e0dd37b8174f775a744c\"" Oct 31 00:56:25.048289 env[1217]: time="2025-10-31T00:56:25.048234158Z" level=info msg="StartContainer for \"4c9d37aa7cfa9891067466ab6c7620e98f0c428c2960e0dd37b8174f775a744c\"" Oct 31 00:56:25.064411 systemd[1]: Started cri-containerd-4c9d37aa7cfa9891067466ab6c7620e98f0c428c2960e0dd37b8174f775a744c.scope. Oct 31 00:56:25.084000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.089770 kernel: kauditd_printk_skb: 280 callbacks suppressed Oct 31 00:56:25.089837 kernel: audit: type=1400 audit(1761872185.084:532): avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.089858 kernel: audit: type=1300 audit(1761872185.084:532): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1535 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:25.084000 audit[2051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1535 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:25.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463396433376161376366613938393130363734363661623663373632 Oct 31 00:56:25.097389 kernel: audit: type=1327 audit(1761872185.084:532): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463396433376161376366613938393130363734363661623663373632 Oct 31 00:56:25.097482 kernel: audit: type=1400 audit(1761872185.084:533): avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.084000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.099951 kernel: audit: type=1400 audit(1761872185.084:533): avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.084000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.084000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.105527 kernel: audit: type=1400 audit(1761872185.084:533): avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.105594 kernel: audit: type=1400 audit(1761872185.084:533): avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.084000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.084000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.110863 kernel: audit: type=1400 audit(1761872185.084:533): avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.084000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.113833 kernel: audit: type=1400 audit(1761872185.084:533): avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.113911 kernel: audit: type=1400 audit(1761872185.084:533): avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.084000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.084000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.084000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.084000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.084000 audit: BPF prog-id=78 op=LOAD Oct 31 00:56:25.084000 audit[2051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1535 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:25.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463396433376161376366613938393130363734363661623663373632 Oct 31 00:56:25.085000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.085000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.085000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.085000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.085000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.085000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.085000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.085000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.085000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.085000 audit: BPF prog-id=79 op=LOAD Oct 31 00:56:25.085000 audit[2051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1535 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:25.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463396433376161376366613938393130363734363661623663373632 Oct 31 00:56:25.085000 audit: BPF prog-id=79 op=UNLOAD Oct 31 00:56:25.085000 audit: BPF prog-id=78 op=UNLOAD Oct 31 00:56:25.085000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.085000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.085000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.085000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.085000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.085000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.085000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.085000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.085000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.085000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:25.085000 audit: BPF prog-id=80 op=LOAD Oct 31 00:56:25.085000 audit[2051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1535 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:25.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463396433376161376366613938393130363734363661623663373632 Oct 31 00:56:25.121582 env[1217]: time="2025-10-31T00:56:25.121537918Z" level=info msg="StartContainer for \"4c9d37aa7cfa9891067466ab6c7620e98f0c428c2960e0dd37b8174f775a744c\" returns successfully" Oct 31 00:56:25.256294 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 31 00:56:25.256433 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 31 00:56:25.701731 kubelet[1453]: E1031 00:56:25.701680 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:25.827651 kubelet[1453]: E1031 00:56:25.827618 1453 dns.go:154] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 00:56:26.516000 audit[2139]: AVC avc: denied { write } for pid=2139 comm="tee" name="fd" dev="proc" ino=14968 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 00:56:26.516000 audit[2139]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc403c7f1 a2=241 a3=1b6 items=1 ppid=2119 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.516000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 31 00:56:26.516000 audit: PATH item=0 name="/dev/fd/63" inode=12921 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 00:56:26.516000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 00:56:26.520000 audit[2142]: AVC avc: denied { write } for pid=2142 comm="tee" name="fd" dev="proc" ino=13989 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 00:56:26.520000 audit[2142]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffe6a17e1 a2=241 a3=1b6 items=1 ppid=2118 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.520000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 31 00:56:26.520000 audit: PATH item=0 name="/dev/fd/63" inode=14959 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 00:56:26.520000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 00:56:26.534000 audit[2165]: AVC avc: denied { write } for pid=2165 comm="tee" name="fd" dev="proc" ino=14982 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 00:56:26.534000 audit[2165]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe83fd7f0 a2=241 a3=1b6 items=1 ppid=2128 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.534000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 31 00:56:26.534000 audit: PATH item=0 name="/dev/fd/63" inode=14978 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 00:56:26.534000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 00:56:26.551000 audit[2188]: AVC avc: denied { write } for pid=2188 comm="tee" name="fd" dev="proc" ino=14002 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 00:56:26.551000 audit[2188]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcd7e77f2 a2=241 a3=1b6 items=1 ppid=2130 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.551000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 31 00:56:26.551000 audit: PATH item=0 name="/dev/fd/63" inode=13999 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 00:56:26.551000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 00:56:26.562000 audit[2169]: AVC avc: denied { write } for pid=2169 comm="tee" name="fd" dev="proc" ino=12930 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 00:56:26.562000 audit[2169]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd45747f0 a2=241 a3=1b6 items=1 ppid=2129 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.562000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 31 00:56:26.562000 audit: PATH item=0 name="/dev/fd/63" inode=14979 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 00:56:26.562000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 00:56:26.576000 audit[2197]: AVC avc: denied { write } for pid=2197 comm="tee" name="fd" dev="proc" ino=15555 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 00:56:26.578000 audit[2199]: AVC avc: denied { write } for pid=2199 comm="tee" name="fd" dev="proc" ino=12934 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 00:56:26.578000 audit[2199]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffce9357f0 a2=241 a3=1b6 items=1 ppid=2122 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.578000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 31 00:56:26.578000 audit: PATH item=0 name="/dev/fd/63" inode=15552 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 00:56:26.578000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 00:56:26.576000 audit[2197]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeab0b7e0 a2=241 a3=1b6 items=1 ppid=2136 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.576000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 31 00:56:26.576000 audit: PATH item=0 name="/dev/fd/63" inode=15551 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 00:56:26.576000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 00:56:26.685000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.685000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.685000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.685000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.685000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.685000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.685000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.685000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.685000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.685000 audit: BPF prog-id=81 op=LOAD Oct 31 00:56:26.685000 audit[2218]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe11c92d8 a2=98 a3=ffffe11c92c8 items=0 ppid=2132 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.685000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 00:56:26.687000 audit: BPF prog-id=81 op=UNLOAD Oct 31 00:56:26.687000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.687000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.687000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.687000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.687000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.687000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.687000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.687000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.687000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.687000 audit: BPF prog-id=82 op=LOAD Oct 31 00:56:26.687000 audit[2218]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe11c9188 a2=74 a3=95 items=0 ppid=2132 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.687000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 00:56:26.687000 audit: BPF prog-id=82 op=UNLOAD Oct 31 00:56:26.687000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.687000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.687000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.687000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.687000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.687000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.687000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.687000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.687000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.687000 audit: BPF prog-id=83 op=LOAD Oct 31 00:56:26.687000 audit[2218]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe11c91b8 a2=40 a3=ffffe11c91e8 items=0 ppid=2132 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.687000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 00:56:26.687000 audit: BPF prog-id=83 op=UNLOAD Oct 31 00:56:26.687000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.687000 audit[2218]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffe11c92d0 a2=50 a3=0 items=0 ppid=2132 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.687000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 00:56:26.689000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.689000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.689000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.689000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.689000 audit: BPF prog-id=84 op=LOAD Oct 31 00:56:26.689000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffb832a18 a2=98 a3=fffffb832a08 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.689000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.689000 audit: BPF prog-id=84 op=UNLOAD Oct 31 00:56:26.690000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.690000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.690000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.690000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.690000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.690000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.690000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.690000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.690000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.690000 audit: BPF prog-id=85 op=LOAD Oct 31 00:56:26.690000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffb8326a8 a2=74 a3=95 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.690000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.690000 audit: BPF prog-id=85 op=UNLOAD Oct 31 00:56:26.690000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.690000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.690000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.690000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.690000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.690000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.690000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.690000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.690000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.690000 audit: BPF prog-id=86 op=LOAD Oct 31 00:56:26.690000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffb832708 a2=94 a3=2 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.690000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.691000 audit: BPF prog-id=86 op=UNLOAD Oct 31 00:56:26.702339 kubelet[1453]: E1031 00:56:26.702295 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:26.777000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.777000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.777000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.777000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.777000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.777000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.777000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.777000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.777000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.777000 audit: BPF prog-id=87 op=LOAD Oct 31 00:56:26.777000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffb8326c8 a2=40 a3=fffffb8326f8 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.777000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.777000 audit: BPF prog-id=87 op=UNLOAD Oct 31 00:56:26.777000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.777000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffffb8327e0 a2=50 a3=0 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.777000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.786000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.786000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffb832738 a2=28 a3=fffffb832868 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.786000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.786000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.786000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffb832768 a2=28 a3=fffffb832898 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.786000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.786000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.786000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffb832618 a2=28 a3=fffffb832748 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.786000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.786000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.786000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffb832788 a2=28 a3=fffffb8328b8 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.786000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.786000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.786000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffb832768 a2=28 a3=fffffb832898 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.786000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.787000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.787000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffb832758 a2=28 a3=fffffb832888 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.787000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.787000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.787000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffb832788 a2=28 a3=fffffb8328b8 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.787000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.787000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.787000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffb832768 a2=28 a3=fffffb832898 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.787000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.787000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.787000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffb832788 a2=28 a3=fffffb8328b8 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.787000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.787000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.787000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffb832758 a2=28 a3=fffffb832888 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.787000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.787000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.787000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffb8327d8 a2=28 a3=fffffb832918 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.787000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.788000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.788000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffb832510 a2=50 a3=0 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.788000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.788000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.788000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.788000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.788000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.788000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.788000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.788000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.788000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.788000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.788000 audit: BPF prog-id=88 op=LOAD Oct 31 00:56:26.788000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffb832518 a2=94 a3=5 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.788000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.789000 audit: BPF prog-id=88 op=UNLOAD Oct 31 00:56:26.789000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.789000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffb832620 a2=50 a3=0 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.789000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.789000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.789000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffffb832768 a2=4 a3=3 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.789000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.789000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.789000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.789000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.789000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.789000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.789000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.789000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.789000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.789000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.789000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.789000 audit[2219]: AVC avc: denied { confidentiality } for pid=2219 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:26.789000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffb832748 a2=94 a3=6 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.789000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { confidentiality } for pid=2219 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:26.790000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffb831f18 a2=94 a3=83 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.790000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.790000 audit[2219]: AVC avc: denied { confidentiality } for pid=2219 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:26.790000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffb831f18 a2=94 a3=83 items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.790000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit: BPF prog-id=89 op=LOAD Oct 31 00:56:26.800000 audit[2239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff1f28278 a2=98 a3=fffff1f28268 items=0 ppid=2132 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.800000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 00:56:26.800000 audit: BPF prog-id=89 op=UNLOAD Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit: BPF prog-id=90 op=LOAD Oct 31 00:56:26.800000 audit[2239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff1f28128 a2=74 a3=95 items=0 ppid=2132 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.800000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 00:56:26.800000 audit: BPF prog-id=90 op=UNLOAD Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.800000 audit: BPF prog-id=91 op=LOAD Oct 31 00:56:26.800000 audit[2239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff1f28158 a2=40 a3=fffff1f28188 items=0 ppid=2132 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.800000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 00:56:26.800000 audit: BPF prog-id=91 op=UNLOAD Oct 31 00:56:26.829104 kubelet[1453]: I1031 00:56:26.829063 1453 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Oct 31 00:56:26.829591 kubelet[1453]: E1031 00:56:26.829567 1453 dns.go:154] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 00:56:26.855532 systemd-networkd[1047]: vxlan.calico: Link UP Oct 31 00:56:26.855547 systemd-networkd[1047]: vxlan.calico: Gained carrier Oct 31 00:56:26.870000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.870000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.870000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.870000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.870000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.870000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.870000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.870000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.870000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.870000 audit: BPF prog-id=92 op=LOAD Oct 31 00:56:26.870000 audit[2267]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffa895b68 a2=98 a3=fffffa895b58 items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.870000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 00:56:26.870000 audit: BPF prog-id=92 op=UNLOAD Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit: BPF prog-id=93 op=LOAD Oct 31 00:56:26.871000 audit[2267]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffa895848 a2=74 a3=95 items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 00:56:26.871000 audit: BPF prog-id=93 op=UNLOAD Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit: BPF prog-id=94 op=LOAD Oct 31 00:56:26.871000 audit[2267]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffa8958a8 a2=94 a3=2 items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 00:56:26.871000 audit: BPF prog-id=94 op=UNLOAD Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffa8958d8 a2=28 a3=fffffa895a08 items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffa895908 a2=28 a3=fffffa895a38 items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffa8957b8 a2=28 a3=fffffa8958e8 items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffa895928 a2=28 a3=fffffa895a58 items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffa895908 a2=28 a3=fffffa895a38 items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 00:56:26.871000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.871000 audit[2267]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffa8958f8 a2=28 a3=fffffa895a28 items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 00:56:26.872000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.872000 audit[2267]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffa895928 a2=28 a3=fffffa895a58 items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.872000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 00:56:26.872000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.872000 audit[2267]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffa895908 a2=28 a3=fffffa895a38 items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.872000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 00:56:26.872000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.872000 audit[2267]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffa895928 a2=28 a3=fffffa895a58 items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.872000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 00:56:26.872000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.872000 audit[2267]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffa8958f8 a2=28 a3=fffffa895a28 items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.872000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 00:56:26.872000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.872000 audit[2267]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffa895978 a2=28 a3=fffffa895ab8 items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.872000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 00:56:26.872000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.872000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.872000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.872000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.872000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.872000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.872000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.872000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.872000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.872000 audit: BPF prog-id=95 op=LOAD Oct 31 00:56:26.872000 audit[2267]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffa895798 a2=40 a3=fffffa8957c8 items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.872000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 00:56:26.872000 audit: BPF prog-id=95 op=UNLOAD Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=fffffa8957c0 a2=50 a3=0 items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.873000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=fffffa8957c0 a2=50 a3=0 items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.873000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit: BPF prog-id=96 op=LOAD Oct 31 00:56:26.873000 audit[2267]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffa894f28 a2=94 a3=2 items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.873000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 00:56:26.873000 audit: BPF prog-id=96 op=UNLOAD Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.873000 audit: BPF prog-id=97 op=LOAD Oct 31 00:56:26.873000 audit[2267]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffa8950b8 a2=94 a3=30 items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.873000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 00:56:26.877000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.877000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.877000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.877000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.877000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.877000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.877000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.877000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.877000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.877000 audit: BPF prog-id=98 op=LOAD Oct 31 00:56:26.877000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc6866978 a2=98 a3=ffffc6866968 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.877000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.877000 audit: BPF prog-id=98 op=UNLOAD Oct 31 00:56:26.877000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.877000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.877000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.877000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.877000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.877000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.877000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.877000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.877000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.877000 audit: BPF prog-id=99 op=LOAD Oct 31 00:56:26.877000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc6866608 a2=74 a3=95 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.877000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.878000 audit: BPF prog-id=99 op=UNLOAD Oct 31 00:56:26.878000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.878000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.878000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.878000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.878000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.878000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.878000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.878000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.878000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.878000 audit: BPF prog-id=100 op=LOAD Oct 31 00:56:26.878000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc6866668 a2=94 a3=2 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.878000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.878000 audit: BPF prog-id=100 op=UNLOAD Oct 31 00:56:26.963000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.963000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.963000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.963000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.963000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.963000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.963000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.963000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.963000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.963000 audit: BPF prog-id=101 op=LOAD Oct 31 00:56:26.963000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc6866628 a2=40 a3=ffffc6866658 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.964000 audit: BPF prog-id=101 op=UNLOAD Oct 31 00:56:26.964000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.964000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc6866740 a2=50 a3=0 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.964000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc6866698 a2=28 a3=ffffc68667c8 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc68666c8 a2=28 a3=ffffc68667f8 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc6866578 a2=28 a3=ffffc68666a8 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc68666e8 a2=28 a3=ffffc6866818 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc68666c8 a2=28 a3=ffffc68667f8 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc68666b8 a2=28 a3=ffffc68667e8 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc68666e8 a2=28 a3=ffffc6866818 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc68666c8 a2=28 a3=ffffc68667f8 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc68666e8 a2=28 a3=ffffc6866818 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc68666b8 a2=28 a3=ffffc68667e8 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc6866738 a2=28 a3=ffffc6866878 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc6866470 a2=50 a3=0 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit: BPF prog-id=102 op=LOAD Oct 31 00:56:26.973000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc6866478 a2=94 a3=5 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.973000 audit: BPF prog-id=102 op=UNLOAD Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc6866580 a2=50 a3=0 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc68666c8 a2=4 a3=3 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { confidentiality } for pid=2270 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:26.973000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc68666a8 a2=94 a3=6 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.973000 audit[2270]: AVC avc: denied { confidentiality } for pid=2270 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:26.973000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc6865e78 a2=94 a3=83 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.974000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.974000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.974000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.974000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.974000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.974000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.974000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.974000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.974000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.974000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.974000 audit[2270]: AVC avc: denied { confidentiality } for pid=2270 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:26.974000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc6865e78 a2=94 a3=83 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.974000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.974000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc68678b8 a2=10 a3=ffffc68679a8 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.974000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.974000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc6867778 a2=10 a3=ffffc6867868 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.974000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.974000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc68676e8 a2=10 a3=ffffc6867868 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.974000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:26.974000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc68676e8 a2=10 a3=ffffc6867868 items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:26.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 00:56:26.987000 audit: BPF prog-id=97 op=UNLOAD Oct 31 00:56:27.035000 audit[2298]: NETFILTER_CFG table=mangle:67 family=2 entries=16 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 00:56:27.035000 audit[2298]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffee3e6250 a2=0 a3=ffffba06efa8 items=0 ppid=2132 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:27.035000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 00:56:27.047000 audit[2297]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 00:56:27.047000 audit[2297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=fffffe6588a0 a2=0 a3=ffff86bf8fa8 items=0 ppid=2132 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:27.047000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 00:56:27.047000 audit[2296]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 00:56:27.047000 audit[2296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=fffff2ab80d0 a2=0 a3=ffff85fd5fa8 items=0 ppid=2132 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:27.047000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 00:56:27.049000 audit[2301]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 00:56:27.049000 audit[2301]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffe2e98650 a2=0 a3=ffff9a2cafa8 items=0 ppid=2132 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:27.049000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 00:56:27.702966 kubelet[1453]: E1031 00:56:27.702920 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:28.013231 systemd-networkd[1047]: vxlan.calico: Gained IPv6LL Oct 31 00:56:28.703377 kubelet[1453]: E1031 00:56:28.703318 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:29.703544 kubelet[1453]: E1031 00:56:29.703484 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:30.704380 kubelet[1453]: E1031 00:56:30.704076 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:31.704608 kubelet[1453]: E1031 00:56:31.704557 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:32.693250 kubelet[1453]: E1031 00:56:32.693174 1453 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:32.704905 kubelet[1453]: E1031 00:56:32.704848 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:33.705435 kubelet[1453]: E1031 00:56:33.705372 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:34.706333 kubelet[1453]: E1031 00:56:34.706280 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:34.799980 env[1217]: time="2025-10-31T00:56:34.799914798Z" level=info msg="StopPodSandbox for \"e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e\"" Oct 31 00:56:34.854620 kubelet[1453]: I1031 00:56:34.853890 1453 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-zr4fw" podStartSLOduration=12.450309998 podStartE2EDuration="22.853871518s" podCreationTimestamp="2025-10-31 00:56:12 +0000 UTC" firstStartedPulling="2025-10-31 00:56:14.620982998 +0000 UTC m=+3.083274321" lastFinishedPulling="2025-10-31 00:56:25.024544558 +0000 UTC m=+13.486835841" observedRunningTime="2025-10-31 00:56:25.845163318 +0000 UTC m=+14.307454641" watchObservedRunningTime="2025-10-31 00:56:34.853871518 +0000 UTC m=+23.316162841" Oct 31 00:56:34.912904 env[1217]: 2025-10-31 00:56:34.854 [INFO][2327] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e" Oct 31 00:56:34.912904 env[1217]: 2025-10-31 00:56:34.854 [INFO][2327] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e" iface="eth0" netns="/var/run/netns/cni-50b3b40e-240e-a86b-3641-0ca6f6ab8fe1" Oct 31 00:56:34.912904 env[1217]: 2025-10-31 00:56:34.854 [INFO][2327] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e" iface="eth0" netns="/var/run/netns/cni-50b3b40e-240e-a86b-3641-0ca6f6ab8fe1" Oct 31 00:56:34.912904 env[1217]: 2025-10-31 00:56:34.854 [INFO][2327] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e" iface="eth0" netns="/var/run/netns/cni-50b3b40e-240e-a86b-3641-0ca6f6ab8fe1" Oct 31 00:56:34.912904 env[1217]: 2025-10-31 00:56:34.854 [INFO][2327] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e" Oct 31 00:56:34.912904 env[1217]: 2025-10-31 00:56:34.854 [INFO][2327] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e" Oct 31 00:56:34.912904 env[1217]: 2025-10-31 00:56:34.890 [INFO][2335] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e" HandleID="k8s-pod-network.e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e" Workload="10.0.0.104-k8s-csi--node--driver--25rs6-eth0" Oct 31 00:56:34.912904 env[1217]: 2025-10-31 00:56:34.890 [INFO][2335] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 00:56:34.912904 env[1217]: 2025-10-31 00:56:34.890 [INFO][2335] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 00:56:34.912904 env[1217]: 2025-10-31 00:56:34.905 [WARNING][2335] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e" HandleID="k8s-pod-network.e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e" Workload="10.0.0.104-k8s-csi--node--driver--25rs6-eth0" Oct 31 00:56:34.912904 env[1217]: 2025-10-31 00:56:34.905 [INFO][2335] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e" HandleID="k8s-pod-network.e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e" Workload="10.0.0.104-k8s-csi--node--driver--25rs6-eth0" Oct 31 00:56:34.912904 env[1217]: 2025-10-31 00:56:34.907 [INFO][2335] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 00:56:34.912904 env[1217]: 2025-10-31 00:56:34.909 [INFO][2327] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e" Oct 31 00:56:34.913371 env[1217]: time="2025-10-31T00:56:34.913018398Z" level=info msg="TearDown network for sandbox \"e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e\" successfully" Oct 31 00:56:34.913371 env[1217]: time="2025-10-31T00:56:34.913060318Z" level=info msg="StopPodSandbox for \"e4106f867e677887278f7f6c84792d625a16d4bfa9eb74202a384922b3e7627e\" returns successfully" Oct 31 00:56:34.914547 systemd[1]: run-netns-cni\x2d50b3b40e\x2d240e\x2da86b\x2d3641\x2d0ca6f6ab8fe1.mount: Deactivated successfully. Oct 31 00:56:34.949068 env[1217]: time="2025-10-31T00:56:34.949011758Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-25rs6,Uid:d345c4a0-4f61-44c8-b9e5-8260eebc6222,Namespace:calico-system,Attempt:1,}" Oct 31 00:56:35.068491 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 00:56:35.068598 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali76fb66a7e64: link becomes ready Oct 31 00:56:35.067001 systemd-networkd[1047]: cali76fb66a7e64: Link UP Oct 31 00:56:35.068680 systemd-networkd[1047]: cali76fb66a7e64: Gained carrier Oct 31 00:56:35.084548 env[1217]: 2025-10-31 00:56:35.005 [INFO][2342] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.104-k8s-csi--node--driver--25rs6-eth0 csi-node-driver- calico-system d345c4a0-4f61-44c8-b9e5-8260eebc6222 1316 0 2025-10-31 00:56:12 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:9d99788f7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.104 csi-node-driver-25rs6 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali76fb66a7e64 [] [] }} ContainerID="02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d" Namespace="calico-system" Pod="csi-node-driver-25rs6" WorkloadEndpoint="10.0.0.104-k8s-csi--node--driver--25rs6-" Oct 31 00:56:35.084548 env[1217]: 2025-10-31 00:56:35.005 [INFO][2342] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d" Namespace="calico-system" Pod="csi-node-driver-25rs6" WorkloadEndpoint="10.0.0.104-k8s-csi--node--driver--25rs6-eth0" Oct 31 00:56:35.084548 env[1217]: 2025-10-31 00:56:35.028 [INFO][2358] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d" HandleID="k8s-pod-network.02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d" Workload="10.0.0.104-k8s-csi--node--driver--25rs6-eth0" Oct 31 00:56:35.084548 env[1217]: 2025-10-31 00:56:35.029 [INFO][2358] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d" HandleID="k8s-pod-network.02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d" Workload="10.0.0.104-k8s-csi--node--driver--25rs6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d740), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.104", "pod":"csi-node-driver-25rs6", "timestamp":"2025-10-31 00:56:35.028695358 +0000 UTC"}, Hostname:"10.0.0.104", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 00:56:35.084548 env[1217]: 2025-10-31 00:56:35.029 [INFO][2358] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 00:56:35.084548 env[1217]: 2025-10-31 00:56:35.029 [INFO][2358] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 00:56:35.084548 env[1217]: 2025-10-31 00:56:35.029 [INFO][2358] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.104' Oct 31 00:56:35.084548 env[1217]: 2025-10-31 00:56:35.040 [INFO][2358] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d" host="10.0.0.104" Oct 31 00:56:35.084548 env[1217]: 2025-10-31 00:56:35.044 [INFO][2358] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.104" Oct 31 00:56:35.084548 env[1217]: 2025-10-31 00:56:35.049 [INFO][2358] ipam/ipam.go 511: Trying affinity for 192.168.78.192/26 host="10.0.0.104" Oct 31 00:56:35.084548 env[1217]: 2025-10-31 00:56:35.051 [INFO][2358] ipam/ipam.go 158: Attempting to load block cidr=192.168.78.192/26 host="10.0.0.104" Oct 31 00:56:35.084548 env[1217]: 2025-10-31 00:56:35.053 [INFO][2358] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.78.192/26 host="10.0.0.104" Oct 31 00:56:35.084548 env[1217]: 2025-10-31 00:56:35.053 [INFO][2358] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.78.192/26 handle="k8s-pod-network.02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d" host="10.0.0.104" Oct 31 00:56:35.084548 env[1217]: 2025-10-31 00:56:35.055 [INFO][2358] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d Oct 31 00:56:35.084548 env[1217]: 2025-10-31 00:56:35.058 [INFO][2358] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.78.192/26 handle="k8s-pod-network.02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d" host="10.0.0.104" Oct 31 00:56:35.084548 env[1217]: 2025-10-31 00:56:35.063 [INFO][2358] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.78.193/26] block=192.168.78.192/26 handle="k8s-pod-network.02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d" host="10.0.0.104" Oct 31 00:56:35.084548 env[1217]: 2025-10-31 00:56:35.063 [INFO][2358] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.78.193/26] handle="k8s-pod-network.02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d" host="10.0.0.104" Oct 31 00:56:35.084548 env[1217]: 2025-10-31 00:56:35.063 [INFO][2358] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 00:56:35.084548 env[1217]: 2025-10-31 00:56:35.063 [INFO][2358] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.78.193/26] IPv6=[] ContainerID="02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d" HandleID="k8s-pod-network.02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d" Workload="10.0.0.104-k8s-csi--node--driver--25rs6-eth0" Oct 31 00:56:35.085223 env[1217]: 2025-10-31 00:56:35.065 [INFO][2342] cni-plugin/k8s.go 418: Populated endpoint ContainerID="02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d" Namespace="calico-system" Pod="csi-node-driver-25rs6" WorkloadEndpoint="10.0.0.104-k8s-csi--node--driver--25rs6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.104-k8s-csi--node--driver--25rs6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d345c4a0-4f61-44c8-b9e5-8260eebc6222", ResourceVersion:"1316", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 0, 56, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"9d99788f7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.104", ContainerID:"", Pod:"csi-node-driver-25rs6", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.78.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali76fb66a7e64", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 00:56:35.085223 env[1217]: 2025-10-31 00:56:35.065 [INFO][2342] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.78.193/32] ContainerID="02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d" Namespace="calico-system" Pod="csi-node-driver-25rs6" WorkloadEndpoint="10.0.0.104-k8s-csi--node--driver--25rs6-eth0" Oct 31 00:56:35.085223 env[1217]: 2025-10-31 00:56:35.065 [INFO][2342] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali76fb66a7e64 ContainerID="02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d" Namespace="calico-system" Pod="csi-node-driver-25rs6" WorkloadEndpoint="10.0.0.104-k8s-csi--node--driver--25rs6-eth0" Oct 31 00:56:35.085223 env[1217]: 2025-10-31 00:56:35.071 [INFO][2342] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d" Namespace="calico-system" Pod="csi-node-driver-25rs6" WorkloadEndpoint="10.0.0.104-k8s-csi--node--driver--25rs6-eth0" Oct 31 00:56:35.085223 env[1217]: 2025-10-31 00:56:35.071 [INFO][2342] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d" Namespace="calico-system" Pod="csi-node-driver-25rs6" WorkloadEndpoint="10.0.0.104-k8s-csi--node--driver--25rs6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.104-k8s-csi--node--driver--25rs6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d345c4a0-4f61-44c8-b9e5-8260eebc6222", ResourceVersion:"1316", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 0, 56, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"9d99788f7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.104", ContainerID:"02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d", Pod:"csi-node-driver-25rs6", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.78.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali76fb66a7e64", MAC:"02:74:ce:6e:f8:0d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 00:56:35.085223 env[1217]: 2025-10-31 00:56:35.080 [INFO][2342] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d" Namespace="calico-system" Pod="csi-node-driver-25rs6" WorkloadEndpoint="10.0.0.104-k8s-csi--node--driver--25rs6-eth0" Oct 31 00:56:35.093862 env[1217]: time="2025-10-31T00:56:35.093786238Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 00:56:35.093862 env[1217]: time="2025-10-31T00:56:35.093826598Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 00:56:35.094058 env[1217]: time="2025-10-31T00:56:35.093842878Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 00:56:35.094331 env[1217]: time="2025-10-31T00:56:35.094284478Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d pid=2387 runtime=io.containerd.runc.v2 Oct 31 00:56:35.107461 systemd[1]: Started cri-containerd-02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d.scope. Oct 31 00:56:35.094000 audit[2378]: NETFILTER_CFG table=filter:71 family=2 entries=38 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 00:56:35.116528 kernel: kauditd_printk_skb: 590 callbacks suppressed Oct 31 00:56:35.116584 kernel: audit: type=1325 audit(1761872195.094:647): table=filter:71 family=2 entries=38 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 00:56:35.094000 audit[2378]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=fffffd400050 a2=0 a3=ffff9518efa8 items=0 ppid=2132 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:35.122884 kernel: audit: type=1300 audit(1761872195.094:647): arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=fffffd400050 a2=0 a3=ffff9518efa8 items=0 ppid=2132 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:35.122943 kernel: audit: type=1327 audit(1761872195.094:647): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 00:56:35.094000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 00:56:35.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.139502 kernel: audit: type=1400 audit(1761872195.125:648): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.139586 kernel: audit: type=1400 audit(1761872195.125:649): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.139605 kernel: audit: type=1400 audit(1761872195.125:650): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.139621 kernel: audit: type=1400 audit(1761872195.125:651): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.139638 kernel: audit: type=1400 audit(1761872195.125:652): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.139622 systemd-resolved[1156]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 00:56:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.140071 kernel: audit: type=1400 audit(1761872195.125:653): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.145818 kernel: audit: type=1400 audit(1761872195.125:654): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.127000 audit: BPF prog-id=103 op=LOAD Oct 31 00:56:35.128000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.128000 audit[2397]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2387 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:35.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032633133326465636239323235626330323064396334323263303633 Oct 31 00:56:35.128000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.128000 audit[2397]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2387 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:35.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032633133326465636239323235626330323064396334323263303633 Oct 31 00:56:35.128000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.128000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.128000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.128000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.128000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.128000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.128000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.128000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.128000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.128000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.128000 audit: BPF prog-id=104 op=LOAD Oct 31 00:56:35.128000 audit[2397]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2387 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:35.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032633133326465636239323235626330323064396334323263303633 Oct 31 00:56:35.130000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.130000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.130000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.130000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.130000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.130000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.130000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.130000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.130000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.130000 audit: BPF prog-id=105 op=LOAD Oct 31 00:56:35.130000 audit[2397]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2387 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:35.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032633133326465636239323235626330323064396334323263303633 Oct 31 00:56:35.133000 audit: BPF prog-id=105 op=UNLOAD Oct 31 00:56:35.133000 audit: BPF prog-id=104 op=UNLOAD Oct 31 00:56:35.133000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.133000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.133000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.133000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.133000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.133000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.133000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.133000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.133000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.133000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:35.133000 audit: BPF prog-id=106 op=LOAD Oct 31 00:56:35.133000 audit[2397]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2387 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:35.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032633133326465636239323235626330323064396334323263303633 Oct 31 00:56:35.150880 env[1217]: time="2025-10-31T00:56:35.150526038Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-25rs6,Uid:d345c4a0-4f61-44c8-b9e5-8260eebc6222,Namespace:calico-system,Attempt:1,} returns sandbox id \"02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d\"" Oct 31 00:56:35.152513 env[1217]: time="2025-10-31T00:56:35.152471558Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 00:56:35.372905 env[1217]: time="2025-10-31T00:56:35.370990038Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 00:56:35.373328 env[1217]: time="2025-10-31T00:56:35.373244198Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 00:56:35.373932 kubelet[1453]: E1031 00:56:35.373603 1453 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 00:56:35.373932 kubelet[1453]: E1031 00:56:35.373665 1453 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 00:56:35.373932 kubelet[1453]: E1031 00:56:35.373758 1453 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-csi start failed in pod csi-node-driver-25rs6_calico-system(d345c4a0-4f61-44c8-b9e5-8260eebc6222): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 00:56:35.374876 env[1217]: time="2025-10-31T00:56:35.374825478Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 00:56:35.610874 env[1217]: time="2025-10-31T00:56:35.610822798Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 00:56:35.611837 env[1217]: time="2025-10-31T00:56:35.611797078Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 00:56:35.612084 kubelet[1453]: E1031 00:56:35.612033 1453 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 00:56:35.612209 kubelet[1453]: E1031 00:56:35.612188 1453 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 00:56:35.612392 kubelet[1453]: E1031 00:56:35.612366 1453 kuberuntime_manager.go:1449] "Unhandled Error" err="container csi-node-driver-registrar start failed in pod csi-node-driver-25rs6_calico-system(d345c4a0-4f61-44c8-b9e5-8260eebc6222): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 00:56:35.612583 kubelet[1453]: E1031 00:56:35.612520 1453 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-25rs6" podUID="d345c4a0-4f61-44c8-b9e5-8260eebc6222" Oct 31 00:56:35.707760 kubelet[1453]: E1031 00:56:35.707644 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:35.850867 kubelet[1453]: E1031 00:56:35.850810 1453 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-25rs6" podUID="d345c4a0-4f61-44c8-b9e5-8260eebc6222" Oct 31 00:56:35.914723 systemd[1]: run-containerd-runc-k8s.io-02c132decb9225bc020d9c422c063d10ed6383ba9e6dac6022c357cbbddb8e6d-runc.o6KWwg.mount: Deactivated successfully. Oct 31 00:56:36.709080 kubelet[1453]: E1031 00:56:36.709027 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:36.851960 kubelet[1453]: E1031 00:56:36.851894 1453 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-25rs6" podUID="d345c4a0-4f61-44c8-b9e5-8260eebc6222" Oct 31 00:56:36.909273 systemd-networkd[1047]: cali76fb66a7e64: Gained IPv6LL Oct 31 00:56:37.709960 kubelet[1453]: E1031 00:56:37.709906 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:38.710694 kubelet[1453]: E1031 00:56:38.710640 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:39.711757 kubelet[1453]: E1031 00:56:39.711674 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:39.799148 env[1217]: time="2025-10-31T00:56:39.799093943Z" level=info msg="StopPodSandbox for \"f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9\"" Oct 31 00:56:39.878038 env[1217]: 2025-10-31 00:56:39.842 [INFO][2442] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9" Oct 31 00:56:39.878038 env[1217]: 2025-10-31 00:56:39.842 [INFO][2442] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9" iface="eth0" netns="/var/run/netns/cni-9b73f7f0-0a59-6875-2d1f-2cb3517efa9d" Oct 31 00:56:39.878038 env[1217]: 2025-10-31 00:56:39.842 [INFO][2442] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9" iface="eth0" netns="/var/run/netns/cni-9b73f7f0-0a59-6875-2d1f-2cb3517efa9d" Oct 31 00:56:39.878038 env[1217]: 2025-10-31 00:56:39.842 [INFO][2442] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9" iface="eth0" netns="/var/run/netns/cni-9b73f7f0-0a59-6875-2d1f-2cb3517efa9d" Oct 31 00:56:39.878038 env[1217]: 2025-10-31 00:56:39.842 [INFO][2442] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9" Oct 31 00:56:39.878038 env[1217]: 2025-10-31 00:56:39.842 [INFO][2442] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9" Oct 31 00:56:39.878038 env[1217]: 2025-10-31 00:56:39.860 [INFO][2451] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9" HandleID="k8s-pod-network.f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9" Workload="10.0.0.104-k8s-nginx--deployment--bb8f74bfb--2v9vh-eth0" Oct 31 00:56:39.878038 env[1217]: 2025-10-31 00:56:39.860 [INFO][2451] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 00:56:39.878038 env[1217]: 2025-10-31 00:56:39.860 [INFO][2451] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 00:56:39.878038 env[1217]: 2025-10-31 00:56:39.873 [WARNING][2451] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9" HandleID="k8s-pod-network.f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9" Workload="10.0.0.104-k8s-nginx--deployment--bb8f74bfb--2v9vh-eth0" Oct 31 00:56:39.878038 env[1217]: 2025-10-31 00:56:39.873 [INFO][2451] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9" HandleID="k8s-pod-network.f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9" Workload="10.0.0.104-k8s-nginx--deployment--bb8f74bfb--2v9vh-eth0" Oct 31 00:56:39.878038 env[1217]: 2025-10-31 00:56:39.875 [INFO][2451] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 00:56:39.878038 env[1217]: 2025-10-31 00:56:39.876 [INFO][2442] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9" Oct 31 00:56:39.879868 systemd[1]: run-netns-cni\x2d9b73f7f0\x2d0a59\x2d6875\x2d2d1f\x2d2cb3517efa9d.mount: Deactivated successfully. Oct 31 00:56:39.880098 env[1217]: time="2025-10-31T00:56:39.879871811Z" level=info msg="TearDown network for sandbox \"f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9\" successfully" Oct 31 00:56:39.880098 env[1217]: time="2025-10-31T00:56:39.879904132Z" level=info msg="StopPodSandbox for \"f48986e28afa24d56e7e275f453f661f09e4e66748e96213124048da5d5b33d9\" returns successfully" Oct 31 00:56:39.884947 env[1217]: time="2025-10-31T00:56:39.884909700Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-bb8f74bfb-2v9vh,Uid:c1fd58e4-8f8c-4d50-9295-b0d62eec01f0,Namespace:default,Attempt:1,}" Oct 31 00:56:39.944823 kubelet[1453]: I1031 00:56:39.944361 1453 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Oct 31 00:56:39.944823 kubelet[1453]: E1031 00:56:39.944751 1453 dns.go:154] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 00:56:40.012090 systemd-networkd[1047]: cali4e27efb2cb6: Link UP Oct 31 00:56:40.016523 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 00:56:40.016555 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4e27efb2cb6: link becomes ready Oct 31 00:56:40.016008 systemd-networkd[1047]: cali4e27efb2cb6: Gained carrier Oct 31 00:56:40.031755 env[1217]: 2025-10-31 00:56:39.936 [INFO][2459] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.104-k8s-nginx--deployment--bb8f74bfb--2v9vh-eth0 nginx-deployment-bb8f74bfb- default c1fd58e4-8f8c-4d50-9295-b0d62eec01f0 1358 0 2025-10-31 00:56:23 +0000 UTC map[app:nginx pod-template-hash:bb8f74bfb projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.104 nginx-deployment-bb8f74bfb-2v9vh eth0 default [] [] [kns.default ksa.default.default] cali4e27efb2cb6 [] [] }} ContainerID="91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af" Namespace="default" Pod="nginx-deployment-bb8f74bfb-2v9vh" WorkloadEndpoint="10.0.0.104-k8s-nginx--deployment--bb8f74bfb--2v9vh-" Oct 31 00:56:40.031755 env[1217]: 2025-10-31 00:56:39.937 [INFO][2459] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af" Namespace="default" Pod="nginx-deployment-bb8f74bfb-2v9vh" WorkloadEndpoint="10.0.0.104-k8s-nginx--deployment--bb8f74bfb--2v9vh-eth0" Oct 31 00:56:40.031755 env[1217]: 2025-10-31 00:56:39.962 [INFO][2474] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af" HandleID="k8s-pod-network.91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af" Workload="10.0.0.104-k8s-nginx--deployment--bb8f74bfb--2v9vh-eth0" Oct 31 00:56:40.031755 env[1217]: 2025-10-31 00:56:39.963 [INFO][2474] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af" HandleID="k8s-pod-network.91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af" Workload="10.0.0.104-k8s-nginx--deployment--bb8f74bfb--2v9vh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d700), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.104", "pod":"nginx-deployment-bb8f74bfb-2v9vh", "timestamp":"2025-10-31 00:56:39.962840341 +0000 UTC"}, Hostname:"10.0.0.104", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 00:56:40.031755 env[1217]: 2025-10-31 00:56:39.963 [INFO][2474] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 00:56:40.031755 env[1217]: 2025-10-31 00:56:39.963 [INFO][2474] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 00:56:40.031755 env[1217]: 2025-10-31 00:56:39.963 [INFO][2474] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.104' Oct 31 00:56:40.031755 env[1217]: 2025-10-31 00:56:39.979 [INFO][2474] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af" host="10.0.0.104" Oct 31 00:56:40.031755 env[1217]: 2025-10-31 00:56:39.983 [INFO][2474] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.104" Oct 31 00:56:40.031755 env[1217]: 2025-10-31 00:56:39.989 [INFO][2474] ipam/ipam.go 511: Trying affinity for 192.168.78.192/26 host="10.0.0.104" Oct 31 00:56:40.031755 env[1217]: 2025-10-31 00:56:39.992 [INFO][2474] ipam/ipam.go 158: Attempting to load block cidr=192.168.78.192/26 host="10.0.0.104" Oct 31 00:56:40.031755 env[1217]: 2025-10-31 00:56:39.995 [INFO][2474] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.78.192/26 host="10.0.0.104" Oct 31 00:56:40.031755 env[1217]: 2025-10-31 00:56:39.995 [INFO][2474] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.78.192/26 handle="k8s-pod-network.91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af" host="10.0.0.104" Oct 31 00:56:40.031755 env[1217]: 2025-10-31 00:56:39.997 [INFO][2474] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af Oct 31 00:56:40.031755 env[1217]: 2025-10-31 00:56:40.002 [INFO][2474] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.78.192/26 handle="k8s-pod-network.91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af" host="10.0.0.104" Oct 31 00:56:40.031755 env[1217]: 2025-10-31 00:56:40.007 [INFO][2474] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.78.194/26] block=192.168.78.192/26 handle="k8s-pod-network.91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af" host="10.0.0.104" Oct 31 00:56:40.031755 env[1217]: 2025-10-31 00:56:40.007 [INFO][2474] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.78.194/26] handle="k8s-pod-network.91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af" host="10.0.0.104" Oct 31 00:56:40.031755 env[1217]: 2025-10-31 00:56:40.007 [INFO][2474] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 00:56:40.031755 env[1217]: 2025-10-31 00:56:40.008 [INFO][2474] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.78.194/26] IPv6=[] ContainerID="91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af" HandleID="k8s-pod-network.91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af" Workload="10.0.0.104-k8s-nginx--deployment--bb8f74bfb--2v9vh-eth0" Oct 31 00:56:40.032309 env[1217]: 2025-10-31 00:56:40.010 [INFO][2459] cni-plugin/k8s.go 418: Populated endpoint ContainerID="91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af" Namespace="default" Pod="nginx-deployment-bb8f74bfb-2v9vh" WorkloadEndpoint="10.0.0.104-k8s-nginx--deployment--bb8f74bfb--2v9vh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.104-k8s-nginx--deployment--bb8f74bfb--2v9vh-eth0", GenerateName:"nginx-deployment-bb8f74bfb-", Namespace:"default", SelfLink:"", UID:"c1fd58e4-8f8c-4d50-9295-b0d62eec01f0", ResourceVersion:"1358", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 0, 56, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"bb8f74bfb", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.104", ContainerID:"", Pod:"nginx-deployment-bb8f74bfb-2v9vh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.78.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4e27efb2cb6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 00:56:40.032309 env[1217]: 2025-10-31 00:56:40.010 [INFO][2459] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.78.194/32] ContainerID="91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af" Namespace="default" Pod="nginx-deployment-bb8f74bfb-2v9vh" WorkloadEndpoint="10.0.0.104-k8s-nginx--deployment--bb8f74bfb--2v9vh-eth0" Oct 31 00:56:40.032309 env[1217]: 2025-10-31 00:56:40.010 [INFO][2459] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4e27efb2cb6 ContainerID="91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af" Namespace="default" Pod="nginx-deployment-bb8f74bfb-2v9vh" WorkloadEndpoint="10.0.0.104-k8s-nginx--deployment--bb8f74bfb--2v9vh-eth0" Oct 31 00:56:40.032309 env[1217]: 2025-10-31 00:56:40.016 [INFO][2459] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af" Namespace="default" Pod="nginx-deployment-bb8f74bfb-2v9vh" WorkloadEndpoint="10.0.0.104-k8s-nginx--deployment--bb8f74bfb--2v9vh-eth0" Oct 31 00:56:40.032309 env[1217]: 2025-10-31 00:56:40.019 [INFO][2459] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af" Namespace="default" Pod="nginx-deployment-bb8f74bfb-2v9vh" WorkloadEndpoint="10.0.0.104-k8s-nginx--deployment--bb8f74bfb--2v9vh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.104-k8s-nginx--deployment--bb8f74bfb--2v9vh-eth0", GenerateName:"nginx-deployment-bb8f74bfb-", Namespace:"default", SelfLink:"", UID:"c1fd58e4-8f8c-4d50-9295-b0d62eec01f0", ResourceVersion:"1358", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 0, 56, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"bb8f74bfb", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.104", ContainerID:"91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af", Pod:"nginx-deployment-bb8f74bfb-2v9vh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.78.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4e27efb2cb6", MAC:"de:e1:0e:d9:2e:94", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 00:56:40.032309 env[1217]: 2025-10-31 00:56:40.027 [INFO][2459] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af" Namespace="default" Pod="nginx-deployment-bb8f74bfb-2v9vh" WorkloadEndpoint="10.0.0.104-k8s-nginx--deployment--bb8f74bfb--2v9vh-eth0" Oct 31 00:56:40.038000 audit[2523]: NETFILTER_CFG table=filter:72 family=2 entries=42 op=nft_register_chain pid=2523 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 00:56:40.038000 audit[2523]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22512 a0=3 a1=ffffd01d7f70 a2=0 a3=ffffa5dbdfa8 items=0 ppid=2132 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:40.038000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 00:56:40.045851 env[1217]: time="2025-10-31T00:56:40.045767563Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 00:56:40.045851 env[1217]: time="2025-10-31T00:56:40.045812363Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 00:56:40.045851 env[1217]: time="2025-10-31T00:56:40.045823763Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 00:56:40.046073 env[1217]: time="2025-10-31T00:56:40.045953804Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af pid=2534 runtime=io.containerd.runc.v2 Oct 31 00:56:40.058361 systemd[1]: Started cri-containerd-91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af.scope. Oct 31 00:56:40.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.075000 audit: BPF prog-id=107 op=LOAD Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2534 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:40.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931653835343237306364333334366261353538366637643535376262 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2534 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:40.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931653835343237306364333334366261353538366637643535376262 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit: BPF prog-id=108 op=LOAD Oct 31 00:56:40.078000 audit[2545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2534 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:40.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931653835343237306364333334366261353538366637643535376262 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit: BPF prog-id=109 op=LOAD Oct 31 00:56:40.078000 audit[2545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2534 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:40.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931653835343237306364333334366261353538366637643535376262 Oct 31 00:56:40.078000 audit: BPF prog-id=109 op=UNLOAD Oct 31 00:56:40.078000 audit: BPF prog-id=108 op=UNLOAD Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:40.078000 audit: BPF prog-id=110 op=LOAD Oct 31 00:56:40.078000 audit[2545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2534 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:40.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931653835343237306364333334366261353538366637643535376262 Oct 31 00:56:40.079990 systemd-resolved[1156]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 00:56:40.101528 env[1217]: time="2025-10-31T00:56:40.101283990Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-bb8f74bfb-2v9vh,Uid:c1fd58e4-8f8c-4d50-9295-b0d62eec01f0,Namespace:default,Attempt:1,} returns sandbox id \"91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af\"" Oct 31 00:56:40.103648 env[1217]: time="2025-10-31T00:56:40.103540291Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 31 00:56:40.712146 kubelet[1453]: E1031 00:56:40.712092 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:40.859098 kubelet[1453]: E1031 00:56:40.858938 1453 dns.go:154] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 00:56:41.325196 systemd-networkd[1047]: cali4e27efb2cb6: Gained IPv6LL Oct 31 00:56:41.713129 kubelet[1453]: E1031 00:56:41.713005 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:42.254358 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1686526803.mount: Deactivated successfully. Oct 31 00:56:42.714101 kubelet[1453]: E1031 00:56:42.714044 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:43.501333 env[1217]: time="2025-10-31T00:56:43.501277327Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:43.503588 env[1217]: time="2025-10-31T00:56:43.503528264Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:43.505044 env[1217]: time="2025-10-31T00:56:43.505008515Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:43.506974 env[1217]: time="2025-10-31T00:56:43.506928810Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:43.507830 env[1217]: time="2025-10-31T00:56:43.507802736Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024\"" Oct 31 00:56:43.512295 env[1217]: time="2025-10-31T00:56:43.512258970Z" level=info msg="CreateContainer within sandbox \"91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Oct 31 00:56:43.522636 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount159823473.mount: Deactivated successfully. Oct 31 00:56:43.527736 env[1217]: time="2025-10-31T00:56:43.527679046Z" level=info msg="CreateContainer within sandbox \"91e854270cd3346ba5586f7d557bb245fb25ea0b8f1d385b38dde01fdf3e48af\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"08d3a3cd699976e3d2023c9e269771fb9dd4dcb457a7e3042e7a03c01c29fd16\"" Oct 31 00:56:43.528352 env[1217]: time="2025-10-31T00:56:43.528323571Z" level=info msg="StartContainer for \"08d3a3cd699976e3d2023c9e269771fb9dd4dcb457a7e3042e7a03c01c29fd16\"" Oct 31 00:56:43.547104 systemd[1]: Started cri-containerd-08d3a3cd699976e3d2023c9e269771fb9dd4dcb457a7e3042e7a03c01c29fd16.scope. Oct 31 00:56:43.565095 kernel: kauditd_printk_skb: 110 callbacks suppressed Oct 31 00:56:43.565209 kernel: audit: type=1400 audit(1761872203.562:685): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.569297 kernel: audit: type=1400 audit(1761872203.562:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.569359 kernel: audit: type=1400 audit(1761872203.562:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.572095 kernel: audit: type=1400 audit(1761872203.562:688): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.574681 kernel: audit: type=1400 audit(1761872203.562:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.580068 kernel: audit: type=1400 audit(1761872203.562:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.580123 kernel: audit: type=1400 audit(1761872203.562:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.585805 kernel: audit: type=1400 audit(1761872203.562:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.585875 kernel: audit: type=1400 audit(1761872203.562:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.591298 kernel: audit: type=1400 audit(1761872203.563:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.563000 audit: BPF prog-id=111 op=LOAD Oct 31 00:56:43.568000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.568000 audit[2591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2534 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:43.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038643361336364363939393736653364323032336339653236393737 Oct 31 00:56:43.568000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.568000 audit[2591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2534 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:43.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038643361336364363939393736653364323032336339653236393737 Oct 31 00:56:43.568000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.568000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.568000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.568000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.568000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.568000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.568000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.568000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.568000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.568000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.568000 audit: BPF prog-id=112 op=LOAD Oct 31 00:56:43.568000 audit[2591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2534 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:43.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038643361336364363939393736653364323032336339653236393737 Oct 31 00:56:43.570000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.570000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.570000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.570000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.570000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.570000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.570000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.570000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.570000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.570000 audit: BPF prog-id=113 op=LOAD Oct 31 00:56:43.570000 audit[2591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2534 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:43.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038643361336364363939393736653364323032336339653236393737 Oct 31 00:56:43.573000 audit: BPF prog-id=113 op=UNLOAD Oct 31 00:56:43.573000 audit: BPF prog-id=112 op=UNLOAD Oct 31 00:56:43.573000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.573000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.573000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.573000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.573000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.573000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.573000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.573000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.573000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.573000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:43.573000 audit: BPF prog-id=114 op=LOAD Oct 31 00:56:43.573000 audit[2591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2534 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:43.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038643361336364363939393736653364323032336339653236393737 Oct 31 00:56:43.605971 env[1217]: time="2025-10-31T00:56:43.605897876Z" level=info msg="StartContainer for \"08d3a3cd699976e3d2023c9e269771fb9dd4dcb457a7e3042e7a03c01c29fd16\" returns successfully" Oct 31 00:56:43.714883 kubelet[1453]: E1031 00:56:43.714844 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:43.876033 kubelet[1453]: I1031 00:56:43.875946 1453 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-bb8f74bfb-2v9vh" podStartSLOduration=17.468885482 podStartE2EDuration="20.875930431s" podCreationTimestamp="2025-10-31 00:56:23 +0000 UTC" firstStartedPulling="2025-10-31 00:56:40.102240879 +0000 UTC m=+28.564532202" lastFinishedPulling="2025-10-31 00:56:43.509285828 +0000 UTC m=+31.971577151" observedRunningTime="2025-10-31 00:56:43.875510388 +0000 UTC m=+32.337801711" watchObservedRunningTime="2025-10-31 00:56:43.875930431 +0000 UTC m=+32.338221754" Oct 31 00:56:44.715078 kubelet[1453]: E1031 00:56:44.715023 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:45.716199 kubelet[1453]: E1031 00:56:45.716151 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:46.132000 audit[2643]: NETFILTER_CFG table=filter:73 family=2 entries=26 op=nft_register_rule pid=2643 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 00:56:46.132000 audit[2643]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14176 a0=3 a1=ffffe28f9440 a2=0 a3=1 items=0 ppid=1619 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:46.132000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 00:56:46.139000 audit[2643]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=2643 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 00:56:46.139000 audit[2643]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe28f9440 a2=0 a3=1 items=0 ppid=1619 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:46.139000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 00:56:46.194047 systemd[1]: Created slice kubepods-besteffort-poddba47bfb_b035_42e6_bbe4_3082dcf4836c.slice. Oct 31 00:56:46.301421 kubelet[1453]: I1031 00:56:46.301236 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/dba47bfb-b035-42e6-bbe4-3082dcf4836c-data\") pod \"nfs-server-provisioner-0\" (UID: \"dba47bfb-b035-42e6-bbe4-3082dcf4836c\") " pod="default/nfs-server-provisioner-0" Oct 31 00:56:46.301421 kubelet[1453]: I1031 00:56:46.301276 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-psh4v\" (UniqueName: \"kubernetes.io/projected/dba47bfb-b035-42e6-bbe4-3082dcf4836c-kube-api-access-psh4v\") pod \"nfs-server-provisioner-0\" (UID: \"dba47bfb-b035-42e6-bbe4-3082dcf4836c\") " pod="default/nfs-server-provisioner-0" Oct 31 00:56:46.498865 env[1217]: time="2025-10-31T00:56:46.498754717Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:dba47bfb-b035-42e6-bbe4-3082dcf4836c,Namespace:default,Attempt:0,}" Oct 31 00:56:46.637872 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 00:56:46.637974 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Oct 31 00:56:46.635551 systemd-networkd[1047]: cali60e51b789ff: Link UP Oct 31 00:56:46.635673 systemd-networkd[1047]: cali60e51b789ff: Gained carrier Oct 31 00:56:46.656402 env[1217]: 2025-10-31 00:56:46.553 [INFO][2648] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.104-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default dba47bfb-b035-42e6-bbe4-3082dcf4836c 1415 0 2025-10-31 00:56:46 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-7c9b4c458c heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.104 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.104-k8s-nfs--server--provisioner--0-" Oct 31 00:56:46.656402 env[1217]: 2025-10-31 00:56:46.553 [INFO][2648] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.104-k8s-nfs--server--provisioner--0-eth0" Oct 31 00:56:46.656402 env[1217]: 2025-10-31 00:56:46.583 [INFO][2662] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3" HandleID="k8s-pod-network.abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3" Workload="10.0.0.104-k8s-nfs--server--provisioner--0-eth0" Oct 31 00:56:46.656402 env[1217]: 2025-10-31 00:56:46.584 [INFO][2662] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3" HandleID="k8s-pod-network.abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3" Workload="10.0.0.104-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002dd590), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.104", "pod":"nfs-server-provisioner-0", "timestamp":"2025-10-31 00:56:46.583911806 +0000 UTC"}, Hostname:"10.0.0.104", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 00:56:46.656402 env[1217]: 2025-10-31 00:56:46.584 [INFO][2662] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 00:56:46.656402 env[1217]: 2025-10-31 00:56:46.584 [INFO][2662] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 00:56:46.656402 env[1217]: 2025-10-31 00:56:46.584 [INFO][2662] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.104' Oct 31 00:56:46.656402 env[1217]: 2025-10-31 00:56:46.595 [INFO][2662] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3" host="10.0.0.104" Oct 31 00:56:46.656402 env[1217]: 2025-10-31 00:56:46.600 [INFO][2662] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.104" Oct 31 00:56:46.656402 env[1217]: 2025-10-31 00:56:46.610 [INFO][2662] ipam/ipam.go 511: Trying affinity for 192.168.78.192/26 host="10.0.0.104" Oct 31 00:56:46.656402 env[1217]: 2025-10-31 00:56:46.611 [INFO][2662] ipam/ipam.go 158: Attempting to load block cidr=192.168.78.192/26 host="10.0.0.104" Oct 31 00:56:46.656402 env[1217]: 2025-10-31 00:56:46.614 [INFO][2662] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.78.192/26 host="10.0.0.104" Oct 31 00:56:46.656402 env[1217]: 2025-10-31 00:56:46.614 [INFO][2662] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.78.192/26 handle="k8s-pod-network.abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3" host="10.0.0.104" Oct 31 00:56:46.656402 env[1217]: 2025-10-31 00:56:46.616 [INFO][2662] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3 Oct 31 00:56:46.656402 env[1217]: 2025-10-31 00:56:46.620 [INFO][2662] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.78.192/26 handle="k8s-pod-network.abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3" host="10.0.0.104" Oct 31 00:56:46.656402 env[1217]: 2025-10-31 00:56:46.627 [INFO][2662] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.78.195/26] block=192.168.78.192/26 handle="k8s-pod-network.abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3" host="10.0.0.104" Oct 31 00:56:46.656402 env[1217]: 2025-10-31 00:56:46.627 [INFO][2662] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.78.195/26] handle="k8s-pod-network.abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3" host="10.0.0.104" Oct 31 00:56:46.656402 env[1217]: 2025-10-31 00:56:46.628 [INFO][2662] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 00:56:46.656402 env[1217]: 2025-10-31 00:56:46.628 [INFO][2662] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.78.195/26] IPv6=[] ContainerID="abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3" HandleID="k8s-pod-network.abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3" Workload="10.0.0.104-k8s-nfs--server--provisioner--0-eth0" Oct 31 00:56:46.656936 env[1217]: 2025-10-31 00:56:46.630 [INFO][2648] cni-plugin/k8s.go 418: Populated endpoint ContainerID="abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.104-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.104-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"dba47bfb-b035-42e6-bbe4-3082dcf4836c", ResourceVersion:"1415", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 0, 56, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-7c9b4c458c", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.104", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.78.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 00:56:46.656936 env[1217]: 2025-10-31 00:56:46.631 [INFO][2648] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.78.195/32] ContainerID="abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.104-k8s-nfs--server--provisioner--0-eth0" Oct 31 00:56:46.656936 env[1217]: 2025-10-31 00:56:46.631 [INFO][2648] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.104-k8s-nfs--server--provisioner--0-eth0" Oct 31 00:56:46.656936 env[1217]: 2025-10-31 00:56:46.638 [INFO][2648] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.104-k8s-nfs--server--provisioner--0-eth0" Oct 31 00:56:46.657103 env[1217]: 2025-10-31 00:56:46.638 [INFO][2648] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.104-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.104-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"dba47bfb-b035-42e6-bbe4-3082dcf4836c", ResourceVersion:"1415", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 0, 56, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-7c9b4c458c", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.104", ContainerID:"abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.78.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"46:70:95:67:e4:fe", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 00:56:46.657103 env[1217]: 2025-10-31 00:56:46.648 [INFO][2648] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.104-k8s-nfs--server--provisioner--0-eth0" Oct 31 00:56:46.663000 audit[2682]: NETFILTER_CFG table=filter:75 family=2 entries=40 op=nft_register_chain pid=2682 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 00:56:46.663000 audit[2682]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20756 a0=3 a1=ffffebb3c660 a2=0 a3=ffff875ddfa8 items=0 ppid=2132 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:46.663000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 00:56:46.668870 env[1217]: time="2025-10-31T00:56:46.668785653Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 00:56:46.668870 env[1217]: time="2025-10-31T00:56:46.668826533Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 00:56:46.668870 env[1217]: time="2025-10-31T00:56:46.668837413Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 00:56:46.669170 env[1217]: time="2025-10-31T00:56:46.669011095Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3 pid=2689 runtime=io.containerd.runc.v2 Oct 31 00:56:46.682373 systemd[1]: Started cri-containerd-abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3.scope. Oct 31 00:56:46.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit: BPF prog-id=115 op=LOAD Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2689 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:46.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653634316535636334323763356664313037613936653032386336 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2689 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:46.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653634316535636334323763356664313037613936653032386336 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit: BPF prog-id=116 op=LOAD Oct 31 00:56:46.705000 audit[2700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2689 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:46.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653634316535636334323763356664313037613936653032386336 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit: BPF prog-id=117 op=LOAD Oct 31 00:56:46.705000 audit[2700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2689 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:46.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653634316535636334323763356664313037613936653032386336 Oct 31 00:56:46.705000 audit: BPF prog-id=117 op=UNLOAD Oct 31 00:56:46.705000 audit: BPF prog-id=116 op=UNLOAD Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:46.705000 audit: BPF prog-id=118 op=LOAD Oct 31 00:56:46.705000 audit[2700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2689 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:46.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653634316535636334323763356664313037613936653032386336 Oct 31 00:56:46.708090 systemd-resolved[1156]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 00:56:46.717256 kubelet[1453]: E1031 00:56:46.717189 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:46.726980 env[1217]: time="2025-10-31T00:56:46.726929334Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:dba47bfb-b035-42e6-bbe4-3082dcf4836c,Namespace:default,Attempt:0,} returns sandbox id \"abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3\"" Oct 31 00:56:46.728766 env[1217]: time="2025-10-31T00:56:46.728734945Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Oct 31 00:56:47.157000 audit[2730]: NETFILTER_CFG table=filter:76 family=2 entries=38 op=nft_register_rule pid=2730 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 00:56:47.157000 audit[2730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14176 a0=3 a1=ffffce2f80a0 a2=0 a3=1 items=0 ppid=1619 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:47.157000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 00:56:47.165000 audit[2730]: NETFILTER_CFG table=nat:77 family=2 entries=20 op=nft_register_rule pid=2730 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 00:56:47.165000 audit[2730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffce2f80a0 a2=0 a3=1 items=0 ppid=1619 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:47.165000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 00:56:47.718013 kubelet[1453]: E1031 00:56:47.717977 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:47.981503 systemd-networkd[1047]: cali60e51b789ff: Gained IPv6LL Oct 31 00:56:48.718468 kubelet[1453]: E1031 00:56:48.718416 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:49.025707 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2374524360.mount: Deactivated successfully. Oct 31 00:56:49.432928 update_engine[1207]: I1031 00:56:49.432866 1207 update_attempter.cc:509] Updating boot flags... Oct 31 00:56:49.719428 kubelet[1453]: E1031 00:56:49.719318 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:50.720071 kubelet[1453]: E1031 00:56:50.720005 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:50.777605 env[1217]: time="2025-10-31T00:56:50.777554720Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:50.779065 env[1217]: time="2025-10-31T00:56:50.779024607Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:50.781368 env[1217]: time="2025-10-31T00:56:50.781343698Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:50.783530 env[1217]: time="2025-10-31T00:56:50.783504989Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:50.784216 env[1217]: time="2025-10-31T00:56:50.784189952Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Oct 31 00:56:50.785787 env[1217]: time="2025-10-31T00:56:50.785761760Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 00:56:50.788608 env[1217]: time="2025-10-31T00:56:50.788571973Z" level=info msg="CreateContainer within sandbox \"abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Oct 31 00:56:50.799756 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1837287201.mount: Deactivated successfully. Oct 31 00:56:50.803313 env[1217]: time="2025-10-31T00:56:50.803262724Z" level=info msg="CreateContainer within sandbox \"abe641e5cc427c5fd107a96e028c60a5222f52c5270f79d7bdd579b8957482a3\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"0682e8bb6fae392d3101dc07bd06ab0e8c3a76fd54d3fe5987198b963ea49155\"" Oct 31 00:56:50.803702 env[1217]: time="2025-10-31T00:56:50.803676206Z" level=info msg="StartContainer for \"0682e8bb6fae392d3101dc07bd06ab0e8c3a76fd54d3fe5987198b963ea49155\"" Oct 31 00:56:50.821477 systemd[1]: Started cri-containerd-0682e8bb6fae392d3101dc07bd06ab0e8c3a76fd54d3fe5987198b963ea49155.scope. Oct 31 00:56:50.843093 kernel: kauditd_printk_skb: 119 callbacks suppressed Oct 31 00:56:50.843245 kernel: audit: type=1400 audit(1761872210.836:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.843289 kernel: audit: type=1400 audit(1761872210.836:727): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.846273 kernel: audit: type=1400 audit(1761872210.836:728): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.846357 kernel: audit: type=1400 audit(1761872210.836:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.851403 kernel: audit: type=1400 audit(1761872210.836:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.851482 kernel: audit: type=1400 audit(1761872210.836:731): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.856509 kernel: audit: type=1400 audit(1761872210.836:732): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.856554 kernel: audit: type=1400 audit(1761872210.836:733): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.861593 kernel: audit: type=1400 audit(1761872210.836:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.861792 kernel: audit: type=1400 audit(1761872210.837:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.837000 audit: BPF prog-id=119 op=LOAD Oct 31 00:56:50.843000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.843000 audit[2751]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2689 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:50.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036383265386262366661653339326433313031646330376264303661 Oct 31 00:56:50.843000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.843000 audit[2751]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2689 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:50.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036383265386262366661653339326433313031646330376264303661 Oct 31 00:56:50.843000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.843000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.843000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.843000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.843000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.843000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.843000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.843000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.843000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.843000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.843000 audit: BPF prog-id=120 op=LOAD Oct 31 00:56:50.843000 audit[2751]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2689 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:50.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036383265386262366661653339326433313031646330376264303661 Oct 31 00:56:50.845000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.845000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.845000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.845000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.845000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.845000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.845000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.845000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.845000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.845000 audit: BPF prog-id=121 op=LOAD Oct 31 00:56:50.845000 audit[2751]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2689 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:50.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036383265386262366661653339326433313031646330376264303661 Oct 31 00:56:50.848000 audit: BPF prog-id=121 op=UNLOAD Oct 31 00:56:50.848000 audit: BPF prog-id=120 op=UNLOAD Oct 31 00:56:50.848000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.848000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.848000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.848000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.848000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.848000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.848000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.848000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.848000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.848000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:50.848000 audit: BPF prog-id=122 op=LOAD Oct 31 00:56:50.848000 audit[2751]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2689 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:50.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036383265386262366661653339326433313031646330376264303661 Oct 31 00:56:50.876168 env[1217]: time="2025-10-31T00:56:50.876130873Z" level=info msg="StartContainer for \"0682e8bb6fae392d3101dc07bd06ab0e8c3a76fd54d3fe5987198b963ea49155\" returns successfully" Oct 31 00:56:50.893882 kubelet[1453]: I1031 00:56:50.893796 1453 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=0.836416781 podStartE2EDuration="4.893780198s" podCreationTimestamp="2025-10-31 00:56:46 +0000 UTC" firstStartedPulling="2025-10-31 00:56:46.728189822 +0000 UTC m=+35.190481145" lastFinishedPulling="2025-10-31 00:56:50.785553239 +0000 UTC m=+39.247844562" observedRunningTime="2025-10-31 00:56:50.893606797 +0000 UTC m=+39.355898120" watchObservedRunningTime="2025-10-31 00:56:50.893780198 +0000 UTC m=+39.356071521" Oct 31 00:56:50.902000 audit[2781]: NETFILTER_CFG table=filter:78 family=2 entries=26 op=nft_register_rule pid=2781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 00:56:50.902000 audit[2781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffc9162f10 a2=0 a3=1 items=0 ppid=1619 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:50.902000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 00:56:50.909000 audit[2781]: NETFILTER_CFG table=nat:79 family=2 entries=104 op=nft_register_chain pid=2781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 00:56:50.909000 audit[2781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48684 a0=3 a1=ffffc9162f10 a2=0 a3=1 items=0 ppid=1619 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:50.909000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 00:56:50.931000 audit[2782]: AVC avc: denied { search } for pid=2782 comm="rpcbind" name="crypto" dev="proc" ino=18081 scontext=system_u:system_r:svirt_lxc_net_t:s0:c10,c432 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 31 00:56:50.931000 audit[2782]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff83cbf000 a2=0 a3=0 items=0 ppid=2762 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c10,c432 key=(null) Oct 31 00:56:50.931000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Oct 31 00:56:50.966000 audit[2787]: AVC avc: denied { search } for pid=2787 comm="dbus-daemon" name="crypto" dev="proc" ino=18081 scontext=system_u:system_r:svirt_lxc_net_t:s0:c10,c432 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 31 00:56:50.966000 audit[2787]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8a88f000 a2=0 a3=0 items=0 ppid=2762 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c10,c432 key=(null) Oct 31 00:56:50.966000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Oct 31 00:56:50.970000 audit[2788]: AVC avc: denied { watch } for pid=2788 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=536944 scontext=system_u:system_r:svirt_lxc_net_t:s0:c10,c432 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c10,c432 tclass=dir permissive=0 Oct 31 00:56:50.970000 audit[2788]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaaff2afac0 a2=2c8 a3=aaaaff293a60 items=0 ppid=2762 pid=2788 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c10,c432 key=(null) Oct 31 00:56:50.970000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Oct 31 00:56:50.975000 audit[2789]: AVC avc: denied { read } for pid=2789 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=16643 scontext=system_u:system_r:svirt_lxc_net_t:s0:c10,c432 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Oct 31 00:56:50.975000 audit[2789]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffa6a5a570 a2=80000 a3=0 items=0 ppid=2762 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c10,c432 key=(null) Oct 31 00:56:50.975000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Oct 31 00:56:50.976000 audit[2789]: AVC avc: denied { search } for pid=2789 comm="ganesha.nfsd" name="crypto" dev="proc" ino=18081 scontext=system_u:system_r:svirt_lxc_net_t:s0:c10,c432 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 31 00:56:50.976000 audit[2789]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa5def000 a2=0 a3=0 items=0 ppid=2762 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c10,c432 key=(null) Oct 31 00:56:50.976000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Oct 31 00:56:51.006324 env[1217]: time="2025-10-31T00:56:51.006239216Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 00:56:51.007383 env[1217]: time="2025-10-31T00:56:51.007315621Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 00:56:51.007599 kubelet[1453]: E1031 00:56:51.007561 1453 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 00:56:51.007650 kubelet[1453]: E1031 00:56:51.007618 1453 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 00:56:51.007749 kubelet[1453]: E1031 00:56:51.007707 1453 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-csi start failed in pod csi-node-driver-25rs6_calico-system(d345c4a0-4f61-44c8-b9e5-8260eebc6222): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 00:56:51.009034 env[1217]: time="2025-10-31T00:56:51.009005908Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 00:56:51.214968 env[1217]: time="2025-10-31T00:56:51.214923634Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 00:56:51.216066 env[1217]: time="2025-10-31T00:56:51.216007359Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 00:56:51.216406 kubelet[1453]: E1031 00:56:51.216350 1453 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 00:56:51.216406 kubelet[1453]: E1031 00:56:51.216399 1453 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 00:56:51.216513 kubelet[1453]: E1031 00:56:51.216478 1453 kuberuntime_manager.go:1449] "Unhandled Error" err="container csi-node-driver-registrar start failed in pod csi-node-driver-25rs6_calico-system(d345c4a0-4f61-44c8-b9e5-8260eebc6222): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 00:56:51.216570 kubelet[1453]: E1031 00:56:51.216521 1453 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-25rs6" podUID="d345c4a0-4f61-44c8-b9e5-8260eebc6222" Oct 31 00:56:51.721211 kubelet[1453]: E1031 00:56:51.721153 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:52.693351 kubelet[1453]: E1031 00:56:52.692664 1453 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:52.722178 kubelet[1453]: E1031 00:56:52.722100 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:53.722468 kubelet[1453]: E1031 00:56:53.722401 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:54.723436 kubelet[1453]: E1031 00:56:54.723348 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:55.723683 kubelet[1453]: E1031 00:56:55.723634 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:56.129005 systemd[1]: Created slice kubepods-besteffort-pod5928d05e_a5b6_4ab2_860d_fbc455fa5665.slice. Oct 31 00:56:56.255309 kubelet[1453]: I1031 00:56:56.255258 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fc77r\" (UniqueName: \"kubernetes.io/projected/5928d05e-a5b6-4ab2-860d-fbc455fa5665-kube-api-access-fc77r\") pod \"test-pod-1\" (UID: \"5928d05e-a5b6-4ab2-860d-fbc455fa5665\") " pod="default/test-pod-1" Oct 31 00:56:56.255309 kubelet[1453]: I1031 00:56:56.255307 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-94740c66-dabe-405f-85a7-2ac683027d51\" (UniqueName: \"kubernetes.io/nfs/5928d05e-a5b6-4ab2-860d-fbc455fa5665-pvc-94740c66-dabe-405f-85a7-2ac683027d51\") pod \"test-pod-1\" (UID: \"5928d05e-a5b6-4ab2-860d-fbc455fa5665\") " pod="default/test-pod-1" Oct 31 00:56:56.367000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.370512 kernel: kauditd_printk_skb: 68 callbacks suppressed Oct 31 00:56:56.370640 kernel: audit: type=1400 audit(1761872216.367:751): avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.370672 kernel: Failed to create system directory netfs Oct 31 00:56:56.367000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.374501 kernel: Failed to create system directory netfs Oct 31 00:56:56.374576 kernel: audit: type=1400 audit(1761872216.367:751): avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.377270 kernel: Failed to create system directory netfs Oct 31 00:56:56.377312 kernel: audit: type=1400 audit(1761872216.367:751): avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.367000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.380554 kernel: Failed to create system directory netfs Oct 31 00:56:56.380614 kernel: audit: type=1400 audit(1761872216.367:751): avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.367000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.367000 audit[2812]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaef77c5e0 a1=12c14 a2=aaaaccf9e028 a3=aaaaef76d010 items=0 ppid=907 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:56.389982 kernel: audit: type=1300 audit(1761872216.367:751): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaef77c5e0 a1=12c14 a2=aaaaccf9e028 a3=aaaaef76d010 items=0 ppid=907 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:56.390038 kernel: audit: type=1327 audit(1761872216.367:751): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 00:56:56.367000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 00:56:56.386000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.395900 kernel: Failed to create system directory fscache Oct 31 00:56:56.395948 kernel: audit: type=1400 audit(1761872216.386:752): avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.395967 kernel: Failed to create system directory fscache Oct 31 00:56:56.395988 kernel: audit: type=1400 audit(1761872216.386:752): avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.386000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.399245 kernel: Failed to create system directory fscache Oct 31 00:56:56.399309 kernel: audit: type=1400 audit(1761872216.386:752): avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.386000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.402535 kernel: Failed to create system directory fscache Oct 31 00:56:56.386000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.403103 kernel: audit: type=1400 audit(1761872216.386:752): avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.403137 kernel: Failed to create system directory fscache Oct 31 00:56:56.386000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.386000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.407073 kernel: Failed to create system directory fscache Oct 31 00:56:56.407111 kernel: Failed to create system directory fscache Oct 31 00:56:56.386000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.386000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.408223 kernel: Failed to create system directory fscache Oct 31 00:56:56.408261 kernel: Failed to create system directory fscache Oct 31 00:56:56.386000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.386000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.409432 kernel: Failed to create system directory fscache Oct 31 00:56:56.409463 kernel: Failed to create system directory fscache Oct 31 00:56:56.386000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.386000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.410628 kernel: Failed to create system directory fscache Oct 31 00:56:56.410665 kernel: Failed to create system directory fscache Oct 31 00:56:56.386000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.386000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.412427 kernel: Failed to create system directory fscache Oct 31 00:56:56.412458 kernel: FS-Cache: Loaded Oct 31 00:56:56.386000 audit[2812]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaef98f210 a1=4c344 a2=aaaaccf9e028 a3=aaaaef76d010 items=0 ppid=907 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:56.386000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.434276 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.434327 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.434347 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.435471 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.435510 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.436650 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.436684 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.438396 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.438434 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.438449 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.439591 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.439621 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.441336 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.441369 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.441389 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.442506 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.442532 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.444240 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.444294 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.444315 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.445425 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.445449 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.446610 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.446651 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.448372 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.448411 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.448428 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.449536 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.449576 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.451278 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.451318 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.451345 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.452451 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.452502 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.453622 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.453660 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.455373 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.455410 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.455427 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.456549 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.456588 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.458288 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.458331 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.458346 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.459502 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.459530 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.461292 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.461317 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.461344 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.462501 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.462539 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.464280 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.464310 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.464330 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.465489 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.465526 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.467254 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.467277 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.467309 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.468457 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.468489 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.469687 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.469715 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.471521 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.471553 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.471570 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.473306 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.473331 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.473354 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.474508 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.474550 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.476274 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.476308 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.476332 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.477484 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.477507 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.479258 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.479303 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.479327 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.480493 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.480526 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.482278 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.482308 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.482331 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.483480 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.483516 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.485281 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.485318 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.485336 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.486483 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.486516 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.488250 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.488272 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.488293 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.489458 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.489481 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.490678 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.490719 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.492480 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.492513 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.492527 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.494294 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.494325 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.494342 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.495500 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.495524 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.497274 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.497302 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.497321 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.498493 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.498526 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.500262 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.500301 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.500318 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.501499 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.501531 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.503291 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.503319 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.503341 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.504500 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.504534 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.506274 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.506314 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.506333 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.507489 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.507524 kernel: Failed to create system directory sunrpc Oct 31 00:56:56.426000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.514666 kernel: RPC: Registered named UNIX socket transport module. Oct 31 00:56:56.514717 kernel: RPC: Registered udp transport module. Oct 31 00:56:56.514753 kernel: RPC: Registered tcp transport module. Oct 31 00:56:56.514773 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Oct 31 00:56:56.426000 audit[2812]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaef9db560 a1=14a804 a2=aaaaccf9e028 a3=aaaaef76d010 items=6 ppid=907 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:56.426000 audit: CWD cwd="/" Oct 31 00:56:56.426000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 00:56:56.426000 audit: PATH item=1 name=(null) inode=18707 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 00:56:56.426000 audit: PATH item=2 name=(null) inode=18707 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 00:56:56.426000 audit: PATH item=3 name=(null) inode=18708 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 00:56:56.426000 audit: PATH item=4 name=(null) inode=18707 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 00:56:56.426000 audit: PATH item=5 name=(null) inode=18709 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 00:56:56.426000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.542524 kernel: Failed to create system directory nfs Oct 31 00:56:56.542573 kernel: Failed to create system directory nfs Oct 31 00:56:56.542588 kernel: Failed to create system directory nfs Oct 31 00:56:56.542601 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.544210 kernel: Failed to create system directory nfs Oct 31 00:56:56.544238 kernel: Failed to create system directory nfs Oct 31 00:56:56.544253 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.545335 kernel: Failed to create system directory nfs Oct 31 00:56:56.545358 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.546476 kernel: Failed to create system directory nfs Oct 31 00:56:56.546512 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.547645 kernel: Failed to create system directory nfs Oct 31 00:56:56.547671 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.549377 kernel: Failed to create system directory nfs Oct 31 00:56:56.549424 kernel: Failed to create system directory nfs Oct 31 00:56:56.549441 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.550534 kernel: Failed to create system directory nfs Oct 31 00:56:56.550563 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.552247 kernel: Failed to create system directory nfs Oct 31 00:56:56.552279 kernel: Failed to create system directory nfs Oct 31 00:56:56.552310 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.553397 kernel: Failed to create system directory nfs Oct 31 00:56:56.553429 kernel: Failed to create system directory nfs Oct 31 00:56:56.554550 kernel: Failed to create system directory nfs Oct 31 00:56:56.554599 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.556261 kernel: Failed to create system directory nfs Oct 31 00:56:56.556305 kernel: Failed to create system directory nfs Oct 31 00:56:56.556325 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.557466 kernel: Failed to create system directory nfs Oct 31 00:56:56.557519 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.558589 kernel: Failed to create system directory nfs Oct 31 00:56:56.558633 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.560317 kernel: Failed to create system directory nfs Oct 31 00:56:56.560337 kernel: Failed to create system directory nfs Oct 31 00:56:56.560359 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.561467 kernel: Failed to create system directory nfs Oct 31 00:56:56.561495 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.562635 kernel: Failed to create system directory nfs Oct 31 00:56:56.562667 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.564366 kernel: Failed to create system directory nfs Oct 31 00:56:56.564396 kernel: Failed to create system directory nfs Oct 31 00:56:56.564432 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.565523 kernel: Failed to create system directory nfs Oct 31 00:56:56.565562 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.567234 kernel: Failed to create system directory nfs Oct 31 00:56:56.567272 kernel: Failed to create system directory nfs Oct 31 00:56:56.567298 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.568406 kernel: Failed to create system directory nfs Oct 31 00:56:56.568485 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.569574 kernel: Failed to create system directory nfs Oct 31 00:56:56.569640 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.571308 kernel: Failed to create system directory nfs Oct 31 00:56:56.571340 kernel: Failed to create system directory nfs Oct 31 00:56:56.571354 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.572512 kernel: Failed to create system directory nfs Oct 31 00:56:56.572540 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.574230 kernel: Failed to create system directory nfs Oct 31 00:56:56.574257 kernel: Failed to create system directory nfs Oct 31 00:56:56.574295 kernel: Failed to create system directory nfs Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.535000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.575371 kernel: Failed to create system directory nfs Oct 31 00:56:56.590075 kernel: FS-Cache: Netfs 'nfs' registered for caching Oct 31 00:56:56.535000 audit[2812]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaefb84b50 a1=116324 a2=aaaaccf9e028 a3=aaaaef76d010 items=0 ppid=907 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:56.535000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.628306 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.628369 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.628390 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.630695 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.630737 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.630754 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.636126 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.636216 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.639990 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.640068 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.643946 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.644017 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.645506 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.645556 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.647367 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.647420 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.649754 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.649818 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.654142 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.654203 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.660191 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.660276 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.664500 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.664570 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.666353 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.667276 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.668194 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.670000 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.670034 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.671310 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.672072 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.674656 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.674690 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.674705 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.674719 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.679996 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.680036 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.680061 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.681671 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.681730 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.683531 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.683585 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.683603 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.684598 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.685659 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.686297 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.687570 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.687590 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.687610 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.689497 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.689535 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.689552 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.691467 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.691491 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.691511 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.693343 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.693371 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.693388 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.694621 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.695256 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.695296 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.696490 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.696523 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.698299 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.698329 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.698344 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.699576 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.700220 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.701485 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.701517 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.701532 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.703344 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.703431 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.703453 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.704610 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.704642 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.706477 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.706502 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.706522 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.708506 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.708529 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.708553 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.710388 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.710418 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.711073 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.712396 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.712424 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.712445 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.713740 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.714730 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.714766 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.716269 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.617000 audit[2818]: AVC avc: denied { confidentiality } for pid=2818 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.723708 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.723755 kernel: Failed to create system directory nfs4 Oct 31 00:56:56.723828 kubelet[1453]: E1031 00:56:56.723784 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:56.827096 kernel: NFS: Registering the id_resolver key type Oct 31 00:56:56.827196 kernel: Key type id_resolver registered Oct 31 00:56:56.827215 kernel: Key type id_legacy registered Oct 31 00:56:56.617000 audit[2818]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffa48da010 a1=19c744 a2=aaaabab6e028 a3=aaaad403f010 items=0 ppid=907 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:56.617000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.838741 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.838778 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.839743 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.839775 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.841689 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.841716 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.841748 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.842405 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.843697 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.844416 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.844439 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.846403 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.846442 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.846458 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.847722 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.848412 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.849081 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.850425 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.850450 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.850475 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.852429 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.852457 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.852481 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.854538 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.854559 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.854584 kernel: Failed to create system directory rpcgss Oct 31 00:56:56.834000 audit[2821]: AVC avc: denied { confidentiality } for pid=2821 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 00:56:56.834000 audit[2821]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb7342010 a1=5eedc a2=aaaac2b3e028 a3=aaaaf93ea010 items=0 ppid=907 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:56.834000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Oct 31 00:56:56.869085 nfsidmap[2829]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Oct 31 00:56:56.871866 nfsidmap[2832]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Oct 31 00:56:56.885000 audit[1283]: AVC avc: denied { watch_reads } for pid=1283 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2534 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 00:56:56.885000 audit[1283]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab0ce43f00 a2=10 a3=0 items=0 ppid=1 pid=1283 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:56.885000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 31 00:56:56.885000 audit[1283]: AVC avc: denied { watch_reads } for pid=1283 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2534 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 00:56:56.885000 audit[1283]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab0ce43f00 a2=10 a3=0 items=0 ppid=1 pid=1283 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:56.885000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 31 00:56:56.885000 audit[1283]: AVC avc: denied { watch_reads } for pid=1283 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2534 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 00:56:56.885000 audit[1283]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab0ce43f00 a2=10 a3=0 items=0 ppid=1 pid=1283 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:56.885000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 31 00:56:56.885000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2534 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 00:56:56.885000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2534 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 00:56:56.885000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2534 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 00:56:57.085003 env[1217]: time="2025-10-31T00:56:57.084951435Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:5928d05e-a5b6-4ab2-860d-fbc455fa5665,Namespace:default,Attempt:0,}" Oct 31 00:56:57.243606 systemd-networkd[1047]: cali5ec59c6bf6e: Link UP Oct 31 00:56:57.246359 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 00:56:57.246445 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Oct 31 00:56:57.246552 systemd-networkd[1047]: cali5ec59c6bf6e: Gained carrier Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.174 [INFO][2835] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.104-k8s-test--pod--1-eth0 default 5928d05e-a5b6-4ab2-860d-fbc455fa5665 1503 0 2025-10-31 00:56:46 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.104 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.104-k8s-test--pod--1-" Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.174 [INFO][2835] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.104-k8s-test--pod--1-eth0" Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.200 [INFO][2850] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278" HandleID="k8s-pod-network.66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278" Workload="10.0.0.104-k8s-test--pod--1-eth0" Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.200 [INFO][2850] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278" HandleID="k8s-pod-network.66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278" Workload="10.0.0.104-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000506f40), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.104", "pod":"test-pod-1", "timestamp":"2025-10-31 00:56:57.199995586 +0000 UTC"}, Hostname:"10.0.0.104", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.200 [INFO][2850] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.200 [INFO][2850] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.200 [INFO][2850] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.104' Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.213 [INFO][2850] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278" host="10.0.0.104" Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.217 [INFO][2850] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.104" Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.221 [INFO][2850] ipam/ipam.go 511: Trying affinity for 192.168.78.192/26 host="10.0.0.104" Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.223 [INFO][2850] ipam/ipam.go 158: Attempting to load block cidr=192.168.78.192/26 host="10.0.0.104" Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.225 [INFO][2850] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.78.192/26 host="10.0.0.104" Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.225 [INFO][2850] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.78.192/26 handle="k8s-pod-network.66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278" host="10.0.0.104" Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.226 [INFO][2850] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278 Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.230 [INFO][2850] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.78.192/26 handle="k8s-pod-network.66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278" host="10.0.0.104" Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.238 [INFO][2850] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.78.196/26] block=192.168.78.192/26 handle="k8s-pod-network.66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278" host="10.0.0.104" Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.238 [INFO][2850] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.78.196/26] handle="k8s-pod-network.66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278" host="10.0.0.104" Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.238 [INFO][2850] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.238 [INFO][2850] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.78.196/26] IPv6=[] ContainerID="66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278" HandleID="k8s-pod-network.66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278" Workload="10.0.0.104-k8s-test--pod--1-eth0" Oct 31 00:56:57.260992 env[1217]: 2025-10-31 00:56:57.240 [INFO][2835] cni-plugin/k8s.go 418: Populated endpoint ContainerID="66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.104-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.104-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"5928d05e-a5b6-4ab2-860d-fbc455fa5665", ResourceVersion:"1503", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 0, 56, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.104", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.78.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 00:56:57.261678 env[1217]: 2025-10-31 00:56:57.240 [INFO][2835] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.78.196/32] ContainerID="66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.104-k8s-test--pod--1-eth0" Oct 31 00:56:57.261678 env[1217]: 2025-10-31 00:56:57.240 [INFO][2835] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.104-k8s-test--pod--1-eth0" Oct 31 00:56:57.261678 env[1217]: 2025-10-31 00:56:57.247 [INFO][2835] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.104-k8s-test--pod--1-eth0" Oct 31 00:56:57.261678 env[1217]: 2025-10-31 00:56:57.247 [INFO][2835] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.104-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.104-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"5928d05e-a5b6-4ab2-860d-fbc455fa5665", ResourceVersion:"1503", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 0, 56, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.104", ContainerID:"66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.78.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"de:e7:0f:56:a6:c5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 00:56:57.261678 env[1217]: 2025-10-31 00:56:57.255 [INFO][2835] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.104-k8s-test--pod--1-eth0" Oct 31 00:56:57.266000 audit[2866]: NETFILTER_CFG table=filter:80 family=2 entries=40 op=nft_register_chain pid=2866 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 00:56:57.266000 audit[2866]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=ffffe653ae40 a2=0 a3=ffffb834bfa8 items=0 ppid=2132 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:57.266000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 00:56:57.275447 env[1217]: time="2025-10-31T00:56:57.275370056Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 00:56:57.275447 env[1217]: time="2025-10-31T00:56:57.275411016Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 00:56:57.275447 env[1217]: time="2025-10-31T00:56:57.275421576Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 00:56:57.275828 env[1217]: time="2025-10-31T00:56:57.275784937Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278 pid=2874 runtime=io.containerd.runc.v2 Oct 31 00:56:57.286121 systemd[1]: Started cri-containerd-66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278.scope. Oct 31 00:56:57.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.301000 audit: BPF prog-id=123 op=LOAD Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2874 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:57.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663563613363616335663339353462616463313439663032343066 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2874 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:57.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663563613363616335663339353462616463313439663032343066 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit: BPF prog-id=124 op=LOAD Oct 31 00:56:57.302000 audit[2884]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2874 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:57.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663563613363616335663339353462616463313439663032343066 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit: BPF prog-id=125 op=LOAD Oct 31 00:56:57.302000 audit[2884]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2874 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:57.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663563613363616335663339353462616463313439663032343066 Oct 31 00:56:57.302000 audit: BPF prog-id=125 op=UNLOAD Oct 31 00:56:57.302000 audit: BPF prog-id=124 op=UNLOAD Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.302000 audit: BPF prog-id=126 op=LOAD Oct 31 00:56:57.302000 audit[2884]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2874 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:57.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663563613363616335663339353462616463313439663032343066 Oct 31 00:56:57.304307 systemd-resolved[1156]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 00:56:57.320277 env[1217]: time="2025-10-31T00:56:57.320223713Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:5928d05e-a5b6-4ab2-860d-fbc455fa5665,Namespace:default,Attempt:0,} returns sandbox id \"66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278\"" Oct 31 00:56:57.321747 env[1217]: time="2025-10-31T00:56:57.321706878Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 31 00:56:57.690789 env[1217]: time="2025-10-31T00:56:57.690748684Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:57.692082 env[1217]: time="2025-10-31T00:56:57.692042048Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:57.694377 env[1217]: time="2025-10-31T00:56:57.694350735Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:57.696333 env[1217]: time="2025-10-31T00:56:57.696306381Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 00:56:57.697196 env[1217]: time="2025-10-31T00:56:57.697169064Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024\"" Oct 31 00:56:57.702501 env[1217]: time="2025-10-31T00:56:57.702470640Z" level=info msg="CreateContainer within sandbox \"66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278\" for container &ContainerMetadata{Name:test,Attempt:0,}" Oct 31 00:56:57.715432 env[1217]: time="2025-10-31T00:56:57.715381000Z" level=info msg="CreateContainer within sandbox \"66f5ca3cac5f3954badc149f0240f7d163a03b831e55607abe2a4040980f7278\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"fb6cf41f38485ca45b2b52e9606ddbab65663e8c45658889a040151247d0ab26\"" Oct 31 00:56:57.715897 env[1217]: time="2025-10-31T00:56:57.715817041Z" level=info msg="StartContainer for \"fb6cf41f38485ca45b2b52e9606ddbab65663e8c45658889a040151247d0ab26\"" Oct 31 00:56:57.724410 kubelet[1453]: E1031 00:56:57.724358 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:57.736824 systemd[1]: Started cri-containerd-fb6cf41f38485ca45b2b52e9606ddbab65663e8c45658889a040151247d0ab26.scope. Oct 31 00:56:57.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.754000 audit: BPF prog-id=127 op=LOAD Oct 31 00:56:57.754000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.754000 audit[2915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2874 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:57.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662366366343166333834383563613435623262353265393630366464 Oct 31 00:56:57.754000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.754000 audit[2915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2874 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:57.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662366366343166333834383563613435623262353265393630366464 Oct 31 00:56:57.755000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.755000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.755000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.755000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.755000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.755000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.755000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.755000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.755000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.755000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.755000 audit: BPF prog-id=128 op=LOAD Oct 31 00:56:57.755000 audit[2915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2874 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:57.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662366366343166333834383563613435623262353265393630366464 Oct 31 00:56:57.755000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.755000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.755000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.755000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.755000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.755000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.755000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.755000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.755000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.755000 audit: BPF prog-id=129 op=LOAD Oct 31 00:56:57.755000 audit[2915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2874 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:57.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662366366343166333834383563613435623262353265393630366464 Oct 31 00:56:57.756000 audit: BPF prog-id=129 op=UNLOAD Oct 31 00:56:57.756000 audit: BPF prog-id=128 op=UNLOAD Oct 31 00:56:57.756000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.756000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.756000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.756000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.756000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.756000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.756000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.756000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.756000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.756000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 00:56:57.756000 audit: BPF prog-id=130 op=LOAD Oct 31 00:56:57.756000 audit[2915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2874 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 00:56:57.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662366366343166333834383563613435623262353265393630366464 Oct 31 00:56:57.769316 env[1217]: time="2025-10-31T00:56:57.769272324Z" level=info msg="StartContainer for \"fb6cf41f38485ca45b2b52e9606ddbab65663e8c45658889a040151247d0ab26\" returns successfully" Oct 31 00:56:57.903412 kubelet[1453]: I1031 00:56:57.903323 1453 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=11.525931022 podStartE2EDuration="11.903307534s" podCreationTimestamp="2025-10-31 00:56:46 +0000 UTC" firstStartedPulling="2025-10-31 00:56:57.321152396 +0000 UTC m=+45.783443719" lastFinishedPulling="2025-10-31 00:56:57.698528948 +0000 UTC m=+46.160820231" observedRunningTime="2025-10-31 00:56:57.902989413 +0000 UTC m=+46.365280736" watchObservedRunningTime="2025-10-31 00:56:57.903307534 +0000 UTC m=+46.365598857" Oct 31 00:56:58.367824 systemd[1]: run-containerd-runc-k8s.io-fb6cf41f38485ca45b2b52e9606ddbab65663e8c45658889a040151247d0ab26-runc.bw8K8E.mount: Deactivated successfully. Oct 31 00:56:58.725018 kubelet[1453]: E1031 00:56:58.724909 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:56:59.117676 systemd-networkd[1047]: cali5ec59c6bf6e: Gained IPv6LL Oct 31 00:56:59.725715 kubelet[1453]: E1031 00:56:59.725666 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:57:00.726748 kubelet[1453]: E1031 00:57:00.726691 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:57:01.728555 kubelet[1453]: E1031 00:57:01.728499 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:57:02.729356 kubelet[1453]: E1031 00:57:02.729312 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 00:57:03.730338 kubelet[1453]: E1031 00:57:03.730292 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"