Nov 1 00:43:36.987922 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Oct 31 23:02:53 -00 2025 Nov 1 00:43:36.987962 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 Nov 1 00:43:36.987984 kernel: BIOS-provided physical RAM map: Nov 1 00:43:36.987993 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Nov 1 00:43:36.988002 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Nov 1 00:43:36.988013 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Nov 1 00:43:36.988029 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdafff] usable Nov 1 00:43:36.988038 kernel: BIOS-e820: [mem 0x000000007ffdb000-0x000000007fffffff] reserved Nov 1 00:43:36.988049 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Nov 1 00:43:36.988059 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Nov 1 00:43:36.988068 kernel: NX (Execute Disable) protection: active Nov 1 00:43:36.988077 kernel: SMBIOS 2.8 present. Nov 1 00:43:36.988086 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 Nov 1 00:43:36.988096 kernel: Hypervisor detected: KVM Nov 1 00:43:36.988108 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Nov 1 00:43:36.988121 kernel: kvm-clock: cpu 0, msr 161a0001, primary cpu clock Nov 1 00:43:36.988131 kernel: kvm-clock: using sched offset of 4249528868 cycles Nov 1 00:43:36.988142 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Nov 1 00:43:36.988158 kernel: tsc: Detected 1995.307 MHz processor Nov 1 00:43:36.988169 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Nov 1 00:43:36.988180 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Nov 1 00:43:36.988191 kernel: last_pfn = 0x7ffdb max_arch_pfn = 0x400000000 Nov 1 00:43:36.988209 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Nov 1 00:43:36.988226 kernel: ACPI: Early table checksum verification disabled Nov 1 00:43:36.988238 kernel: ACPI: RSDP 0x00000000000F5950 000014 (v00 BOCHS ) Nov 1 00:43:36.988249 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 1 00:43:36.988259 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 1 00:43:36.992373 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 1 00:43:36.992384 kernel: ACPI: FACS 0x000000007FFE0000 000040 Nov 1 00:43:36.992393 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 1 00:43:36.992401 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 1 00:43:36.992409 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 1 00:43:36.992422 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 1 00:43:36.992430 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] Nov 1 00:43:36.992438 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] Nov 1 00:43:36.992446 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Nov 1 00:43:36.992455 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] Nov 1 00:43:36.992464 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] Nov 1 00:43:36.992472 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] Nov 1 00:43:36.992480 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] Nov 1 00:43:36.992494 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Nov 1 00:43:36.992502 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Nov 1 00:43:36.992510 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Nov 1 00:43:36.992518 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Nov 1 00:43:36.992527 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdafff] -> [mem 0x00000000-0x7ffdafff] Nov 1 00:43:36.992535 kernel: NODE_DATA(0) allocated [mem 0x7ffd5000-0x7ffdafff] Nov 1 00:43:36.992546 kernel: Zone ranges: Nov 1 00:43:36.992554 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Nov 1 00:43:36.992562 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdafff] Nov 1 00:43:36.992570 kernel: Normal empty Nov 1 00:43:36.992578 kernel: Movable zone start for each node Nov 1 00:43:36.992586 kernel: Early memory node ranges Nov 1 00:43:36.992594 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Nov 1 00:43:36.992602 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdafff] Nov 1 00:43:36.992610 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdafff] Nov 1 00:43:36.992620 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Nov 1 00:43:36.992637 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Nov 1 00:43:36.992645 kernel: On node 0, zone DMA32: 37 pages in unavailable ranges Nov 1 00:43:36.992653 kernel: ACPI: PM-Timer IO Port: 0x608 Nov 1 00:43:36.992661 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Nov 1 00:43:36.992669 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Nov 1 00:43:36.992677 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Nov 1 00:43:36.992685 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Nov 1 00:43:36.992693 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Nov 1 00:43:36.992704 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Nov 1 00:43:36.992716 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Nov 1 00:43:36.992724 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Nov 1 00:43:36.992733 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Nov 1 00:43:36.992741 kernel: TSC deadline timer available Nov 1 00:43:36.992749 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Nov 1 00:43:36.992757 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Nov 1 00:43:36.992764 kernel: Booting paravirtualized kernel on KVM Nov 1 00:43:36.992773 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Nov 1 00:43:36.992784 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Nov 1 00:43:36.992792 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Nov 1 00:43:36.992800 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Nov 1 00:43:36.992808 kernel: pcpu-alloc: [0] 0 1 Nov 1 00:43:36.992816 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Nov 1 00:43:36.992824 kernel: kvm-guest: PV spinlocks disabled, no host support Nov 1 00:43:36.992832 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515803 Nov 1 00:43:36.992840 kernel: Policy zone: DMA32 Nov 1 00:43:36.992850 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 Nov 1 00:43:36.992861 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Nov 1 00:43:36.992869 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Nov 1 00:43:36.992877 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Nov 1 00:43:36.992885 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Nov 1 00:43:36.992894 kernel: Memory: 1973276K/2096612K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 123076K reserved, 0K cma-reserved) Nov 1 00:43:36.992902 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Nov 1 00:43:36.992910 kernel: Kernel/User page tables isolation: enabled Nov 1 00:43:36.992918 kernel: ftrace: allocating 34614 entries in 136 pages Nov 1 00:43:36.992928 kernel: ftrace: allocated 136 pages with 2 groups Nov 1 00:43:36.992936 kernel: rcu: Hierarchical RCU implementation. Nov 1 00:43:36.992945 kernel: rcu: RCU event tracing is enabled. Nov 1 00:43:36.992953 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Nov 1 00:43:36.992961 kernel: Rude variant of Tasks RCU enabled. Nov 1 00:43:36.992969 kernel: Tracing variant of Tasks RCU enabled. Nov 1 00:43:36.992977 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Nov 1 00:43:36.992987 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Nov 1 00:43:36.992995 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Nov 1 00:43:36.993008 kernel: random: crng init done Nov 1 00:43:36.993020 kernel: Console: colour VGA+ 80x25 Nov 1 00:43:36.993034 kernel: printk: console [tty0] enabled Nov 1 00:43:36.993048 kernel: printk: console [ttyS0] enabled Nov 1 00:43:36.993061 kernel: ACPI: Core revision 20210730 Nov 1 00:43:36.993074 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Nov 1 00:43:36.993087 kernel: APIC: Switch to symmetric I/O mode setup Nov 1 00:43:36.993099 kernel: x2apic enabled Nov 1 00:43:36.993107 kernel: Switched APIC routing to physical x2apic. Nov 1 00:43:36.993115 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Nov 1 00:43:36.993126 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3985ba32100, max_idle_ns: 881590654722 ns Nov 1 00:43:36.993134 kernel: Calibrating delay loop (skipped) preset value.. 3990.61 BogoMIPS (lpj=1995307) Nov 1 00:43:36.993150 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Nov 1 00:43:36.993159 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Nov 1 00:43:36.993167 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Nov 1 00:43:36.993175 kernel: Spectre V2 : Mitigation: Retpolines Nov 1 00:43:36.993183 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Nov 1 00:43:36.993191 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Nov 1 00:43:36.993201 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Nov 1 00:43:36.993217 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Nov 1 00:43:36.993226 kernel: MDS: Mitigation: Clear CPU buffers Nov 1 00:43:36.993236 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Nov 1 00:43:36.993245 kernel: active return thunk: its_return_thunk Nov 1 00:43:36.993253 kernel: ITS: Mitigation: Aligned branch/return thunks Nov 1 00:43:36.993279 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Nov 1 00:43:36.993288 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Nov 1 00:43:36.993296 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Nov 1 00:43:36.993305 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Nov 1 00:43:36.993316 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Nov 1 00:43:36.993325 kernel: Freeing SMP alternatives memory: 32K Nov 1 00:43:36.993333 kernel: pid_max: default: 32768 minimum: 301 Nov 1 00:43:36.993341 kernel: LSM: Security Framework initializing Nov 1 00:43:36.993350 kernel: SELinux: Initializing. Nov 1 00:43:36.993361 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Nov 1 00:43:36.993369 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Nov 1 00:43:36.993380 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x4f, stepping: 0x1) Nov 1 00:43:36.993388 kernel: Performance Events: unsupported p6 CPU model 79 no PMU driver, software events only. Nov 1 00:43:36.993397 kernel: signal: max sigframe size: 1776 Nov 1 00:43:36.993405 kernel: rcu: Hierarchical SRCU implementation. Nov 1 00:43:36.993414 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Nov 1 00:43:36.993422 kernel: smp: Bringing up secondary CPUs ... Nov 1 00:43:36.993430 kernel: x86: Booting SMP configuration: Nov 1 00:43:36.993438 kernel: .... node #0, CPUs: #1 Nov 1 00:43:36.993447 kernel: kvm-clock: cpu 1, msr 161a0041, secondary cpu clock Nov 1 00:43:36.993458 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Nov 1 00:43:36.993466 kernel: smp: Brought up 1 node, 2 CPUs Nov 1 00:43:36.993475 kernel: smpboot: Max logical packages: 1 Nov 1 00:43:36.993483 kernel: smpboot: Total of 2 processors activated (7981.22 BogoMIPS) Nov 1 00:43:36.993494 kernel: devtmpfs: initialized Nov 1 00:43:36.993503 kernel: x86/mm: Memory block size: 128MB Nov 1 00:43:36.993512 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Nov 1 00:43:36.993520 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Nov 1 00:43:36.993528 kernel: pinctrl core: initialized pinctrl subsystem Nov 1 00:43:36.993539 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Nov 1 00:43:36.993547 kernel: audit: initializing netlink subsys (disabled) Nov 1 00:43:36.993555 kernel: audit: type=2000 audit(1761957816.279:1): state=initialized audit_enabled=0 res=1 Nov 1 00:43:36.993564 kernel: thermal_sys: Registered thermal governor 'step_wise' Nov 1 00:43:36.993572 kernel: thermal_sys: Registered thermal governor 'user_space' Nov 1 00:43:36.993580 kernel: cpuidle: using governor menu Nov 1 00:43:36.993594 kernel: ACPI: bus type PCI registered Nov 1 00:43:36.993602 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Nov 1 00:43:36.993611 kernel: dca service started, version 1.12.1 Nov 1 00:43:36.993622 kernel: PCI: Using configuration type 1 for base access Nov 1 00:43:36.993631 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Nov 1 00:43:36.993639 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Nov 1 00:43:36.993647 kernel: ACPI: Added _OSI(Module Device) Nov 1 00:43:36.993655 kernel: ACPI: Added _OSI(Processor Device) Nov 1 00:43:36.993664 kernel: ACPI: Added _OSI(Processor Aggregator Device) Nov 1 00:43:36.993672 kernel: ACPI: Added _OSI(Linux-Dell-Video) Nov 1 00:43:36.993680 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Nov 1 00:43:36.993688 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Nov 1 00:43:36.993699 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Nov 1 00:43:36.993708 kernel: ACPI: Interpreter enabled Nov 1 00:43:36.993716 kernel: ACPI: PM: (supports S0 S5) Nov 1 00:43:36.993724 kernel: ACPI: Using IOAPIC for interrupt routing Nov 1 00:43:36.993733 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Nov 1 00:43:36.993741 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Nov 1 00:43:36.993749 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Nov 1 00:43:36.994092 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Nov 1 00:43:36.994209 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Nov 1 00:43:36.994222 kernel: acpiphp: Slot [3] registered Nov 1 00:43:36.994233 kernel: acpiphp: Slot [4] registered Nov 1 00:43:36.994242 kernel: acpiphp: Slot [5] registered Nov 1 00:43:36.994251 kernel: acpiphp: Slot [6] registered Nov 1 00:43:36.994259 kernel: acpiphp: Slot [7] registered Nov 1 00:43:36.994282 kernel: acpiphp: Slot [8] registered Nov 1 00:43:36.994290 kernel: acpiphp: Slot [9] registered Nov 1 00:43:36.994299 kernel: acpiphp: Slot [10] registered Nov 1 00:43:36.994310 kernel: acpiphp: Slot [11] registered Nov 1 00:43:36.994319 kernel: acpiphp: Slot [12] registered Nov 1 00:43:36.994327 kernel: acpiphp: Slot [13] registered Nov 1 00:43:36.994335 kernel: acpiphp: Slot [14] registered Nov 1 00:43:36.994344 kernel: acpiphp: Slot [15] registered Nov 1 00:43:36.994352 kernel: acpiphp: Slot [16] registered Nov 1 00:43:36.994364 kernel: acpiphp: Slot [17] registered Nov 1 00:43:36.994372 kernel: acpiphp: Slot [18] registered Nov 1 00:43:36.994383 kernel: acpiphp: Slot [19] registered Nov 1 00:43:36.994402 kernel: acpiphp: Slot [20] registered Nov 1 00:43:36.994414 kernel: acpiphp: Slot [21] registered Nov 1 00:43:36.994425 kernel: acpiphp: Slot [22] registered Nov 1 00:43:36.994436 kernel: acpiphp: Slot [23] registered Nov 1 00:43:36.994448 kernel: acpiphp: Slot [24] registered Nov 1 00:43:36.994459 kernel: acpiphp: Slot [25] registered Nov 1 00:43:36.994469 kernel: acpiphp: Slot [26] registered Nov 1 00:43:36.994480 kernel: acpiphp: Slot [27] registered Nov 1 00:43:36.994491 kernel: acpiphp: Slot [28] registered Nov 1 00:43:36.994502 kernel: acpiphp: Slot [29] registered Nov 1 00:43:36.994517 kernel: acpiphp: Slot [30] registered Nov 1 00:43:36.994529 kernel: acpiphp: Slot [31] registered Nov 1 00:43:36.994542 kernel: PCI host bridge to bus 0000:00 Nov 1 00:43:36.994678 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Nov 1 00:43:36.994766 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Nov 1 00:43:36.994849 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Nov 1 00:43:36.994935 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Nov 1 00:43:36.995042 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Nov 1 00:43:36.995161 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Nov 1 00:43:36.995314 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Nov 1 00:43:36.995495 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Nov 1 00:43:36.995669 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Nov 1 00:43:36.995806 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] Nov 1 00:43:36.995907 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Nov 1 00:43:36.996010 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Nov 1 00:43:36.996139 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Nov 1 00:43:36.996232 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Nov 1 00:43:36.996362 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Nov 1 00:43:36.996452 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] Nov 1 00:43:36.996571 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Nov 1 00:43:36.996670 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Nov 1 00:43:36.996761 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Nov 1 00:43:36.996860 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Nov 1 00:43:36.996953 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Nov 1 00:43:36.997054 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Nov 1 00:43:36.997147 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] Nov 1 00:43:36.997238 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Nov 1 00:43:37.004584 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Nov 1 00:43:37.004777 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Nov 1 00:43:37.004888 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] Nov 1 00:43:37.005004 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] Nov 1 00:43:37.005100 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Nov 1 00:43:37.005250 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Nov 1 00:43:37.005405 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] Nov 1 00:43:37.005509 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] Nov 1 00:43:37.005621 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Nov 1 00:43:37.005767 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 Nov 1 00:43:37.005954 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] Nov 1 00:43:37.006081 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] Nov 1 00:43:37.006219 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Nov 1 00:43:37.006392 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 Nov 1 00:43:37.006513 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] Nov 1 00:43:37.006627 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] Nov 1 00:43:37.006751 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Nov 1 00:43:37.006912 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 Nov 1 00:43:37.007021 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] Nov 1 00:43:37.007116 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] Nov 1 00:43:37.007216 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] Nov 1 00:43:37.007373 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 Nov 1 00:43:37.007477 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] Nov 1 00:43:37.007590 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] Nov 1 00:43:37.007606 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Nov 1 00:43:37.007619 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Nov 1 00:43:37.007630 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Nov 1 00:43:37.007649 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Nov 1 00:43:37.007662 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Nov 1 00:43:37.007674 kernel: iommu: Default domain type: Translated Nov 1 00:43:37.007682 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Nov 1 00:43:37.007829 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Nov 1 00:43:37.007977 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Nov 1 00:43:37.008124 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Nov 1 00:43:37.008139 kernel: vgaarb: loaded Nov 1 00:43:37.008151 kernel: pps_core: LinuxPPS API ver. 1 registered Nov 1 00:43:37.008169 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Nov 1 00:43:37.008181 kernel: PTP clock support registered Nov 1 00:43:37.008193 kernel: PCI: Using ACPI for IRQ routing Nov 1 00:43:37.008205 kernel: PCI: pci_cache_line_size set to 64 bytes Nov 1 00:43:37.008219 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Nov 1 00:43:37.008230 kernel: e820: reserve RAM buffer [mem 0x7ffdb000-0x7fffffff] Nov 1 00:43:37.008242 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Nov 1 00:43:37.008256 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Nov 1 00:43:37.008296 kernel: clocksource: Switched to clocksource kvm-clock Nov 1 00:43:37.008318 kernel: VFS: Disk quotas dquot_6.6.0 Nov 1 00:43:37.008331 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Nov 1 00:43:37.008344 kernel: pnp: PnP ACPI init Nov 1 00:43:37.008355 kernel: pnp: PnP ACPI: found 4 devices Nov 1 00:43:37.008367 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Nov 1 00:43:37.008379 kernel: NET: Registered PF_INET protocol family Nov 1 00:43:37.008392 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Nov 1 00:43:37.008404 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Nov 1 00:43:37.008420 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Nov 1 00:43:37.008434 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Nov 1 00:43:37.008446 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Nov 1 00:43:37.008454 kernel: TCP: Hash tables configured (established 16384 bind 16384) Nov 1 00:43:37.008463 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Nov 1 00:43:37.008472 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Nov 1 00:43:37.008481 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Nov 1 00:43:37.008489 kernel: NET: Registered PF_XDP protocol family Nov 1 00:43:37.008610 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Nov 1 00:43:37.008714 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Nov 1 00:43:37.008824 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Nov 1 00:43:37.008926 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Nov 1 00:43:37.009031 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Nov 1 00:43:37.009161 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Nov 1 00:43:37.016433 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Nov 1 00:43:37.016588 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Nov 1 00:43:37.016603 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Nov 1 00:43:37.016708 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x740 took 37679 usecs Nov 1 00:43:37.016720 kernel: PCI: CLS 0 bytes, default 64 Nov 1 00:43:37.016729 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Nov 1 00:43:37.016742 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x3985ba32100, max_idle_ns: 881590654722 ns Nov 1 00:43:37.016750 kernel: Initialise system trusted keyrings Nov 1 00:43:37.016760 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Nov 1 00:43:37.016768 kernel: Key type asymmetric registered Nov 1 00:43:37.016777 kernel: Asymmetric key parser 'x509' registered Nov 1 00:43:37.016785 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Nov 1 00:43:37.016797 kernel: io scheduler mq-deadline registered Nov 1 00:43:37.016805 kernel: io scheduler kyber registered Nov 1 00:43:37.016813 kernel: io scheduler bfq registered Nov 1 00:43:37.016822 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Nov 1 00:43:37.016831 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Nov 1 00:43:37.016839 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Nov 1 00:43:37.016848 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Nov 1 00:43:37.016857 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Nov 1 00:43:37.016869 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Nov 1 00:43:37.016882 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Nov 1 00:43:37.016892 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Nov 1 00:43:37.016900 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Nov 1 00:43:37.016909 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Nov 1 00:43:37.017056 kernel: rtc_cmos 00:03: RTC can wake from S4 Nov 1 00:43:37.017160 kernel: rtc_cmos 00:03: registered as rtc0 Nov 1 00:43:37.017245 kernel: rtc_cmos 00:03: setting system clock to 2025-11-01T00:43:36 UTC (1761957816) Nov 1 00:43:37.017365 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Nov 1 00:43:37.017376 kernel: intel_pstate: CPU model not supported Nov 1 00:43:37.017385 kernel: NET: Registered PF_INET6 protocol family Nov 1 00:43:37.017393 kernel: Segment Routing with IPv6 Nov 1 00:43:37.017402 kernel: In-situ OAM (IOAM) with IPv6 Nov 1 00:43:37.017413 kernel: NET: Registered PF_PACKET protocol family Nov 1 00:43:37.017422 kernel: Key type dns_resolver registered Nov 1 00:43:37.017431 kernel: IPI shorthand broadcast: enabled Nov 1 00:43:37.017439 kernel: sched_clock: Marking stable (890150274, 268344997)->(1413665244, -255169973) Nov 1 00:43:37.017448 kernel: registered taskstats version 1 Nov 1 00:43:37.017459 kernel: Loading compiled-in X.509 certificates Nov 1 00:43:37.017468 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: f2055682e6899ad8548fd369019e7b47939b46a0' Nov 1 00:43:37.017476 kernel: Key type .fscrypt registered Nov 1 00:43:37.017485 kernel: Key type fscrypt-provisioning registered Nov 1 00:43:37.017493 kernel: ima: No TPM chip found, activating TPM-bypass! Nov 1 00:43:37.017502 kernel: ima: Allocated hash algorithm: sha1 Nov 1 00:43:37.017510 kernel: ima: No architecture policies found Nov 1 00:43:37.017519 kernel: clk: Disabling unused clocks Nov 1 00:43:37.017529 kernel: Freeing unused kernel image (initmem) memory: 47496K Nov 1 00:43:37.017539 kernel: Write protecting the kernel read-only data: 28672k Nov 1 00:43:37.017553 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Nov 1 00:43:37.017567 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Nov 1 00:43:37.017580 kernel: Run /init as init process Nov 1 00:43:37.017593 kernel: with arguments: Nov 1 00:43:37.017621 kernel: /init Nov 1 00:43:37.017633 kernel: with environment: Nov 1 00:43:37.017641 kernel: HOME=/ Nov 1 00:43:37.017652 kernel: TERM=linux Nov 1 00:43:37.017661 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Nov 1 00:43:37.017674 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 1 00:43:37.017686 systemd[1]: Detected virtualization kvm. Nov 1 00:43:37.017696 systemd[1]: Detected architecture x86-64. Nov 1 00:43:37.017705 systemd[1]: Running in initrd. Nov 1 00:43:37.017714 systemd[1]: No hostname configured, using default hostname. Nov 1 00:43:37.017723 systemd[1]: Hostname set to . Nov 1 00:43:37.017735 systemd[1]: Initializing machine ID from VM UUID. Nov 1 00:43:37.017750 systemd[1]: Queued start job for default target initrd.target. Nov 1 00:43:37.017764 systemd[1]: Started systemd-ask-password-console.path. Nov 1 00:43:37.017794 systemd[1]: Reached target cryptsetup.target. Nov 1 00:43:37.017807 systemd[1]: Reached target paths.target. Nov 1 00:43:37.017816 systemd[1]: Reached target slices.target. Nov 1 00:43:37.017826 systemd[1]: Reached target swap.target. Nov 1 00:43:37.017835 systemd[1]: Reached target timers.target. Nov 1 00:43:37.017848 systemd[1]: Listening on iscsid.socket. Nov 1 00:43:37.017858 systemd[1]: Listening on iscsiuio.socket. Nov 1 00:43:37.017870 systemd[1]: Listening on systemd-journald-audit.socket. Nov 1 00:43:37.017879 systemd[1]: Listening on systemd-journald-dev-log.socket. Nov 1 00:43:37.017888 systemd[1]: Listening on systemd-journald.socket. Nov 1 00:43:37.017900 systemd[1]: Listening on systemd-networkd.socket. Nov 1 00:43:37.017913 systemd[1]: Listening on systemd-udevd-control.socket. Nov 1 00:43:37.017925 systemd[1]: Listening on systemd-udevd-kernel.socket. Nov 1 00:43:37.017940 systemd[1]: Reached target sockets.target. Nov 1 00:43:37.017956 systemd[1]: Starting kmod-static-nodes.service... Nov 1 00:43:37.017968 systemd[1]: Finished network-cleanup.service. Nov 1 00:43:37.017978 systemd[1]: Starting systemd-fsck-usr.service... Nov 1 00:43:37.017987 systemd[1]: Starting systemd-journald.service... Nov 1 00:43:37.017999 systemd[1]: Starting systemd-modules-load.service... Nov 1 00:43:37.018009 systemd[1]: Starting systemd-resolved.service... Nov 1 00:43:37.018019 systemd[1]: Starting systemd-vconsole-setup.service... Nov 1 00:43:37.018035 systemd[1]: Finished kmod-static-nodes.service. Nov 1 00:43:37.018057 systemd-journald[184]: Journal started Nov 1 00:43:37.018144 systemd-journald[184]: Runtime Journal (/run/log/journal/385063b434574f118e9081835bc96168) is 4.9M, max 39.5M, 34.5M free. Nov 1 00:43:36.989905 systemd-modules-load[185]: Inserted module 'overlay' Nov 1 00:43:37.120888 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Nov 1 00:43:37.120919 kernel: Bridge firewalling registered Nov 1 00:43:37.120932 kernel: SCSI subsystem initialized Nov 1 00:43:37.120944 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Nov 1 00:43:37.120962 kernel: device-mapper: uevent: version 1.0.3 Nov 1 00:43:37.120974 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Nov 1 00:43:37.120986 systemd[1]: Started systemd-journald.service. Nov 1 00:43:37.121001 kernel: audit: type=1130 audit(1761957817.111:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.030511 systemd-resolved[186]: Positive Trust Anchors: Nov 1 00:43:37.128182 kernel: audit: type=1130 audit(1761957817.121:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.030522 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Nov 1 00:43:37.135505 kernel: audit: type=1130 audit(1761957817.128:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.030560 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Nov 1 00:43:37.144623 kernel: audit: type=1130 audit(1761957817.135:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.037506 systemd-resolved[186]: Defaulting to hostname 'linux'. Nov 1 00:43:37.153451 kernel: audit: type=1130 audit(1761957817.145:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.047512 systemd-modules-load[185]: Inserted module 'br_netfilter' Nov 1 00:43:37.161192 kernel: audit: type=1130 audit(1761957817.154:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.086284 systemd-modules-load[185]: Inserted module 'dm_multipath' Nov 1 00:43:37.121764 systemd[1]: Started systemd-resolved.service. Nov 1 00:43:37.129084 systemd[1]: Finished systemd-fsck-usr.service. Nov 1 00:43:37.136557 systemd[1]: Finished systemd-modules-load.service. Nov 1 00:43:37.145906 systemd[1]: Finished systemd-vconsole-setup.service. Nov 1 00:43:37.154640 systemd[1]: Reached target nss-lookup.target. Nov 1 00:43:37.163137 systemd[1]: Starting dracut-cmdline-ask.service... Nov 1 00:43:37.165215 systemd[1]: Starting systemd-sysctl.service... Nov 1 00:43:37.169896 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Nov 1 00:43:37.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.179106 systemd[1]: Finished systemd-sysctl.service. Nov 1 00:43:37.195967 kernel: audit: type=1130 audit(1761957817.179:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.196282 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Nov 1 00:43:37.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.206295 kernel: audit: type=1130 audit(1761957817.197:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.205638 systemd[1]: Finished dracut-cmdline-ask.service. Nov 1 00:43:37.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.207397 systemd[1]: Starting dracut-cmdline.service... Nov 1 00:43:37.214486 kernel: audit: type=1130 audit(1761957817.206:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.219423 dracut-cmdline[207]: dracut-dracut-053 Nov 1 00:43:37.222337 dracut-cmdline[207]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 Nov 1 00:43:37.323334 kernel: Loading iSCSI transport class v2.0-870. Nov 1 00:43:37.354329 kernel: iscsi: registered transport (tcp) Nov 1 00:43:37.396170 kernel: iscsi: registered transport (qla4xxx) Nov 1 00:43:37.396304 kernel: QLogic iSCSI HBA Driver Nov 1 00:43:37.453228 systemd[1]: Finished dracut-cmdline.service. Nov 1 00:43:37.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.456066 systemd[1]: Starting dracut-pre-udev.service... Nov 1 00:43:37.524373 kernel: raid6: avx2x4 gen() 26375 MB/s Nov 1 00:43:37.542367 kernel: raid6: avx2x4 xor() 8279 MB/s Nov 1 00:43:37.560366 kernel: raid6: avx2x2 gen() 26872 MB/s Nov 1 00:43:37.578359 kernel: raid6: avx2x2 xor() 16311 MB/s Nov 1 00:43:37.596358 kernel: raid6: avx2x1 gen() 15420 MB/s Nov 1 00:43:37.614369 kernel: raid6: avx2x1 xor() 13503 MB/s Nov 1 00:43:37.632360 kernel: raid6: sse2x4 gen() 11733 MB/s Nov 1 00:43:37.650380 kernel: raid6: sse2x4 xor() 5331 MB/s Nov 1 00:43:37.668353 kernel: raid6: sse2x2 gen() 8692 MB/s Nov 1 00:43:37.686359 kernel: raid6: sse2x2 xor() 6489 MB/s Nov 1 00:43:37.704354 kernel: raid6: sse2x1 gen() 5566 MB/s Nov 1 00:43:37.723684 kernel: raid6: sse2x1 xor() 4573 MB/s Nov 1 00:43:37.723805 kernel: raid6: using algorithm avx2x2 gen() 26872 MB/s Nov 1 00:43:37.723826 kernel: raid6: .... xor() 16311 MB/s, rmw enabled Nov 1 00:43:37.725256 kernel: raid6: using avx2x2 recovery algorithm Nov 1 00:43:37.744343 kernel: xor: automatically using best checksumming function avx Nov 1 00:43:37.915328 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Nov 1 00:43:37.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.931598 systemd[1]: Finished dracut-pre-udev.service. Nov 1 00:43:37.933000 audit: BPF prog-id=7 op=LOAD Nov 1 00:43:37.933000 audit: BPF prog-id=8 op=LOAD Nov 1 00:43:37.934210 systemd[1]: Starting systemd-udevd.service... Nov 1 00:43:37.958380 systemd-udevd[384]: Using default interface naming scheme 'v252'. Nov 1 00:43:37.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.967256 systemd[1]: Started systemd-udevd.service. Nov 1 00:43:37.969166 systemd[1]: Starting dracut-pre-trigger.service... Nov 1 00:43:37.992417 dracut-pre-trigger[389]: rd.md=0: removing MD RAID activation Nov 1 00:43:38.038695 systemd[1]: Finished dracut-pre-trigger.service. Nov 1 00:43:38.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:38.040627 systemd[1]: Starting systemd-udev-trigger.service... Nov 1 00:43:38.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:38.100709 systemd[1]: Finished systemd-udev-trigger.service. Nov 1 00:43:38.168394 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Nov 1 00:43:38.251258 kernel: cryptd: max_cpu_qlen set to 1000 Nov 1 00:43:38.251302 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Nov 1 00:43:38.251316 kernel: GPT:9289727 != 125829119 Nov 1 00:43:38.251327 kernel: GPT:Alternate GPT header not at the end of the disk. Nov 1 00:43:38.251339 kernel: scsi host0: Virtio SCSI HBA Nov 1 00:43:38.251533 kernel: GPT:9289727 != 125829119 Nov 1 00:43:38.251553 kernel: GPT: Use GNU Parted to correct GPT errors. Nov 1 00:43:38.251580 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Nov 1 00:43:38.256841 kernel: virtio_blk virtio5: [vdb] 932 512-byte logical blocks (477 kB/466 KiB) Nov 1 00:43:38.270324 kernel: libata version 3.00 loaded. Nov 1 00:43:38.273721 kernel: ata_piix 0000:00:01.1: version 2.13 Nov 1 00:43:38.296750 kernel: AVX2 version of gcm_enc/dec engaged. Nov 1 00:43:38.296774 kernel: AES CTR mode by8 optimization enabled Nov 1 00:43:38.296786 kernel: scsi host1: ata_piix Nov 1 00:43:38.297003 kernel: scsi host2: ata_piix Nov 1 00:43:38.297159 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 Nov 1 00:43:38.297172 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 Nov 1 00:43:38.304299 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (434) Nov 1 00:43:38.309787 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Nov 1 00:43:38.431415 kernel: ACPI: bus type USB registered Nov 1 00:43:38.431461 kernel: usbcore: registered new interface driver usbfs Nov 1 00:43:38.431473 kernel: usbcore: registered new interface driver hub Nov 1 00:43:38.431484 kernel: usbcore: registered new device driver usb Nov 1 00:43:38.438208 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Nov 1 00:43:38.441706 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Nov 1 00:43:38.442572 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Nov 1 00:43:38.451564 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Nov 1 00:43:38.454742 systemd[1]: Starting disk-uuid.service... Nov 1 00:43:38.461809 disk-uuid[504]: Primary Header is updated. Nov 1 00:43:38.461809 disk-uuid[504]: Secondary Entries is updated. Nov 1 00:43:38.461809 disk-uuid[504]: Secondary Header is updated. Nov 1 00:43:38.469296 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Nov 1 00:43:38.483306 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Nov 1 00:43:38.483439 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Nov 1 00:43:38.489303 kernel: ehci-pci: EHCI PCI platform driver Nov 1 00:43:38.492295 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Nov 1 00:43:38.497304 kernel: uhci_hcd: USB Universal Host Controller Interface driver Nov 1 00:43:38.558324 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Nov 1 00:43:38.596286 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Nov 1 00:43:38.596437 kernel: uhci_hcd 0000:00:01.2: detected 2 ports Nov 1 00:43:38.596558 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 Nov 1 00:43:38.596662 kernel: hub 1-0:1.0: USB hub found Nov 1 00:43:38.596809 kernel: hub 1-0:1.0: 2 ports detected Nov 1 00:43:39.479304 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Nov 1 00:43:39.479391 disk-uuid[505]: The operation has completed successfully. Nov 1 00:43:39.522125 systemd[1]: disk-uuid.service: Deactivated successfully. Nov 1 00:43:39.523596 systemd[1]: Finished disk-uuid.service. Nov 1 00:43:39.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:39.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:39.527334 systemd[1]: Starting verity-setup.service... Nov 1 00:43:39.550323 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Nov 1 00:43:39.602732 systemd[1]: Found device dev-mapper-usr.device. Nov 1 00:43:39.604835 systemd[1]: Mounting sysusr-usr.mount... Nov 1 00:43:39.607300 systemd[1]: Finished verity-setup.service. Nov 1 00:43:39.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:39.711316 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Nov 1 00:43:39.712392 systemd[1]: Mounted sysusr-usr.mount. Nov 1 00:43:39.713366 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Nov 1 00:43:39.714503 systemd[1]: Starting ignition-setup.service... Nov 1 00:43:39.719037 systemd[1]: Starting parse-ip-for-networkd.service... Nov 1 00:43:39.737255 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Nov 1 00:43:39.737363 kernel: BTRFS info (device vda6): using free space tree Nov 1 00:43:39.737377 kernel: BTRFS info (device vda6): has skinny extents Nov 1 00:43:39.758319 systemd[1]: mnt-oem.mount: Deactivated successfully. Nov 1 00:43:39.766815 systemd[1]: Finished ignition-setup.service. Nov 1 00:43:39.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:39.770066 systemd[1]: Starting ignition-fetch-offline.service... Nov 1 00:43:39.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:39.918000 audit: BPF prog-id=9 op=LOAD Nov 1 00:43:39.916782 ignition[606]: Ignition 2.14.0 Nov 1 00:43:39.917036 systemd[1]: Finished parse-ip-for-networkd.service. Nov 1 00:43:39.916799 ignition[606]: Stage: fetch-offline Nov 1 00:43:39.916912 ignition[606]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:43:39.923162 systemd[1]: Starting systemd-networkd.service... Nov 1 00:43:39.916941 ignition[606]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Nov 1 00:43:39.924422 systemd[1]: Finished ignition-fetch-offline.service. Nov 1 00:43:39.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:39.921393 ignition[606]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Nov 1 00:43:39.921557 ignition[606]: parsed url from cmdline: "" Nov 1 00:43:39.921562 ignition[606]: no config URL provided Nov 1 00:43:39.921568 ignition[606]: reading system config file "/usr/lib/ignition/user.ign" Nov 1 00:43:39.921579 ignition[606]: no config at "/usr/lib/ignition/user.ign" Nov 1 00:43:39.921585 ignition[606]: failed to fetch config: resource requires networking Nov 1 00:43:39.921718 ignition[606]: Ignition finished successfully Nov 1 00:43:39.952609 systemd-networkd[689]: lo: Link UP Nov 1 00:43:39.952622 systemd-networkd[689]: lo: Gained carrier Nov 1 00:43:39.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:39.954120 systemd-networkd[689]: Enumeration completed Nov 1 00:43:39.954386 systemd[1]: Started systemd-networkd.service. Nov 1 00:43:39.954928 systemd-networkd[689]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. Nov 1 00:43:39.955500 systemd[1]: Reached target network.target. Nov 1 00:43:39.957005 systemd-networkd[689]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. Nov 1 00:43:39.958422 systemd[1]: Starting ignition-fetch.service... Nov 1 00:43:39.958854 systemd-networkd[689]: eth1: Link UP Nov 1 00:43:39.958859 systemd-networkd[689]: eth1: Gained carrier Nov 1 00:43:39.965007 systemd[1]: Starting iscsiuio.service... Nov 1 00:43:39.973329 systemd-networkd[689]: eth0: Link UP Nov 1 00:43:39.973337 systemd-networkd[689]: eth0: Gained carrier Nov 1 00:43:39.987756 ignition[691]: Ignition 2.14.0 Nov 1 00:43:39.987787 ignition[691]: Stage: fetch Nov 1 00:43:39.987989 ignition[691]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:43:39.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:39.988028 ignition[691]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Nov 1 00:43:39.994576 systemd[1]: Started iscsiuio.service. Nov 1 00:43:39.995605 ignition[691]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Nov 1 00:43:39.995755 ignition[691]: parsed url from cmdline: "" Nov 1 00:43:39.995761 ignition[691]: no config URL provided Nov 1 00:43:39.998140 systemd[1]: Starting iscsid.service... Nov 1 00:43:39.995768 ignition[691]: reading system config file "/usr/lib/ignition/user.ign" Nov 1 00:43:40.001434 systemd-networkd[689]: eth0: DHCPv4 address 146.190.149.44/20, gateway 146.190.144.1 acquired from 169.254.169.253 Nov 1 00:43:40.009515 iscsid[699]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Nov 1 00:43:40.009515 iscsid[699]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Nov 1 00:43:40.009515 iscsid[699]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Nov 1 00:43:40.009515 iscsid[699]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Nov 1 00:43:40.009515 iscsid[699]: If using hardware iscsi like qla4xxx this message can be ignored. Nov 1 00:43:40.009515 iscsid[699]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Nov 1 00:43:40.009515 iscsid[699]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Nov 1 00:43:40.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:39.995778 ignition[691]: no config at "/usr/lib/ignition/user.ign" Nov 1 00:43:40.006889 systemd-networkd[689]: eth1: DHCPv4 address 10.124.0.32/20 acquired from 169.254.169.253 Nov 1 00:43:39.995818 ignition[691]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 Nov 1 00:43:40.008573 systemd[1]: Started iscsid.service. Nov 1 00:43:40.013354 systemd[1]: Starting dracut-initqueue.service... Nov 1 00:43:40.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:40.032013 systemd[1]: Finished dracut-initqueue.service. Nov 1 00:43:40.033094 systemd[1]: Reached target remote-fs-pre.target. Nov 1 00:43:40.033914 systemd[1]: Reached target remote-cryptsetup.target. Nov 1 00:43:40.034677 systemd[1]: Reached target remote-fs.target. Nov 1 00:43:40.036517 systemd[1]: Starting dracut-pre-mount.service... Nov 1 00:43:40.049934 systemd[1]: Finished dracut-pre-mount.service. Nov 1 00:43:40.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:40.082729 ignition[691]: GET result: OK Nov 1 00:43:40.082875 ignition[691]: parsing config with SHA512: 2564255015d510ba906dd8be3b7d72068e51c10945062e810d87cb0ec089b6908cb1f32ec74bf4fa1e16df5543b96cd618a5c4ba0de7f40f65b78f5563aaba9a Nov 1 00:43:40.090320 unknown[691]: fetched base config from "system" Nov 1 00:43:40.090344 unknown[691]: fetched base config from "system" Nov 1 00:43:40.090354 unknown[691]: fetched user config from "digitalocean" Nov 1 00:43:40.094727 ignition[691]: fetch: fetch complete Nov 1 00:43:40.095593 ignition[691]: fetch: fetch passed Nov 1 00:43:40.096456 ignition[691]: Ignition finished successfully Nov 1 00:43:40.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:40.098929 systemd[1]: Finished ignition-fetch.service. Nov 1 00:43:40.100900 systemd[1]: Starting ignition-kargs.service... Nov 1 00:43:40.117968 ignition[714]: Ignition 2.14.0 Nov 1 00:43:40.117983 ignition[714]: Stage: kargs Nov 1 00:43:40.118152 ignition[714]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:43:40.118178 ignition[714]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Nov 1 00:43:40.120985 ignition[714]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Nov 1 00:43:40.122385 ignition[714]: kargs: kargs passed Nov 1 00:43:40.122463 ignition[714]: Ignition finished successfully Nov 1 00:43:40.124017 systemd[1]: Finished ignition-kargs.service. Nov 1 00:43:40.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:40.126623 systemd[1]: Starting ignition-disks.service... Nov 1 00:43:40.143545 ignition[719]: Ignition 2.14.0 Nov 1 00:43:40.144601 ignition[719]: Stage: disks Nov 1 00:43:40.145466 ignition[719]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:43:40.146503 ignition[719]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Nov 1 00:43:40.149164 ignition[719]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Nov 1 00:43:40.151544 ignition[719]: disks: disks passed Nov 1 00:43:40.152421 ignition[719]: Ignition finished successfully Nov 1 00:43:40.154243 systemd[1]: Finished ignition-disks.service. Nov 1 00:43:40.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:40.155392 systemd[1]: Reached target initrd-root-device.target. Nov 1 00:43:40.156825 systemd[1]: Reached target local-fs-pre.target. Nov 1 00:43:40.158533 systemd[1]: Reached target local-fs.target. Nov 1 00:43:40.159915 systemd[1]: Reached target sysinit.target. Nov 1 00:43:40.161452 systemd[1]: Reached target basic.target. Nov 1 00:43:40.164883 systemd[1]: Starting systemd-fsck-root.service... Nov 1 00:43:40.184931 systemd-fsck[726]: ROOT: clean, 637/553520 files, 56032/553472 blocks Nov 1 00:43:40.189607 systemd[1]: Finished systemd-fsck-root.service. Nov 1 00:43:40.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:40.191527 systemd[1]: Mounting sysroot.mount... Nov 1 00:43:40.207302 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Nov 1 00:43:40.207732 systemd[1]: Mounted sysroot.mount. Nov 1 00:43:40.208810 systemd[1]: Reached target initrd-root-fs.target. Nov 1 00:43:40.212275 systemd[1]: Mounting sysroot-usr.mount... Nov 1 00:43:40.216513 systemd[1]: Starting flatcar-digitalocean-network.service... Nov 1 00:43:40.220530 systemd[1]: Starting flatcar-metadata-hostname.service... Nov 1 00:43:40.224616 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Nov 1 00:43:40.224668 systemd[1]: Reached target ignition-diskful.target. Nov 1 00:43:40.227609 systemd[1]: Mounted sysroot-usr.mount. Nov 1 00:43:40.230317 systemd[1]: Starting initrd-setup-root.service... Nov 1 00:43:40.245012 initrd-setup-root[738]: cut: /sysroot/etc/passwd: No such file or directory Nov 1 00:43:40.257980 initrd-setup-root[746]: cut: /sysroot/etc/group: No such file or directory Nov 1 00:43:40.274883 initrd-setup-root[756]: cut: /sysroot/etc/shadow: No such file or directory Nov 1 00:43:40.288029 initrd-setup-root[766]: cut: /sysroot/etc/gshadow: No such file or directory Nov 1 00:43:40.351290 coreos-metadata[732]: Nov 01 00:43:40.349 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Nov 1 00:43:40.360887 systemd[1]: Finished initrd-setup-root.service. Nov 1 00:43:40.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:40.364580 systemd[1]: Starting ignition-mount.service... Nov 1 00:43:40.369678 systemd[1]: Starting sysroot-boot.service... Nov 1 00:43:40.373338 coreos-metadata[732]: Nov 01 00:43:40.373 INFO Fetch successful Nov 1 00:43:40.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:40.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:40.378894 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. Nov 1 00:43:40.379031 systemd[1]: Finished flatcar-digitalocean-network.service. Nov 1 00:43:40.385251 bash[783]: umount: /sysroot/usr/share/oem: not mounted. Nov 1 00:43:40.402121 coreos-metadata[733]: Nov 01 00:43:40.402 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Nov 1 00:43:40.405176 ignition[785]: INFO : Ignition 2.14.0 Nov 1 00:43:40.405176 ignition[785]: INFO : Stage: mount Nov 1 00:43:40.407400 ignition[785]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:43:40.407400 ignition[785]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Nov 1 00:43:40.410736 ignition[785]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Nov 1 00:43:40.410736 ignition[785]: INFO : mount: mount passed Nov 1 00:43:40.410736 ignition[785]: INFO : Ignition finished successfully Nov 1 00:43:40.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:40.411198 systemd[1]: Finished ignition-mount.service. Nov 1 00:43:40.415639 coreos-metadata[733]: Nov 01 00:43:40.415 INFO Fetch successful Nov 1 00:43:40.419258 coreos-metadata[733]: Nov 01 00:43:40.419 INFO wrote hostname ci-3510.3.8-n-5dc6352429 to /sysroot/etc/hostname Nov 1 00:43:40.420676 systemd[1]: Finished flatcar-metadata-hostname.service. Nov 1 00:43:40.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:40.426559 systemd[1]: Finished sysroot-boot.service. Nov 1 00:43:40.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:40.627882 systemd[1]: Mounting sysroot-usr-share-oem.mount... Nov 1 00:43:40.648314 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (793) Nov 1 00:43:40.653598 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Nov 1 00:43:40.653702 kernel: BTRFS info (device vda6): using free space tree Nov 1 00:43:40.653716 kernel: BTRFS info (device vda6): has skinny extents Nov 1 00:43:40.661010 systemd[1]: Mounted sysroot-usr-share-oem.mount. Nov 1 00:43:40.665122 systemd[1]: Starting ignition-files.service... Nov 1 00:43:40.687212 ignition[813]: INFO : Ignition 2.14.0 Nov 1 00:43:40.687212 ignition[813]: INFO : Stage: files Nov 1 00:43:40.689378 ignition[813]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:43:40.689378 ignition[813]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Nov 1 00:43:40.692463 ignition[813]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Nov 1 00:43:40.692463 ignition[813]: DEBUG : files: compiled without relabeling support, skipping Nov 1 00:43:40.692463 ignition[813]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Nov 1 00:43:40.692463 ignition[813]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Nov 1 00:43:40.699098 ignition[813]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Nov 1 00:43:40.699098 ignition[813]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Nov 1 00:43:40.699098 ignition[813]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Nov 1 00:43:40.699098 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Nov 1 00:43:40.699098 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Nov 1 00:43:40.697364 unknown[813]: wrote ssh authorized keys file for user: core Nov 1 00:43:40.708819 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Nov 1 00:43:40.708819 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Nov 1 00:43:40.708819 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Nov 1 00:43:40.708819 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Nov 1 00:43:40.708819 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Nov 1 00:43:40.708819 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 Nov 1 00:43:41.009489 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Nov 1 00:43:41.592089 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Nov 1 00:43:41.593692 ignition[813]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" Nov 1 00:43:41.594895 ignition[813]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" Nov 1 00:43:41.595964 ignition[813]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Nov 1 00:43:41.597635 ignition[813]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Nov 1 00:43:41.603663 ignition[813]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Nov 1 00:43:41.605618 ignition[813]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Nov 1 00:43:41.605618 ignition[813]: INFO : files: files passed Nov 1 00:43:41.605618 ignition[813]: INFO : Ignition finished successfully Nov 1 00:43:41.608697 systemd[1]: Finished ignition-files.service. Nov 1 00:43:41.619808 kernel: kauditd_printk_skb: 29 callbacks suppressed Nov 1 00:43:41.619856 kernel: audit: type=1130 audit(1761957821.609:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.610960 systemd[1]: Starting initrd-setup-root-after-ignition.service... Nov 1 00:43:41.620675 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Nov 1 00:43:41.622061 systemd[1]: Starting ignition-quench.service... Nov 1 00:43:41.635399 kernel: audit: type=1130 audit(1761957821.628:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.627630 systemd[1]: ignition-quench.service: Deactivated successfully. Nov 1 00:43:41.643187 kernel: audit: type=1131 audit(1761957821.628:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.627754 systemd[1]: Finished ignition-quench.service. Nov 1 00:43:41.644413 initrd-setup-root-after-ignition[838]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Nov 1 00:43:41.654280 kernel: audit: type=1130 audit(1761957821.645:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.644914 systemd[1]: Finished initrd-setup-root-after-ignition.service. Nov 1 00:43:41.646068 systemd[1]: Reached target ignition-complete.target. Nov 1 00:43:41.655041 systemd[1]: Starting initrd-parse-etc.service... Nov 1 00:43:41.663827 systemd-networkd[689]: eth1: Gained IPv6LL Nov 1 00:43:41.680969 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Nov 1 00:43:41.681136 systemd[1]: Finished initrd-parse-etc.service. Nov 1 00:43:41.697900 kernel: audit: type=1130 audit(1761957821.682:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.697952 kernel: audit: type=1131 audit(1761957821.682:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.683150 systemd[1]: Reached target initrd-fs.target. Nov 1 00:43:41.698675 systemd[1]: Reached target initrd.target. Nov 1 00:43:41.700346 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Nov 1 00:43:41.701547 systemd[1]: Starting dracut-pre-pivot.service... Nov 1 00:43:41.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.718413 systemd[1]: Finished dracut-pre-pivot.service. Nov 1 00:43:41.727815 kernel: audit: type=1130 audit(1761957821.718:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.720384 systemd[1]: Starting initrd-cleanup.service... Nov 1 00:43:41.736339 systemd[1]: Stopped target nss-lookup.target. Nov 1 00:43:41.738510 systemd[1]: Stopped target remote-cryptsetup.target. Nov 1 00:43:41.739652 systemd[1]: Stopped target timers.target. Nov 1 00:43:41.741368 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Nov 1 00:43:41.749645 kernel: audit: type=1131 audit(1761957821.742:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.741592 systemd[1]: Stopped dracut-pre-pivot.service. Nov 1 00:43:41.743418 systemd[1]: Stopped target initrd.target. Nov 1 00:43:41.750730 systemd[1]: Stopped target basic.target. Nov 1 00:43:41.752187 systemd[1]: Stopped target ignition-complete.target. Nov 1 00:43:41.753725 systemd[1]: Stopped target ignition-diskful.target. Nov 1 00:43:41.755403 systemd[1]: Stopped target initrd-root-device.target. Nov 1 00:43:41.757037 systemd[1]: Stopped target remote-fs.target. Nov 1 00:43:41.758781 systemd[1]: Stopped target remote-fs-pre.target. Nov 1 00:43:41.760554 systemd[1]: Stopped target sysinit.target. Nov 1 00:43:41.762079 systemd[1]: Stopped target local-fs.target. Nov 1 00:43:41.763531 systemd[1]: Stopped target local-fs-pre.target. Nov 1 00:43:41.765211 systemd[1]: Stopped target swap.target. Nov 1 00:43:41.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.766862 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Nov 1 00:43:41.776401 kernel: audit: type=1131 audit(1761957821.768:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.767142 systemd[1]: Stopped dracut-pre-mount.service. Nov 1 00:43:41.768788 systemd[1]: Stopped target cryptsetup.target. Nov 1 00:43:41.785526 kernel: audit: type=1131 audit(1761957821.778:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.777222 systemd[1]: dracut-initqueue.service: Deactivated successfully. Nov 1 00:43:41.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.777391 systemd[1]: Stopped dracut-initqueue.service. Nov 1 00:43:41.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.779040 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Nov 1 00:43:41.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.779179 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Nov 1 00:43:41.786404 systemd[1]: ignition-files.service: Deactivated successfully. Nov 1 00:43:41.786535 systemd[1]: Stopped ignition-files.service. Nov 1 00:43:41.798650 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Nov 1 00:43:41.798887 systemd[1]: Stopped flatcar-metadata-hostname.service. Nov 1 00:43:41.801439 systemd[1]: Stopping ignition-mount.service... Nov 1 00:43:41.809450 iscsid[699]: iscsid shutting down. Nov 1 00:43:41.814184 systemd[1]: Stopping iscsid.service... Nov 1 00:43:41.816768 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Nov 1 00:43:41.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.817001 systemd[1]: Stopped kmod-static-nodes.service. Nov 1 00:43:41.819944 systemd[1]: Stopping sysroot-boot.service... Nov 1 00:43:41.831435 ignition[851]: INFO : Ignition 2.14.0 Nov 1 00:43:41.831435 ignition[851]: INFO : Stage: umount Nov 1 00:43:41.831435 ignition[851]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:43:41.831435 ignition[851]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Nov 1 00:43:41.831435 ignition[851]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Nov 1 00:43:41.831435 ignition[851]: INFO : umount: umount passed Nov 1 00:43:41.831435 ignition[851]: INFO : Ignition finished successfully Nov 1 00:43:41.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.820718 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Nov 1 00:43:41.820935 systemd[1]: Stopped systemd-udev-trigger.service. Nov 1 00:43:41.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.835881 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Nov 1 00:43:41.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.836022 systemd[1]: Stopped dracut-pre-trigger.service. Nov 1 00:43:41.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.838986 systemd[1]: iscsid.service: Deactivated successfully. Nov 1 00:43:41.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.839110 systemd[1]: Stopped iscsid.service. Nov 1 00:43:41.842706 systemd[1]: ignition-mount.service: Deactivated successfully. Nov 1 00:43:41.842838 systemd[1]: Stopped ignition-mount.service. Nov 1 00:43:41.845133 systemd[1]: ignition-disks.service: Deactivated successfully. Nov 1 00:43:41.845241 systemd[1]: Stopped ignition-disks.service. Nov 1 00:43:41.848327 systemd[1]: ignition-kargs.service: Deactivated successfully. Nov 1 00:43:41.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.848412 systemd[1]: Stopped ignition-kargs.service. Nov 1 00:43:41.849739 systemd[1]: ignition-fetch.service: Deactivated successfully. Nov 1 00:43:41.849898 systemd[1]: Stopped ignition-fetch.service. Nov 1 00:43:41.851187 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Nov 1 00:43:41.851253 systemd[1]: Stopped ignition-fetch-offline.service. Nov 1 00:43:41.853132 systemd[1]: Stopped target paths.target. Nov 1 00:43:41.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.853797 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Nov 1 00:43:41.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.857381 systemd[1]: Stopped systemd-ask-password-console.path. Nov 1 00:43:41.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.858734 systemd[1]: Stopped target slices.target. Nov 1 00:43:41.860200 systemd[1]: Stopped target sockets.target. Nov 1 00:43:41.861708 systemd[1]: iscsid.socket: Deactivated successfully. Nov 1 00:43:41.861845 systemd[1]: Closed iscsid.socket. Nov 1 00:43:41.863160 systemd[1]: ignition-setup.service: Deactivated successfully. Nov 1 00:43:41.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.863232 systemd[1]: Stopped ignition-setup.service. Nov 1 00:43:41.865501 systemd[1]: Stopping iscsiuio.service... Nov 1 00:43:41.871092 systemd[1]: sysroot-boot.mount: Deactivated successfully. Nov 1 00:43:41.872053 systemd[1]: iscsiuio.service: Deactivated successfully. Nov 1 00:43:41.872205 systemd[1]: Stopped iscsiuio.service. Nov 1 00:43:41.873480 systemd[1]: initrd-cleanup.service: Deactivated successfully. Nov 1 00:43:41.873621 systemd[1]: Finished initrd-cleanup.service. Nov 1 00:43:41.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.875372 systemd[1]: sysroot-boot.service: Deactivated successfully. Nov 1 00:43:41.875503 systemd[1]: Stopped sysroot-boot.service. Nov 1 00:43:41.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.898000 audit: BPF prog-id=6 op=UNLOAD Nov 1 00:43:41.877976 systemd[1]: Stopped target network.target. Nov 1 00:43:41.879629 systemd[1]: iscsiuio.socket: Deactivated successfully. Nov 1 00:43:41.879686 systemd[1]: Closed iscsiuio.socket. Nov 1 00:43:41.881100 systemd[1]: initrd-setup-root.service: Deactivated successfully. Nov 1 00:43:41.881179 systemd[1]: Stopped initrd-setup-root.service. Nov 1 00:43:41.882835 systemd[1]: Stopping systemd-networkd.service... Nov 1 00:43:41.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.884695 systemd[1]: Stopping systemd-resolved.service... Nov 1 00:43:41.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.886521 systemd-networkd[689]: eth0: DHCPv6 lease lost Nov 1 00:43:41.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.890404 systemd-networkd[689]: eth1: DHCPv6 lease lost Nov 1 00:43:41.914000 audit: BPF prog-id=9 op=UNLOAD Nov 1 00:43:41.892672 systemd[1]: systemd-resolved.service: Deactivated successfully. Nov 1 00:43:41.892843 systemd[1]: Stopped systemd-resolved.service. Nov 1 00:43:41.895225 systemd[1]: systemd-networkd.service: Deactivated successfully. Nov 1 00:43:41.895360 systemd[1]: Stopped systemd-networkd.service. Nov 1 00:43:41.898577 systemd[1]: systemd-networkd.socket: Deactivated successfully. Nov 1 00:43:41.898640 systemd[1]: Closed systemd-networkd.socket. Nov 1 00:43:41.900779 systemd[1]: Stopping network-cleanup.service... Nov 1 00:43:41.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.904387 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Nov 1 00:43:41.904473 systemd[1]: Stopped parse-ip-for-networkd.service. Nov 1 00:43:41.905921 systemd[1]: systemd-sysctl.service: Deactivated successfully. Nov 1 00:43:41.905977 systemd[1]: Stopped systemd-sysctl.service. Nov 1 00:43:41.907598 systemd[1]: systemd-modules-load.service: Deactivated successfully. Nov 1 00:43:41.907649 systemd[1]: Stopped systemd-modules-load.service. Nov 1 00:43:41.913687 systemd[1]: Stopping systemd-udevd.service... Nov 1 00:43:41.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.917533 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Nov 1 00:43:41.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.920722 systemd[1]: systemd-udevd.service: Deactivated successfully. Nov 1 00:43:41.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.920955 systemd[1]: Stopped systemd-udevd.service. Nov 1 00:43:41.925066 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Nov 1 00:43:41.925160 systemd[1]: Closed systemd-udevd-control.socket. Nov 1 00:43:41.926801 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Nov 1 00:43:41.926879 systemd[1]: Closed systemd-udevd-kernel.socket. Nov 1 00:43:41.930773 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Nov 1 00:43:41.930883 systemd[1]: Stopped dracut-pre-udev.service. Nov 1 00:43:41.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.932412 systemd[1]: dracut-cmdline.service: Deactivated successfully. Nov 1 00:43:41.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.932492 systemd[1]: Stopped dracut-cmdline.service. Nov 1 00:43:41.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:41.933529 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Nov 1 00:43:41.933581 systemd[1]: Stopped dracut-cmdline-ask.service. Nov 1 00:43:41.936579 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Nov 1 00:43:41.937726 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Nov 1 00:43:41.937954 systemd[1]: Stopped systemd-vconsole-setup.service. Nov 1 00:43:41.948089 systemd[1]: network-cleanup.service: Deactivated successfully. Nov 1 00:43:41.948225 systemd[1]: Stopped network-cleanup.service. Nov 1 00:43:41.949640 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Nov 1 00:43:41.949747 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Nov 1 00:43:41.950863 systemd[1]: Reached target initrd-switch-root.target. Nov 1 00:43:41.953681 systemd[1]: Starting initrd-switch-root.service... Nov 1 00:43:41.969440 systemd[1]: Switching root. Nov 1 00:43:41.996045 systemd-journald[184]: Journal stopped Nov 1 00:43:45.935721 systemd-journald[184]: Received SIGTERM from PID 1 (systemd). Nov 1 00:43:45.935811 kernel: SELinux: Class mctp_socket not defined in policy. Nov 1 00:43:45.935832 kernel: SELinux: Class anon_inode not defined in policy. Nov 1 00:43:45.935845 kernel: SELinux: the above unknown classes and permissions will be allowed Nov 1 00:43:45.935862 kernel: SELinux: policy capability network_peer_controls=1 Nov 1 00:43:45.935873 kernel: SELinux: policy capability open_perms=1 Nov 1 00:43:45.935889 kernel: SELinux: policy capability extended_socket_class=1 Nov 1 00:43:45.935901 kernel: SELinux: policy capability always_check_network=0 Nov 1 00:43:45.935921 kernel: SELinux: policy capability cgroup_seclabel=1 Nov 1 00:43:45.935933 kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 1 00:43:45.935945 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Nov 1 00:43:45.935974 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Nov 1 00:43:45.935991 systemd[1]: Successfully loaded SELinux policy in 62.811ms. Nov 1 00:43:45.936014 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 15.129ms. Nov 1 00:43:45.936028 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 1 00:43:45.936042 systemd[1]: Detected virtualization kvm. Nov 1 00:43:45.936054 systemd[1]: Detected architecture x86-64. Nov 1 00:43:45.936066 systemd[1]: Detected first boot. Nov 1 00:43:45.936080 systemd[1]: Hostname set to . Nov 1 00:43:45.936093 systemd[1]: Initializing machine ID from VM UUID. Nov 1 00:43:45.936108 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Nov 1 00:43:45.936122 systemd[1]: Populated /etc with preset unit settings. Nov 1 00:43:45.936136 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:43:45.936152 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:43:45.936168 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:43:45.936184 systemd[1]: initrd-switch-root.service: Deactivated successfully. Nov 1 00:43:45.936197 systemd[1]: Stopped initrd-switch-root.service. Nov 1 00:43:45.936210 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Nov 1 00:43:45.936223 systemd[1]: Created slice system-addon\x2dconfig.slice. Nov 1 00:43:45.936236 systemd[1]: Created slice system-addon\x2drun.slice. Nov 1 00:43:45.936249 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Nov 1 00:43:45.936273 systemd[1]: Created slice system-getty.slice. Nov 1 00:43:45.936293 systemd[1]: Created slice system-modprobe.slice. Nov 1 00:43:45.936314 systemd[1]: Created slice system-serial\x2dgetty.slice. Nov 1 00:43:45.936326 systemd[1]: Created slice system-system\x2dcloudinit.slice. Nov 1 00:43:45.936338 systemd[1]: Created slice system-systemd\x2dfsck.slice. Nov 1 00:43:45.936351 systemd[1]: Created slice user.slice. Nov 1 00:43:45.936363 systemd[1]: Started systemd-ask-password-console.path. Nov 1 00:43:45.936375 systemd[1]: Started systemd-ask-password-wall.path. Nov 1 00:43:45.936387 systemd[1]: Set up automount boot.automount. Nov 1 00:43:45.936402 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Nov 1 00:43:45.936427 systemd[1]: Stopped target initrd-switch-root.target. Nov 1 00:43:45.936439 systemd[1]: Stopped target initrd-fs.target. Nov 1 00:43:45.936451 systemd[1]: Stopped target initrd-root-fs.target. Nov 1 00:43:45.936463 systemd[1]: Reached target integritysetup.target. Nov 1 00:43:45.936475 systemd[1]: Reached target remote-cryptsetup.target. Nov 1 00:43:45.936488 systemd[1]: Reached target remote-fs.target. Nov 1 00:43:45.936501 systemd[1]: Reached target slices.target. Nov 1 00:43:45.936514 systemd[1]: Reached target swap.target. Nov 1 00:43:45.936533 systemd[1]: Reached target torcx.target. Nov 1 00:43:45.936546 systemd[1]: Reached target veritysetup.target. Nov 1 00:43:45.936558 systemd[1]: Listening on systemd-coredump.socket. Nov 1 00:43:45.936570 systemd[1]: Listening on systemd-initctl.socket. Nov 1 00:43:45.936589 systemd[1]: Listening on systemd-networkd.socket. Nov 1 00:43:45.936602 systemd[1]: Listening on systemd-udevd-control.socket. Nov 1 00:43:45.936614 systemd[1]: Listening on systemd-udevd-kernel.socket. Nov 1 00:43:45.936627 systemd[1]: Listening on systemd-userdbd.socket. Nov 1 00:43:45.936640 systemd[1]: Mounting dev-hugepages.mount... Nov 1 00:43:45.936652 systemd[1]: Mounting dev-mqueue.mount... Nov 1 00:43:45.936671 systemd[1]: Mounting media.mount... Nov 1 00:43:45.936684 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:43:45.936717 systemd[1]: Mounting sys-kernel-debug.mount... Nov 1 00:43:45.936730 systemd[1]: Mounting sys-kernel-tracing.mount... Nov 1 00:43:45.936743 systemd[1]: Mounting tmp.mount... Nov 1 00:43:45.936756 systemd[1]: Starting flatcar-tmpfiles.service... Nov 1 00:43:45.936768 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:43:45.936781 systemd[1]: Starting kmod-static-nodes.service... Nov 1 00:43:45.936793 systemd[1]: Starting modprobe@configfs.service... Nov 1 00:43:45.936812 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:43:45.936824 systemd[1]: Starting modprobe@drm.service... Nov 1 00:43:45.936836 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:43:45.936848 systemd[1]: Starting modprobe@fuse.service... Nov 1 00:43:45.936860 systemd[1]: Starting modprobe@loop.service... Nov 1 00:43:45.936872 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Nov 1 00:43:45.936891 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Nov 1 00:43:45.936903 systemd[1]: Stopped systemd-fsck-root.service. Nov 1 00:43:45.936921 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Nov 1 00:43:45.936935 systemd[1]: Stopped systemd-fsck-usr.service. Nov 1 00:43:45.936948 systemd[1]: Stopped systemd-journald.service. Nov 1 00:43:45.936960 systemd[1]: Starting systemd-journald.service... Nov 1 00:43:45.936972 kernel: loop: module loaded Nov 1 00:43:45.936984 systemd[1]: Starting systemd-modules-load.service... Nov 1 00:43:45.936996 systemd[1]: Starting systemd-network-generator.service... Nov 1 00:43:45.937009 systemd[1]: Starting systemd-remount-fs.service... Nov 1 00:43:45.937021 systemd[1]: Starting systemd-udev-trigger.service... Nov 1 00:43:45.937034 systemd[1]: verity-setup.service: Deactivated successfully. Nov 1 00:43:45.937052 systemd[1]: Stopped verity-setup.service. Nov 1 00:43:45.937064 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:43:45.937077 systemd[1]: Mounted dev-hugepages.mount. Nov 1 00:43:45.937089 systemd[1]: Mounted dev-mqueue.mount. Nov 1 00:43:45.937101 systemd[1]: Mounted media.mount. Nov 1 00:43:45.937113 systemd[1]: Mounted sys-kernel-debug.mount. Nov 1 00:43:45.937125 systemd[1]: Mounted sys-kernel-tracing.mount. Nov 1 00:43:45.937137 systemd[1]: Mounted tmp.mount. Nov 1 00:43:45.937149 systemd[1]: Finished kmod-static-nodes.service. Nov 1 00:43:45.937174 systemd[1]: modprobe@configfs.service: Deactivated successfully. Nov 1 00:43:45.937186 systemd[1]: Finished modprobe@configfs.service. Nov 1 00:43:45.937198 kernel: fuse: init (API version 7.34) Nov 1 00:43:45.937210 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:43:45.937222 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:43:45.937233 systemd[1]: Finished flatcar-tmpfiles.service. Nov 1 00:43:45.937246 systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 1 00:43:45.937275 systemd[1]: Finished modprobe@drm.service. Nov 1 00:43:45.937289 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:43:45.937308 systemd-journald[966]: Journal started Nov 1 00:43:45.937374 systemd-journald[966]: Runtime Journal (/run/log/journal/385063b434574f118e9081835bc96168) is 4.9M, max 39.5M, 34.5M free. Nov 1 00:43:42.151000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Nov 1 00:43:42.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 00:43:42.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 00:43:42.243000 audit: BPF prog-id=10 op=LOAD Nov 1 00:43:42.243000 audit: BPF prog-id=10 op=UNLOAD Nov 1 00:43:42.243000 audit: BPF prog-id=11 op=LOAD Nov 1 00:43:42.243000 audit: BPF prog-id=11 op=UNLOAD Nov 1 00:43:42.363000 audit[884]: AVC avc: denied { associate } for pid=884 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Nov 1 00:43:42.363000 audit[884]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d892 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=867 pid=884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:42.363000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:43:42.366000 audit[884]: AVC avc: denied { associate } for pid=884 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Nov 1 00:43:42.366000 audit[884]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d969 a2=1ed a3=0 items=2 ppid=867 pid=884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:42.366000 audit: CWD cwd="/" Nov 1 00:43:42.366000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:42.366000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:42.366000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:43:45.630000 audit: BPF prog-id=12 op=LOAD Nov 1 00:43:45.631000 audit: BPF prog-id=3 op=UNLOAD Nov 1 00:43:45.631000 audit: BPF prog-id=13 op=LOAD Nov 1 00:43:45.631000 audit: BPF prog-id=14 op=LOAD Nov 1 00:43:45.631000 audit: BPF prog-id=4 op=UNLOAD Nov 1 00:43:45.631000 audit: BPF prog-id=5 op=UNLOAD Nov 1 00:43:45.632000 audit: BPF prog-id=15 op=LOAD Nov 1 00:43:45.632000 audit: BPF prog-id=12 op=UNLOAD Nov 1 00:43:45.633000 audit: BPF prog-id=16 op=LOAD Nov 1 00:43:45.633000 audit: BPF prog-id=17 op=LOAD Nov 1 00:43:45.633000 audit: BPF prog-id=13 op=UNLOAD Nov 1 00:43:45.633000 audit: BPF prog-id=14 op=UNLOAD Nov 1 00:43:45.633000 audit: BPF prog-id=18 op=LOAD Nov 1 00:43:45.633000 audit: BPF prog-id=15 op=UNLOAD Nov 1 00:43:45.634000 audit: BPF prog-id=19 op=LOAD Nov 1 00:43:45.634000 audit: BPF prog-id=20 op=LOAD Nov 1 00:43:45.634000 audit: BPF prog-id=16 op=UNLOAD Nov 1 00:43:45.634000 audit: BPF prog-id=17 op=UNLOAD Nov 1 00:43:45.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.644000 audit: BPF prog-id=18 op=UNLOAD Nov 1 00:43:45.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.834000 audit: BPF prog-id=21 op=LOAD Nov 1 00:43:45.834000 audit: BPF prog-id=22 op=LOAD Nov 1 00:43:45.834000 audit: BPF prog-id=23 op=LOAD Nov 1 00:43:45.834000 audit: BPF prog-id=19 op=UNLOAD Nov 1 00:43:45.834000 audit: BPF prog-id=20 op=UNLOAD Nov 1 00:43:45.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.933000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Nov 1 00:43:45.933000 audit[966]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffdb67d0550 a2=4000 a3=7ffdb67d05ec items=0 ppid=1 pid=966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:45.933000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Nov 1 00:43:45.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.940350 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:43:45.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:42.359341 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:43:45.629028 systemd[1]: Queued start job for default target multi-user.target. Nov 1 00:43:42.359933 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:42Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Nov 1 00:43:45.629047 systemd[1]: Unnecessary job was removed for dev-vda6.device. Nov 1 00:43:42.359967 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:42Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Nov 1 00:43:45.634854 systemd[1]: systemd-journald.service: Deactivated successfully. Nov 1 00:43:42.360025 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:42Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Nov 1 00:43:42.360042 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:42Z" level=debug msg="skipped missing lower profile" missing profile=oem Nov 1 00:43:42.360121 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:42Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Nov 1 00:43:42.360146 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:42Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Nov 1 00:43:42.360518 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:42Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Nov 1 00:43:42.360592 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:42Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Nov 1 00:43:42.360617 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:42Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Nov 1 00:43:42.362551 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:42Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Nov 1 00:43:42.362597 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:42Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Nov 1 00:43:42.362621 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:42Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Nov 1 00:43:42.362639 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:42Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Nov 1 00:43:45.948376 systemd[1]: Started systemd-journald.service. Nov 1 00:43:42.362664 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:42Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Nov 1 00:43:42.362680 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:42Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Nov 1 00:43:45.196239 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:45Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:43:45.196571 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:45Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:43:45.196756 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:45Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:43:45.196971 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:45Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:43:45.197029 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:45Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Nov 1 00:43:45.197119 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-11-01T00:43:45Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Nov 1 00:43:45.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.950341 systemd[1]: modprobe@fuse.service: Deactivated successfully. Nov 1 00:43:45.950584 systemd[1]: Finished modprobe@fuse.service. Nov 1 00:43:45.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.951620 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:43:45.951810 systemd[1]: Finished modprobe@loop.service. Nov 1 00:43:45.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.952840 systemd[1]: Finished systemd-modules-load.service. Nov 1 00:43:45.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.953974 systemd[1]: Finished systemd-network-generator.service. Nov 1 00:43:45.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.955351 systemd[1]: Finished systemd-remount-fs.service. Nov 1 00:43:45.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.956698 systemd[1]: Reached target network-pre.target. Nov 1 00:43:45.958929 systemd[1]: Mounting sys-fs-fuse-connections.mount... Nov 1 00:43:45.964137 systemd[1]: Mounting sys-kernel-config.mount... Nov 1 00:43:45.967748 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Nov 1 00:43:45.969681 systemd[1]: Starting systemd-hwdb-update.service... Nov 1 00:43:45.977627 systemd[1]: Starting systemd-journal-flush.service... Nov 1 00:43:45.978823 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:43:45.980519 systemd[1]: Starting systemd-random-seed.service... Nov 1 00:43:45.981555 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:43:45.983483 systemd[1]: Starting systemd-sysctl.service... Nov 1 00:43:45.987138 systemd[1]: Starting systemd-sysusers.service... Nov 1 00:43:45.989704 systemd[1]: Mounted sys-fs-fuse-connections.mount. Nov 1 00:43:45.994569 systemd[1]: Mounted sys-kernel-config.mount. Nov 1 00:43:46.003504 systemd-journald[966]: Time spent on flushing to /var/log/journal/385063b434574f118e9081835bc96168 is 41.945ms for 1140 entries. Nov 1 00:43:46.003504 systemd-journald[966]: System Journal (/var/log/journal/385063b434574f118e9081835bc96168) is 8.0M, max 195.6M, 187.6M free. Nov 1 00:43:46.055136 systemd-journald[966]: Received client request to flush runtime journal. Nov 1 00:43:46.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:46.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:46.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:46.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:46.015367 systemd[1]: Finished systemd-random-seed.service. Nov 1 00:43:46.056543 udevadm[993]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Nov 1 00:43:46.016211 systemd[1]: Reached target first-boot-complete.target. Nov 1 00:43:46.031622 systemd[1]: Finished systemd-sysusers.service. Nov 1 00:43:46.034174 systemd[1]: Finished systemd-sysctl.service. Nov 1 00:43:46.035452 systemd[1]: Finished systemd-udev-trigger.service. Nov 1 00:43:46.038547 systemd[1]: Starting systemd-udev-settle.service... Nov 1 00:43:46.056465 systemd[1]: Finished systemd-journal-flush.service. Nov 1 00:43:46.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:46.636364 systemd[1]: Finished systemd-hwdb-update.service. Nov 1 00:43:46.645078 kernel: kauditd_printk_skb: 107 callbacks suppressed Nov 1 00:43:46.645198 kernel: audit: type=1130 audit(1761957826.636:148): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:46.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:46.644000 audit: BPF prog-id=24 op=LOAD Nov 1 00:43:46.646522 systemd[1]: Starting systemd-udevd.service... Nov 1 00:43:46.644000 audit: BPF prog-id=25 op=LOAD Nov 1 00:43:46.645000 audit: BPF prog-id=7 op=UNLOAD Nov 1 00:43:46.645000 audit: BPF prog-id=8 op=UNLOAD Nov 1 00:43:46.650072 kernel: audit: type=1334 audit(1761957826.644:149): prog-id=24 op=LOAD Nov 1 00:43:46.650142 kernel: audit: type=1334 audit(1761957826.644:150): prog-id=25 op=LOAD Nov 1 00:43:46.650160 kernel: audit: type=1334 audit(1761957826.645:151): prog-id=7 op=UNLOAD Nov 1 00:43:46.650178 kernel: audit: type=1334 audit(1761957826.645:152): prog-id=8 op=UNLOAD Nov 1 00:43:46.676291 systemd-udevd[995]: Using default interface naming scheme 'v252'. Nov 1 00:43:46.705412 systemd[1]: Started systemd-udevd.service. Nov 1 00:43:46.715312 kernel: audit: type=1130 audit(1761957826.706:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:46.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:46.720679 systemd[1]: Starting systemd-networkd.service... Nov 1 00:43:46.724526 kernel: audit: type=1334 audit(1761957826.719:154): prog-id=26 op=LOAD Nov 1 00:43:46.719000 audit: BPF prog-id=26 op=LOAD Nov 1 00:43:46.743978 kernel: audit: type=1334 audit(1761957826.732:155): prog-id=27 op=LOAD Nov 1 00:43:46.744111 kernel: audit: type=1334 audit(1761957826.735:156): prog-id=28 op=LOAD Nov 1 00:43:46.744133 kernel: audit: type=1334 audit(1761957826.735:157): prog-id=29 op=LOAD Nov 1 00:43:46.732000 audit: BPF prog-id=27 op=LOAD Nov 1 00:43:46.735000 audit: BPF prog-id=28 op=LOAD Nov 1 00:43:46.735000 audit: BPF prog-id=29 op=LOAD Nov 1 00:43:46.739373 systemd[1]: Starting systemd-userdbd.service... Nov 1 00:43:46.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:46.814791 systemd[1]: Started systemd-userdbd.service. Nov 1 00:43:46.822241 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:43:46.822440 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:43:46.824053 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:43:46.826239 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:43:46.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:46.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:46.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:46.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:46.832031 systemd[1]: Starting modprobe@loop.service... Nov 1 00:43:46.832970 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Nov 1 00:43:46.833081 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Nov 1 00:43:46.833219 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:43:46.833925 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:43:46.834114 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:43:46.835249 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:43:46.835401 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:43:46.836241 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:43:46.836693 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Nov 1 00:43:46.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:46.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:46.840353 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:43:46.840500 systemd[1]: Finished modprobe@loop.service. Nov 1 00:43:46.841405 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:43:46.952304 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Nov 1 00:43:46.963886 systemd-networkd[1010]: lo: Link UP Nov 1 00:43:46.963902 systemd-networkd[1010]: lo: Gained carrier Nov 1 00:43:46.964546 systemd-networkd[1010]: Enumeration completed Nov 1 00:43:46.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:46.964673 systemd-networkd[1010]: eth1: Configuring with /run/systemd/network/10-6a:09:0a:55:24:4c.network. Nov 1 00:43:46.964733 systemd[1]: Started systemd-networkd.service. Nov 1 00:43:46.966347 systemd-networkd[1010]: eth0: Configuring with /run/systemd/network/10-e2:ff:fe:9d:9b:ac.network. Nov 1 00:43:46.967289 systemd-networkd[1010]: eth1: Link UP Nov 1 00:43:46.967299 systemd-networkd[1010]: eth1: Gained carrier Nov 1 00:43:46.970597 systemd-networkd[1010]: eth0: Link UP Nov 1 00:43:46.970611 systemd-networkd[1010]: eth0: Gained carrier Nov 1 00:43:46.982334 kernel: ACPI: button: Power Button [PWRF] Nov 1 00:43:47.018000 audit[1009]: AVC avc: denied { confidentiality } for pid=1009 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Nov 1 00:43:47.018000 audit[1009]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561f01538520 a1=338ec a2=7f5f43a10bc5 a3=5 items=110 ppid=995 pid=1009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:47.018000 audit: CWD cwd="/" Nov 1 00:43:47.018000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=1 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=2 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=3 name=(null) inode=14579 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=4 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=5 name=(null) inode=14580 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=6 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=7 name=(null) inode=14581 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=8 name=(null) inode=14581 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=9 name=(null) inode=14582 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=10 name=(null) inode=14581 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=11 name=(null) inode=14583 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=12 name=(null) inode=14581 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=13 name=(null) inode=14584 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=14 name=(null) inode=14581 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=15 name=(null) inode=14585 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=16 name=(null) inode=14581 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=17 name=(null) inode=14586 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=18 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=19 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=20 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=21 name=(null) inode=14588 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=22 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=23 name=(null) inode=14589 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=24 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=25 name=(null) inode=14590 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=26 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=27 name=(null) inode=14591 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=28 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=29 name=(null) inode=14592 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=30 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=31 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=32 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=33 name=(null) inode=14594 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=34 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=35 name=(null) inode=14595 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=36 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=37 name=(null) inode=14596 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=38 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=39 name=(null) inode=14597 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=40 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=41 name=(null) inode=14598 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=42 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=43 name=(null) inode=14599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=44 name=(null) inode=14599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=45 name=(null) inode=14600 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=46 name=(null) inode=14599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=47 name=(null) inode=14601 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=48 name=(null) inode=14599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=49 name=(null) inode=14602 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=50 name=(null) inode=14599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=51 name=(null) inode=14603 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=52 name=(null) inode=14599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=53 name=(null) inode=14604 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=55 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=56 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=57 name=(null) inode=14606 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=58 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=59 name=(null) inode=14607 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=60 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=61 name=(null) inode=14608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=62 name=(null) inode=14608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=63 name=(null) inode=14609 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=64 name=(null) inode=14608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=65 name=(null) inode=14610 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=66 name=(null) inode=14608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=67 name=(null) inode=14611 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=68 name=(null) inode=14608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=69 name=(null) inode=14612 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=70 name=(null) inode=14608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=71 name=(null) inode=14613 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=72 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=73 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=74 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=75 name=(null) inode=14615 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=76 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=77 name=(null) inode=14616 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=78 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=79 name=(null) inode=14617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=80 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=81 name=(null) inode=14618 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=82 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=83 name=(null) inode=14619 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=84 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=85 name=(null) inode=14620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=86 name=(null) inode=14620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=87 name=(null) inode=14621 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=88 name=(null) inode=14620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=89 name=(null) inode=14622 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=90 name=(null) inode=14620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=91 name=(null) inode=14623 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=92 name=(null) inode=14620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=93 name=(null) inode=14624 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=94 name=(null) inode=14620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=95 name=(null) inode=14625 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=96 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=97 name=(null) inode=14626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=98 name=(null) inode=14626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=99 name=(null) inode=14627 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=100 name=(null) inode=14626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=101 name=(null) inode=14628 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=102 name=(null) inode=14626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=103 name=(null) inode=14629 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=104 name=(null) inode=14626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=105 name=(null) inode=14630 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=106 name=(null) inode=14626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=107 name=(null) inode=14631 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PATH item=109 name=(null) inode=14632 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:43:47.018000 audit: PROCTITLE proctitle="(udev-worker)" Nov 1 00:43:47.078308 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Nov 1 00:43:47.098783 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Nov 1 00:43:47.098835 kernel: mousedev: PS/2 mouse device common for all mice Nov 1 00:43:47.080767 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Nov 1 00:43:47.252298 kernel: EDAC MC: Ver: 3.0.0 Nov 1 00:43:47.277176 systemd[1]: Finished systemd-udev-settle.service. Nov 1 00:43:47.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:47.280533 systemd[1]: Starting lvm2-activation-early.service... Nov 1 00:43:47.299902 lvm[1033]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Nov 1 00:43:47.329025 systemd[1]: Finished lvm2-activation-early.service. Nov 1 00:43:47.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:47.330340 systemd[1]: Reached target cryptsetup.target. Nov 1 00:43:47.333514 systemd[1]: Starting lvm2-activation.service... Nov 1 00:43:47.339681 lvm[1034]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Nov 1 00:43:47.361880 systemd[1]: Finished lvm2-activation.service. Nov 1 00:43:47.362861 systemd[1]: Reached target local-fs-pre.target. Nov 1 00:43:47.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:47.365367 systemd[1]: Mounting media-configdrive.mount... Nov 1 00:43:47.366124 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Nov 1 00:43:47.366172 systemd[1]: Reached target machines.target. Nov 1 00:43:47.369089 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Nov 1 00:43:47.382080 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Nov 1 00:43:47.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:47.390303 kernel: ISO 9660 Extensions: RRIP_1991A Nov 1 00:43:47.391990 systemd[1]: Mounted media-configdrive.mount. Nov 1 00:43:47.392935 systemd[1]: Reached target local-fs.target. Nov 1 00:43:47.395627 systemd[1]: Starting ldconfig.service... Nov 1 00:43:47.396990 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:43:47.397087 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:43:47.400839 systemd[1]: Starting systemd-boot-update.service... Nov 1 00:43:47.403965 systemd[1]: Starting systemd-machine-id-commit.service... Nov 1 00:43:47.409732 systemd[1]: Starting systemd-sysext.service... Nov 1 00:43:47.424437 systemd[1]: Unmounting usr-share-oem.mount... Nov 1 00:43:47.453327 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1040 (bootctl) Nov 1 00:43:47.456686 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Nov 1 00:43:47.460567 systemd[1]: usr-share-oem.mount: Deactivated successfully. Nov 1 00:43:47.460855 systemd[1]: Unmounted usr-share-oem.mount. Nov 1 00:43:47.491731 kernel: loop0: detected capacity change from 0 to 229808 Nov 1 00:43:47.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:47.500334 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Nov 1 00:43:47.501301 systemd[1]: Finished systemd-machine-id-commit.service. Nov 1 00:43:47.544714 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Nov 1 00:43:47.566634 systemd-fsck[1047]: fsck.fat 4.2 (2021-01-31) Nov 1 00:43:47.566634 systemd-fsck[1047]: /dev/vda1: 790 files, 120773/258078 clusters Nov 1 00:43:47.568610 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Nov 1 00:43:47.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:47.571169 systemd[1]: Mounting boot.mount... Nov 1 00:43:47.584316 kernel: loop1: detected capacity change from 0 to 229808 Nov 1 00:43:47.595137 systemd[1]: Mounted boot.mount. Nov 1 00:43:47.614472 (sd-sysext)[1050]: Using extensions 'kubernetes'. Nov 1 00:43:47.617359 (sd-sysext)[1050]: Merged extensions into '/usr'. Nov 1 00:43:47.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:47.622894 systemd[1]: Finished systemd-boot-update.service. Nov 1 00:43:47.646439 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:43:47.649049 systemd[1]: Mounting usr-share-oem.mount... Nov 1 00:43:47.653299 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:43:47.655610 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:43:47.658500 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:43:47.662617 systemd[1]: Starting modprobe@loop.service... Nov 1 00:43:47.664165 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:43:47.664447 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:43:47.664688 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:43:47.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:47.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:47.668728 systemd[1]: Mounted usr-share-oem.mount. Nov 1 00:43:47.671164 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:43:47.671463 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:43:47.674438 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:43:47.675049 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:43:47.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:47.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:47.677511 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:43:47.677662 systemd[1]: Finished modprobe@loop.service. Nov 1 00:43:47.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:47.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:47.679378 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:43:47.679496 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:43:47.682051 systemd[1]: Finished systemd-sysext.service. Nov 1 00:43:47.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:47.686623 systemd[1]: Starting ensure-sysext.service... Nov 1 00:43:47.694735 systemd[1]: Starting systemd-tmpfiles-setup.service... Nov 1 00:43:47.700881 systemd[1]: Reloading. Nov 1 00:43:47.724815 systemd-tmpfiles[1059]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Nov 1 00:43:47.734904 systemd-tmpfiles[1059]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Nov 1 00:43:47.755532 systemd-tmpfiles[1059]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Nov 1 00:43:47.858428 ldconfig[1039]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Nov 1 00:43:47.873609 /usr/lib/systemd/system-generators/torcx-generator[1078]: time="2025-11-01T00:43:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:43:47.873658 /usr/lib/systemd/system-generators/torcx-generator[1078]: time="2025-11-01T00:43:47Z" level=info msg="torcx already run" Nov 1 00:43:48.014607 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:43:48.014634 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:43:48.034831 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:43:48.098000 audit: BPF prog-id=30 op=LOAD Nov 1 00:43:48.098000 audit: BPF prog-id=21 op=UNLOAD Nov 1 00:43:48.098000 audit: BPF prog-id=31 op=LOAD Nov 1 00:43:48.098000 audit: BPF prog-id=32 op=LOAD Nov 1 00:43:48.098000 audit: BPF prog-id=22 op=UNLOAD Nov 1 00:43:48.098000 audit: BPF prog-id=23 op=UNLOAD Nov 1 00:43:48.099000 audit: BPF prog-id=33 op=LOAD Nov 1 00:43:48.099000 audit: BPF prog-id=34 op=LOAD Nov 1 00:43:48.099000 audit: BPF prog-id=24 op=UNLOAD Nov 1 00:43:48.099000 audit: BPF prog-id=25 op=UNLOAD Nov 1 00:43:48.101000 audit: BPF prog-id=35 op=LOAD Nov 1 00:43:48.101000 audit: BPF prog-id=27 op=UNLOAD Nov 1 00:43:48.101000 audit: BPF prog-id=36 op=LOAD Nov 1 00:43:48.101000 audit: BPF prog-id=37 op=LOAD Nov 1 00:43:48.101000 audit: BPF prog-id=28 op=UNLOAD Nov 1 00:43:48.101000 audit: BPF prog-id=29 op=UNLOAD Nov 1 00:43:48.103000 audit: BPF prog-id=38 op=LOAD Nov 1 00:43:48.103000 audit: BPF prog-id=26 op=UNLOAD Nov 1 00:43:48.111663 systemd[1]: Finished ldconfig.service. Nov 1 00:43:48.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.114375 systemd[1]: Finished systemd-tmpfiles-setup.service. Nov 1 00:43:48.120502 systemd[1]: Starting audit-rules.service... Nov 1 00:43:48.123727 systemd[1]: Starting clean-ca-certificates.service... Nov 1 00:43:48.128652 systemd[1]: Starting systemd-journal-catalog-update.service... Nov 1 00:43:48.131000 audit: BPF prog-id=39 op=LOAD Nov 1 00:43:48.132897 systemd[1]: Starting systemd-resolved.service... Nov 1 00:43:48.136000 audit: BPF prog-id=40 op=LOAD Nov 1 00:43:48.138507 systemd[1]: Starting systemd-timesyncd.service... Nov 1 00:43:48.142210 systemd[1]: Starting systemd-update-utmp.service... Nov 1 00:43:48.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.155752 systemd[1]: Finished clean-ca-certificates.service. Nov 1 00:43:48.156776 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:43:48.161000 audit[1132]: SYSTEM_BOOT pid=1132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.164630 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:43:48.168778 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:43:48.172932 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:43:48.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.176740 systemd[1]: Starting modprobe@loop.service... Nov 1 00:43:48.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.177609 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:43:48.178164 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:43:48.178420 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:43:48.179927 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:43:48.182395 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:43:48.183957 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:43:48.184127 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:43:48.185902 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:43:48.186054 systemd[1]: Finished modprobe@loop.service. Nov 1 00:43:48.191218 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:43:48.192381 systemd-networkd[1010]: eth0: Gained IPv6LL Nov 1 00:43:48.193695 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:43:48.197385 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:43:48.200892 systemd[1]: Starting modprobe@loop.service... Nov 1 00:43:48.201737 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:43:48.201959 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:43:48.202115 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:43:48.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.204542 systemd[1]: Finished systemd-update-utmp.service. Nov 1 00:43:48.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.207575 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:43:48.207807 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:43:48.214412 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:43:48.217167 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:43:48.221160 systemd[1]: Starting modprobe@drm.service... Nov 1 00:43:48.223195 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:43:48.223496 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:43:48.226943 systemd[1]: Starting systemd-networkd-wait-online.service... Nov 1 00:43:48.228130 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:43:48.229930 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:43:48.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.231006 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:43:48.233164 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:43:48.236519 systemd[1]: Finished ensure-sysext.service. Nov 1 00:43:48.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.245871 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:43:48.246115 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:43:48.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.248331 systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 1 00:43:48.248569 systemd[1]: Finished modprobe@drm.service. Nov 1 00:43:48.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.254674 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:43:48.254907 systemd[1]: Finished modprobe@loop.service. Nov 1 00:43:48.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.256392 systemd[1]: Finished systemd-networkd-wait-online.service. Nov 1 00:43:48.257747 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:43:48.258979 systemd[1]: Finished systemd-journal-catalog-update.service. Nov 1 00:43:48.263177 systemd[1]: Starting systemd-update-done.service... Nov 1 00:43:48.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:48.280039 systemd[1]: Finished systemd-update-done.service. Nov 1 00:43:48.330000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Nov 1 00:43:48.330000 audit[1156]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffee742a3f0 a2=420 a3=0 items=0 ppid=1126 pid=1156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:48.330000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Nov 1 00:43:48.332197 augenrules[1156]: No rules Nov 1 00:43:48.333550 systemd[1]: Finished audit-rules.service. Nov 1 00:43:48.339249 systemd-resolved[1129]: Positive Trust Anchors: Nov 1 00:43:48.339887 systemd-resolved[1129]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Nov 1 00:43:48.340077 systemd-resolved[1129]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Nov 1 00:43:48.349338 systemd-resolved[1129]: Using system hostname 'ci-3510.3.8-n-5dc6352429'. Nov 1 00:43:48.352979 systemd[1]: Started systemd-resolved.service. Nov 1 00:43:48.354105 systemd[1]: Reached target network.target. Nov 1 00:43:48.354979 systemd[1]: Reached target network-online.target. Nov 1 00:43:48.355845 systemd[1]: Reached target nss-lookup.target. Nov 1 00:43:48.357452 systemd[1]: Started systemd-timesyncd.service. Nov 1 00:43:48.358768 systemd[1]: Reached target sysinit.target. Nov 1 00:43:48.359918 systemd[1]: Started motdgen.path. Nov 1 00:43:48.360899 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Nov 1 00:43:48.362131 systemd[1]: Started systemd-tmpfiles-clean.timer. Nov 1 00:43:48.363167 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Nov 1 00:43:48.363234 systemd[1]: Reached target paths.target. Nov 1 00:43:48.364057 systemd[1]: Reached target time-set.target. Nov 1 00:43:48.365260 systemd[1]: Started logrotate.timer. Nov 1 00:43:48.366385 systemd[1]: Started mdadm.timer. Nov 1 00:43:48.367197 systemd[1]: Reached target timers.target. Nov 1 00:43:48.368726 systemd[1]: Listening on dbus.socket. Nov 1 00:43:48.371785 systemd[1]: Starting docker.socket... Nov 1 00:43:48.377669 systemd[1]: Listening on sshd.socket. Nov 1 00:43:48.378824 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:43:48.379602 systemd[1]: Listening on docker.socket. Nov 1 00:43:48.380565 systemd[1]: Reached target sockets.target. Nov 1 00:43:48.381357 systemd[1]: Reached target basic.target. Nov 1 00:43:48.382213 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Nov 1 00:43:48.382250 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Nov 1 00:43:48.383430 systemd-networkd[1010]: eth1: Gained IPv6LL Nov 1 00:43:48.384569 systemd[1]: Starting containerd.service... Nov 1 00:43:48.388834 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Nov 1 00:43:48.392203 systemd[1]: Starting dbus.service... Nov 1 00:43:48.398152 systemd[1]: Starting enable-oem-cloudinit.service... Nov 1 00:43:48.404468 systemd[1]: Starting extend-filesystems.service... Nov 1 00:43:48.405499 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Nov 1 00:43:48.410745 systemd[1]: Starting kubelet.service... Nov 1 00:43:48.416283 systemd[1]: Starting motdgen.service... Nov 1 00:43:48.420480 systemd[1]: Starting ssh-key-proc-cmdline.service... Nov 1 00:43:48.426539 systemd[1]: Starting sshd-keygen.service... Nov 1 00:43:48.435063 systemd[1]: Starting systemd-logind.service... Nov 1 00:43:48.436378 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:43:48.436521 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Nov 1 00:43:48.438108 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Nov 1 00:43:48.441735 systemd[1]: Starting update-engine.service... Nov 1 00:43:48.447517 systemd[1]: Starting update-ssh-keys-after-ignition.service... Nov 1 00:43:48.456804 jq[1185]: true Nov 1 00:43:48.474129 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:43:48.474213 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:43:48.496337 jq[1191]: true Nov 1 00:43:48.515055 dbus-daemon[1166]: [system] SELinux support is enabled Nov 1 00:43:48.520308 jq[1167]: false Nov 1 00:43:48.519941 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Nov 1 00:43:48.520212 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Nov 1 00:43:48.521746 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Nov 1 00:43:48.522005 systemd[1]: Finished ssh-key-proc-cmdline.service. Nov 1 00:43:48.524453 systemd[1]: Started dbus.service. Nov 1 00:43:48.529366 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Nov 1 00:43:48.529420 systemd[1]: Reached target system-config.target. Nov 1 00:43:48.530503 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Nov 1 00:43:48.530548 systemd[1]: Reached target user-config.target. Nov 1 00:43:48.549627 extend-filesystems[1170]: Found loop1 Nov 1 00:43:48.549627 extend-filesystems[1170]: Found vda Nov 1 00:43:48.549627 extend-filesystems[1170]: Found vda1 Nov 1 00:43:48.549627 extend-filesystems[1170]: Found vda2 Nov 1 00:43:48.549627 extend-filesystems[1170]: Found vda3 Nov 1 00:43:48.549627 extend-filesystems[1170]: Found usr Nov 1 00:43:48.549627 extend-filesystems[1170]: Found vda4 Nov 1 00:43:48.549627 extend-filesystems[1170]: Found vda6 Nov 1 00:43:48.549627 extend-filesystems[1170]: Found vda7 Nov 1 00:43:48.549627 extend-filesystems[1170]: Found vda9 Nov 1 00:43:48.549627 extend-filesystems[1170]: Checking size of /dev/vda9 Nov 1 00:43:48.661506 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks Nov 1 00:43:48.661626 update_engine[1184]: I1101 00:43:48.626577 1184 main.cc:92] Flatcar Update Engine starting Nov 1 00:43:48.661626 update_engine[1184]: I1101 00:43:48.634338 1184 update_check_scheduler.cc:74] Next update check in 7m0s Nov 1 00:43:48.575390 systemd[1]: motdgen.service: Deactivated successfully. Nov 1 00:43:48.669237 extend-filesystems[1170]: Resized partition /dev/vda9 Nov 1 00:43:48.575640 systemd[1]: Finished motdgen.service. Nov 1 00:43:48.677817 extend-filesystems[1207]: resize2fs 1.46.5 (30-Dec-2021) Nov 1 00:43:48.634116 systemd[1]: Started update-engine.service. Nov 1 00:43:48.655392 systemd[1]: Started locksmithd.service. Nov 1 00:43:48.718248 systemd-logind[1181]: Watching system buttons on /dev/input/event1 (Power Button) Nov 1 00:43:48.718368 systemd-logind[1181]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Nov 1 00:43:48.718934 systemd-logind[1181]: New seat seat0. Nov 1 00:43:48.724700 systemd[1]: Started systemd-logind.service. Nov 1 00:43:48.727003 bash[1219]: Updated "/home/core/.ssh/authorized_keys" Nov 1 00:43:48.727498 systemd[1]: Finished update-ssh-keys-after-ignition.service. Nov 1 00:43:48.782764 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Nov 1 00:43:48.807764 extend-filesystems[1207]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Nov 1 00:43:48.807764 extend-filesystems[1207]: old_desc_blocks = 1, new_desc_blocks = 8 Nov 1 00:43:48.807764 extend-filesystems[1207]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Nov 1 00:43:48.816064 extend-filesystems[1170]: Resized filesystem in /dev/vda9 Nov 1 00:43:48.816064 extend-filesystems[1170]: Found vdb Nov 1 00:43:48.825091 env[1192]: time="2025-11-01T00:43:48.811146366Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Nov 1 00:43:48.808406 systemd[1]: extend-filesystems.service: Deactivated successfully. Nov 1 00:43:48.808755 systemd[1]: Finished extend-filesystems.service. Nov 1 00:43:48.833093 coreos-metadata[1165]: Nov 01 00:43:48.832 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Nov 1 00:43:48.850313 coreos-metadata[1165]: Nov 01 00:43:48.848 INFO Fetch successful Nov 1 00:43:48.858414 unknown[1165]: wrote ssh authorized keys file for user: core Nov 1 00:43:49.921610 systemd-resolved[1129]: Clock change detected. Flushing caches. Nov 1 00:43:49.922175 systemd-timesyncd[1130]: Contacted time server 66.118.231.14:123 (0.flatcar.pool.ntp.org). Nov 1 00:43:49.922865 systemd-timesyncd[1130]: Initial clock synchronization to Sat 2025-11-01 00:43:49.920768 UTC. Nov 1 00:43:49.928656 update-ssh-keys[1223]: Updated "/home/core/.ssh/authorized_keys" Nov 1 00:43:49.929233 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Nov 1 00:43:49.948671 env[1192]: time="2025-11-01T00:43:49.947930985Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Nov 1 00:43:49.948671 env[1192]: time="2025-11-01T00:43:49.948130103Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:43:49.959677 env[1192]: time="2025-11-01T00:43:49.956971786Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:43:49.959677 env[1192]: time="2025-11-01T00:43:49.957060682Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:43:49.959677 env[1192]: time="2025-11-01T00:43:49.957436179Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:43:49.959677 env[1192]: time="2025-11-01T00:43:49.957458158Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Nov 1 00:43:49.959677 env[1192]: time="2025-11-01T00:43:49.957474079Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Nov 1 00:43:49.959677 env[1192]: time="2025-11-01T00:43:49.957486822Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Nov 1 00:43:49.959677 env[1192]: time="2025-11-01T00:43:49.957593890Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:43:49.959677 env[1192]: time="2025-11-01T00:43:49.957899190Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:43:49.959677 env[1192]: time="2025-11-01T00:43:49.958035737Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:43:49.959677 env[1192]: time="2025-11-01T00:43:49.958050818Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Nov 1 00:43:49.960268 env[1192]: time="2025-11-01T00:43:49.958123095Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Nov 1 00:43:49.960268 env[1192]: time="2025-11-01T00:43:49.958141256Z" level=info msg="metadata content store policy set" policy=shared Nov 1 00:43:49.972107 env[1192]: time="2025-11-01T00:43:49.970832219Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Nov 1 00:43:49.972107 env[1192]: time="2025-11-01T00:43:49.970896291Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Nov 1 00:43:49.972107 env[1192]: time="2025-11-01T00:43:49.970930116Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Nov 1 00:43:49.972107 env[1192]: time="2025-11-01T00:43:49.970989520Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Nov 1 00:43:49.972107 env[1192]: time="2025-11-01T00:43:49.971006410Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Nov 1 00:43:49.972107 env[1192]: time="2025-11-01T00:43:49.971020775Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Nov 1 00:43:49.972107 env[1192]: time="2025-11-01T00:43:49.971091662Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Nov 1 00:43:49.972107 env[1192]: time="2025-11-01T00:43:49.971107399Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Nov 1 00:43:49.972107 env[1192]: time="2025-11-01T00:43:49.971128566Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Nov 1 00:43:49.972107 env[1192]: time="2025-11-01T00:43:49.971142846Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Nov 1 00:43:49.972107 env[1192]: time="2025-11-01T00:43:49.971156193Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Nov 1 00:43:49.972107 env[1192]: time="2025-11-01T00:43:49.971170124Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Nov 1 00:43:49.972107 env[1192]: time="2025-11-01T00:43:49.971365476Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Nov 1 00:43:49.972107 env[1192]: time="2025-11-01T00:43:49.971456069Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Nov 1 00:43:49.972593 env[1192]: time="2025-11-01T00:43:49.971925039Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Nov 1 00:43:49.972593 env[1192]: time="2025-11-01T00:43:49.971960531Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Nov 1 00:43:49.972593 env[1192]: time="2025-11-01T00:43:49.971980769Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Nov 1 00:43:49.972593 env[1192]: time="2025-11-01T00:43:49.972036774Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Nov 1 00:43:49.972593 env[1192]: time="2025-11-01T00:43:49.972049636Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Nov 1 00:43:49.972593 env[1192]: time="2025-11-01T00:43:49.972062519Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Nov 1 00:43:49.974098 env[1192]: time="2025-11-01T00:43:49.972074943Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Nov 1 00:43:49.974098 env[1192]: time="2025-11-01T00:43:49.972856761Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Nov 1 00:43:49.974098 env[1192]: time="2025-11-01T00:43:49.972872348Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Nov 1 00:43:49.974098 env[1192]: time="2025-11-01T00:43:49.972884209Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Nov 1 00:43:49.974098 env[1192]: time="2025-11-01T00:43:49.972898312Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Nov 1 00:43:49.974098 env[1192]: time="2025-11-01T00:43:49.972912922Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Nov 1 00:43:49.974098 env[1192]: time="2025-11-01T00:43:49.973133525Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Nov 1 00:43:49.974098 env[1192]: time="2025-11-01T00:43:49.973177014Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Nov 1 00:43:49.974098 env[1192]: time="2025-11-01T00:43:49.973200067Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Nov 1 00:43:49.974098 env[1192]: time="2025-11-01T00:43:49.973213021Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Nov 1 00:43:49.974098 env[1192]: time="2025-11-01T00:43:49.973231306Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Nov 1 00:43:49.974098 env[1192]: time="2025-11-01T00:43:49.973243934Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Nov 1 00:43:49.974098 env[1192]: time="2025-11-01T00:43:49.973270547Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Nov 1 00:43:49.974098 env[1192]: time="2025-11-01T00:43:49.973313577Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Nov 1 00:43:49.974576 env[1192]: time="2025-11-01T00:43:49.973597962Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Nov 1 00:43:49.974576 env[1192]: time="2025-11-01T00:43:49.973681193Z" level=info msg="Connect containerd service" Nov 1 00:43:49.974576 env[1192]: time="2025-11-01T00:43:49.973729072Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Nov 1 00:43:49.977734 env[1192]: time="2025-11-01T00:43:49.976865702Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Nov 1 00:43:49.977734 env[1192]: time="2025-11-01T00:43:49.977214807Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Nov 1 00:43:49.977734 env[1192]: time="2025-11-01T00:43:49.977266188Z" level=info msg=serving... address=/run/containerd/containerd.sock Nov 1 00:43:49.977734 env[1192]: time="2025-11-01T00:43:49.977316371Z" level=info msg="containerd successfully booted in 0.123389s" Nov 1 00:43:49.977759 systemd[1]: Started containerd.service. Nov 1 00:43:49.986520 env[1192]: time="2025-11-01T00:43:49.986411514Z" level=info msg="Start subscribing containerd event" Nov 1 00:43:49.986745 env[1192]: time="2025-11-01T00:43:49.986562229Z" level=info msg="Start recovering state" Nov 1 00:43:49.986745 env[1192]: time="2025-11-01T00:43:49.986708182Z" level=info msg="Start event monitor" Nov 1 00:43:49.986848 env[1192]: time="2025-11-01T00:43:49.986749579Z" level=info msg="Start snapshots syncer" Nov 1 00:43:49.986848 env[1192]: time="2025-11-01T00:43:49.986766510Z" level=info msg="Start cni network conf syncer for default" Nov 1 00:43:49.986848 env[1192]: time="2025-11-01T00:43:49.986778429Z" level=info msg="Start streaming server" Nov 1 00:43:50.321533 locksmithd[1218]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Nov 1 00:43:51.169710 systemd[1]: Started kubelet.service. Nov 1 00:43:51.374438 systemd[1]: Created slice system-sshd.slice. Nov 1 00:43:51.438762 sshd_keygen[1189]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Nov 1 00:43:51.473220 systemd[1]: Finished sshd-keygen.service. Nov 1 00:43:51.476686 systemd[1]: Starting issuegen.service... Nov 1 00:43:51.480409 systemd[1]: Started sshd@0-146.190.149.44:22-139.178.89.65:36264.service. Nov 1 00:43:51.495680 systemd[1]: issuegen.service: Deactivated successfully. Nov 1 00:43:51.495915 systemd[1]: Finished issuegen.service. Nov 1 00:43:51.499235 systemd[1]: Starting systemd-user-sessions.service... Nov 1 00:43:51.512707 systemd[1]: Finished systemd-user-sessions.service. Nov 1 00:43:51.516452 systemd[1]: Started getty@tty1.service. Nov 1 00:43:51.521151 systemd[1]: Started serial-getty@ttyS0.service. Nov 1 00:43:51.522554 systemd[1]: Reached target getty.target. Nov 1 00:43:51.524888 systemd[1]: Reached target multi-user.target. Nov 1 00:43:51.529166 systemd[1]: Starting systemd-update-utmp-runlevel.service... Nov 1 00:43:51.546420 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Nov 1 00:43:51.546661 systemd[1]: Finished systemd-update-utmp-runlevel.service. Nov 1 00:43:51.547723 systemd[1]: Startup finished in 1.123s (kernel) + 5.327s (initrd) + 8.420s (userspace) = 14.871s. Nov 1 00:43:51.607034 sshd[1249]: Accepted publickey for core from 139.178.89.65 port 36264 ssh2: RSA SHA256:qTXCs2mptgHeumafEfvg1OWutmYgYP0XSB3zx5Iy+CM Nov 1 00:43:51.609202 sshd[1249]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:43:51.628325 systemd[1]: Created slice user-500.slice. Nov 1 00:43:51.630990 systemd[1]: Starting user-runtime-dir@500.service... Nov 1 00:43:51.646721 systemd-logind[1181]: New session 1 of user core. Nov 1 00:43:51.653588 systemd[1]: Finished user-runtime-dir@500.service. Nov 1 00:43:51.657006 systemd[1]: Starting user@500.service... Nov 1 00:43:51.666829 (systemd)[1259]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:43:51.791256 systemd[1259]: Queued start job for default target default.target. Nov 1 00:43:51.792677 systemd[1259]: Reached target paths.target. Nov 1 00:43:51.792863 systemd[1259]: Reached target sockets.target. Nov 1 00:43:51.792956 systemd[1259]: Reached target timers.target. Nov 1 00:43:51.793192 systemd[1259]: Reached target basic.target. Nov 1 00:43:51.793457 systemd[1]: Started user@500.service. Nov 1 00:43:51.794665 systemd[1]: Started session-1.scope. Nov 1 00:43:51.795809 systemd[1259]: Reached target default.target. Nov 1 00:43:51.796313 systemd[1259]: Startup finished in 116ms. Nov 1 00:43:51.865807 systemd[1]: Started sshd@1-146.190.149.44:22-139.178.89.65:36278.service. Nov 1 00:43:51.942582 sshd[1268]: Accepted publickey for core from 139.178.89.65 port 36278 ssh2: RSA SHA256:qTXCs2mptgHeumafEfvg1OWutmYgYP0XSB3zx5Iy+CM Nov 1 00:43:51.946250 sshd[1268]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:43:51.955022 systemd-logind[1181]: New session 2 of user core. Nov 1 00:43:51.956699 systemd[1]: Started session-2.scope. Nov 1 00:43:52.042182 sshd[1268]: pam_unix(sshd:session): session closed for user core Nov 1 00:43:52.043032 systemd[1]: Started sshd@2-146.190.149.44:22-139.178.89.65:36292.service. Nov 1 00:43:52.049129 systemd-logind[1181]: Session 2 logged out. Waiting for processes to exit. Nov 1 00:43:52.050912 systemd[1]: sshd@1-146.190.149.44:22-139.178.89.65:36278.service: Deactivated successfully. Nov 1 00:43:52.052066 systemd[1]: session-2.scope: Deactivated successfully. Nov 1 00:43:52.053788 systemd-logind[1181]: Removed session 2. Nov 1 00:43:52.101287 sshd[1273]: Accepted publickey for core from 139.178.89.65 port 36292 ssh2: RSA SHA256:qTXCs2mptgHeumafEfvg1OWutmYgYP0XSB3zx5Iy+CM Nov 1 00:43:52.103764 sshd[1273]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:43:52.112190 systemd[1]: Started session-3.scope. Nov 1 00:43:52.113119 systemd-logind[1181]: New session 3 of user core. Nov 1 00:43:52.169328 kubelet[1234]: E1101 00:43:52.169015 1234 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 00:43:52.172243 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 00:43:52.172402 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 00:43:52.172745 systemd[1]: kubelet.service: Consumed 1.666s CPU time. Nov 1 00:43:52.175044 sshd[1273]: pam_unix(sshd:session): session closed for user core Nov 1 00:43:52.183062 systemd[1]: sshd@2-146.190.149.44:22-139.178.89.65:36292.service: Deactivated successfully. Nov 1 00:43:52.184168 systemd[1]: session-3.scope: Deactivated successfully. Nov 1 00:43:52.185205 systemd-logind[1181]: Session 3 logged out. Waiting for processes to exit. Nov 1 00:43:52.187190 systemd[1]: Started sshd@3-146.190.149.44:22-139.178.89.65:36306.service. Nov 1 00:43:52.190223 systemd-logind[1181]: Removed session 3. Nov 1 00:43:52.244810 sshd[1280]: Accepted publickey for core from 139.178.89.65 port 36306 ssh2: RSA SHA256:qTXCs2mptgHeumafEfvg1OWutmYgYP0XSB3zx5Iy+CM Nov 1 00:43:52.248342 sshd[1280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:43:52.255423 systemd[1]: Started session-4.scope. Nov 1 00:43:52.256103 systemd-logind[1181]: New session 4 of user core. Nov 1 00:43:52.327932 sshd[1280]: pam_unix(sshd:session): session closed for user core Nov 1 00:43:52.335088 systemd[1]: sshd@3-146.190.149.44:22-139.178.89.65:36306.service: Deactivated successfully. Nov 1 00:43:52.336021 systemd[1]: session-4.scope: Deactivated successfully. Nov 1 00:43:52.336796 systemd-logind[1181]: Session 4 logged out. Waiting for processes to exit. Nov 1 00:43:52.338599 systemd[1]: Started sshd@4-146.190.149.44:22-139.178.89.65:36320.service. Nov 1 00:43:52.340315 systemd-logind[1181]: Removed session 4. Nov 1 00:43:52.399033 sshd[1286]: Accepted publickey for core from 139.178.89.65 port 36320 ssh2: RSA SHA256:qTXCs2mptgHeumafEfvg1OWutmYgYP0XSB3zx5Iy+CM Nov 1 00:43:52.401828 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:43:52.409426 systemd-logind[1181]: New session 5 of user core. Nov 1 00:43:52.409581 systemd[1]: Started session-5.scope. Nov 1 00:43:52.487437 sudo[1289]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Nov 1 00:43:52.488225 sudo[1289]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:43:52.499070 dbus-daemon[1166]: \xd0M\xe9\xfb\u0013V: received setenforce notice (enforcing=1732069456) Nov 1 00:43:52.499975 sudo[1289]: pam_unix(sudo:session): session closed for user root Nov 1 00:43:52.506588 sshd[1286]: pam_unix(sshd:session): session closed for user core Nov 1 00:43:52.512849 systemd[1]: Started sshd@5-146.190.149.44:22-139.178.89.65:36334.service. Nov 1 00:43:52.513639 systemd[1]: sshd@4-146.190.149.44:22-139.178.89.65:36320.service: Deactivated successfully. Nov 1 00:43:52.515181 systemd[1]: session-5.scope: Deactivated successfully. Nov 1 00:43:52.517230 systemd-logind[1181]: Session 5 logged out. Waiting for processes to exit. Nov 1 00:43:52.518534 systemd-logind[1181]: Removed session 5. Nov 1 00:43:52.565963 sshd[1292]: Accepted publickey for core from 139.178.89.65 port 36334 ssh2: RSA SHA256:qTXCs2mptgHeumafEfvg1OWutmYgYP0XSB3zx5Iy+CM Nov 1 00:43:52.568850 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:43:52.575711 systemd-logind[1181]: New session 6 of user core. Nov 1 00:43:52.576136 systemd[1]: Started session-6.scope. Nov 1 00:43:52.640019 sudo[1297]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Nov 1 00:43:52.641258 sudo[1297]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:43:52.645960 sudo[1297]: pam_unix(sudo:session): session closed for user root Nov 1 00:43:52.653733 sudo[1296]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Nov 1 00:43:52.654474 sudo[1296]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:43:52.668744 systemd[1]: Stopping audit-rules.service... Nov 1 00:43:52.669000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Nov 1 00:43:52.669000 audit[1300]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff455a3cc0 a2=420 a3=0 items=0 ppid=1 pid=1300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:52.669000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Nov 1 00:43:52.671339 auditctl[1300]: No rules Nov 1 00:43:52.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:52.671894 systemd[1]: audit-rules.service: Deactivated successfully. Nov 1 00:43:52.672096 systemd[1]: Stopped audit-rules.service. Nov 1 00:43:52.675033 systemd[1]: Starting audit-rules.service... Nov 1 00:43:52.703704 augenrules[1317]: No rules Nov 1 00:43:52.704964 systemd[1]: Finished audit-rules.service. Nov 1 00:43:52.708669 kernel: kauditd_printk_skb: 188 callbacks suppressed Nov 1 00:43:52.708782 kernel: audit: type=1130 audit(1761957832.703:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:52.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:52.706349 sudo[1296]: pam_unix(sudo:session): session closed for user root Nov 1 00:43:52.712681 sshd[1292]: pam_unix(sshd:session): session closed for user core Nov 1 00:43:52.703000 audit[1296]: USER_END pid=1296 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:43:52.721436 kernel: audit: type=1106 audit(1761957832.703:230): pid=1296 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:43:52.718097 systemd[1]: Started sshd@6-146.190.149.44:22-139.178.89.65:36348.service. Nov 1 00:43:52.703000 audit[1296]: CRED_DISP pid=1296 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:43:52.728796 kernel: audit: type=1104 audit(1761957832.703:231): pid=1296 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:43:52.729192 kernel: audit: type=1130 audit(1761957832.720:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-146.190.149.44:22-139.178.89.65:36348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:52.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-146.190.149.44:22-139.178.89.65:36348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:52.739433 systemd[1]: sshd@5-146.190.149.44:22-139.178.89.65:36334.service: Deactivated successfully. Nov 1 00:43:52.740484 systemd[1]: session-6.scope: Deactivated successfully. Nov 1 00:43:52.742281 systemd-logind[1181]: Session 6 logged out. Waiting for processes to exit. Nov 1 00:43:52.743843 systemd-logind[1181]: Removed session 6. Nov 1 00:43:52.735000 audit[1292]: USER_END pid=1292 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 00:43:52.753687 kernel: audit: type=1106 audit(1761957832.735:233): pid=1292 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 00:43:52.753875 kernel: audit: type=1104 audit(1761957832.735:234): pid=1292 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 00:43:52.735000 audit[1292]: CRED_DISP pid=1292 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 00:43:52.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-146.190.149.44:22-139.178.89.65:36334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:52.767978 kernel: audit: type=1131 audit(1761957832.738:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-146.190.149.44:22-139.178.89.65:36334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:52.793000 audit[1322]: USER_ACCT pid=1322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 00:43:52.797207 sshd[1322]: Accepted publickey for core from 139.178.89.65 port 36348 ssh2: RSA SHA256:qTXCs2mptgHeumafEfvg1OWutmYgYP0XSB3zx5Iy+CM Nov 1 00:43:52.804664 kernel: audit: type=1101 audit(1761957832.793:236): pid=1322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 00:43:52.803000 audit[1322]: CRED_ACQ pid=1322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 00:43:52.805951 sshd[1322]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:43:52.818022 kernel: audit: type=1103 audit(1761957832.803:237): pid=1322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 00:43:52.818296 kernel: audit: type=1006 audit(1761957832.803:238): pid=1322 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=7 res=1 Nov 1 00:43:52.803000 audit[1322]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc4c99d10 a2=3 a3=0 items=0 ppid=1 pid=1322 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:52.803000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:43:52.822974 systemd[1]: Started session-7.scope. Nov 1 00:43:52.823384 systemd-logind[1181]: New session 7 of user core. Nov 1 00:43:52.827000 audit[1322]: USER_START pid=1322 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 00:43:52.830000 audit[1325]: CRED_ACQ pid=1325 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 00:43:52.884000 audit[1326]: USER_ACCT pid=1326 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:43:52.886148 sudo[1326]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Nov 1 00:43:52.884000 audit[1326]: CRED_REFR pid=1326 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:43:52.886594 sudo[1326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:43:52.887000 audit[1326]: USER_START pid=1326 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:43:52.906737 systemd[1]: Starting coreos-metadata.service... Nov 1 00:43:52.960337 coreos-metadata[1330]: Nov 01 00:43:52.960 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Nov 1 00:43:52.973192 coreos-metadata[1330]: Nov 01 00:43:52.972 INFO Fetch successful Nov 1 00:43:52.987516 systemd[1]: Finished coreos-metadata.service. Nov 1 00:43:52.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:53.825422 systemd[1]: Stopped kubelet.service. Nov 1 00:43:53.826226 systemd[1]: kubelet.service: Consumed 1.666s CPU time. Nov 1 00:43:53.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:53.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:53.829470 systemd[1]: Starting kubelet.service... Nov 1 00:43:53.875037 systemd[1]: Reloading. Nov 1 00:43:54.026772 /usr/lib/systemd/system-generators/torcx-generator[1385]: time="2025-11-01T00:43:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:43:54.035755 /usr/lib/systemd/system-generators/torcx-generator[1385]: time="2025-11-01T00:43:54Z" level=info msg="torcx already run" Nov 1 00:43:54.114545 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:43:54.114890 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:43:54.143475 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:43:54.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit: BPF prog-id=46 op=LOAD Nov 1 00:43:54.247000 audit: BPF prog-id=41 op=UNLOAD Nov 1 00:43:54.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit: BPF prog-id=47 op=LOAD Nov 1 00:43:54.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.247000 audit: BPF prog-id=48 op=LOAD Nov 1 00:43:54.247000 audit: BPF prog-id=42 op=UNLOAD Nov 1 00:43:54.247000 audit: BPF prog-id=43 op=UNLOAD Nov 1 00:43:54.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.248000 audit: BPF prog-id=49 op=LOAD Nov 1 00:43:54.248000 audit: BPF prog-id=44 op=UNLOAD Nov 1 00:43:54.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.250000 audit: BPF prog-id=50 op=LOAD Nov 1 00:43:54.250000 audit: BPF prog-id=39 op=UNLOAD Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit: BPF prog-id=51 op=LOAD Nov 1 00:43:54.252000 audit: BPF prog-id=30 op=UNLOAD Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit: BPF prog-id=52 op=LOAD Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.252000 audit: BPF prog-id=53 op=LOAD Nov 1 00:43:54.252000 audit: BPF prog-id=31 op=UNLOAD Nov 1 00:43:54.252000 audit: BPF prog-id=32 op=UNLOAD Nov 1 00:43:54.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.253000 audit: BPF prog-id=54 op=LOAD Nov 1 00:43:54.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.253000 audit: BPF prog-id=55 op=LOAD Nov 1 00:43:54.253000 audit: BPF prog-id=33 op=UNLOAD Nov 1 00:43:54.253000 audit: BPF prog-id=34 op=UNLOAD Nov 1 00:43:54.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.256000 audit: BPF prog-id=56 op=LOAD Nov 1 00:43:54.256000 audit: BPF prog-id=35 op=UNLOAD Nov 1 00:43:54.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.257000 audit: BPF prog-id=57 op=LOAD Nov 1 00:43:54.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.257000 audit: BPF prog-id=58 op=LOAD Nov 1 00:43:54.257000 audit: BPF prog-id=36 op=UNLOAD Nov 1 00:43:54.257000 audit: BPF prog-id=37 op=UNLOAD Nov 1 00:43:54.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.258000 audit: BPF prog-id=59 op=LOAD Nov 1 00:43:54.259000 audit: BPF prog-id=40 op=UNLOAD Nov 1 00:43:54.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:54.260000 audit: BPF prog-id=60 op=LOAD Nov 1 00:43:54.260000 audit: BPF prog-id=38 op=UNLOAD Nov 1 00:43:54.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:54.283465 systemd[1]: Started kubelet.service. Nov 1 00:43:54.287137 systemd[1]: Stopping kubelet.service... Nov 1 00:43:54.287874 systemd[1]: kubelet.service: Deactivated successfully. Nov 1 00:43:54.288090 systemd[1]: Stopped kubelet.service. Nov 1 00:43:54.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:54.292253 systemd[1]: Starting kubelet.service... Nov 1 00:43:54.448179 systemd[1]: Started kubelet.service. Nov 1 00:43:54.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:54.514342 kubelet[1438]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Nov 1 00:43:54.514817 kubelet[1438]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Nov 1 00:43:54.514885 kubelet[1438]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Nov 1 00:43:54.515094 kubelet[1438]: I1101 00:43:54.515057 1438 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Nov 1 00:43:56.108540 kubelet[1438]: I1101 00:43:56.108109 1438 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Nov 1 00:43:56.108540 kubelet[1438]: I1101 00:43:56.108464 1438 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Nov 1 00:43:56.109860 kubelet[1438]: I1101 00:43:56.109830 1438 server.go:956] "Client rotation is on, will bootstrap in background" Nov 1 00:43:56.147061 kubelet[1438]: I1101 00:43:56.147011 1438 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Nov 1 00:43:56.164336 kubelet[1438]: E1101 00:43:56.164249 1438 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Nov 1 00:43:56.164657 kubelet[1438]: I1101 00:43:56.164604 1438 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Nov 1 00:43:56.171351 kubelet[1438]: I1101 00:43:56.171253 1438 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Nov 1 00:43:56.171878 kubelet[1438]: I1101 00:43:56.171825 1438 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Nov 1 00:43:56.172265 kubelet[1438]: I1101 00:43:56.171875 1438 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"146.190.149.44","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Nov 1 00:43:56.172471 kubelet[1438]: I1101 00:43:56.172315 1438 topology_manager.go:138] "Creating topology manager with none policy" Nov 1 00:43:56.172471 kubelet[1438]: I1101 00:43:56.172353 1438 container_manager_linux.go:303] "Creating device plugin manager" Nov 1 00:43:56.172676 kubelet[1438]: I1101 00:43:56.172652 1438 state_mem.go:36] "Initialized new in-memory state store" Nov 1 00:43:56.180602 kubelet[1438]: I1101 00:43:56.180548 1438 kubelet.go:480] "Attempting to sync node with API server" Nov 1 00:43:56.180681 kubelet[1438]: I1101 00:43:56.180609 1438 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Nov 1 00:43:56.180742 kubelet[1438]: I1101 00:43:56.180707 1438 kubelet.go:386] "Adding apiserver pod source" Nov 1 00:43:56.191316 kubelet[1438]: E1101 00:43:56.191274 1438 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:43:56.191583 kubelet[1438]: E1101 00:43:56.191560 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:43:56.192233 kubelet[1438]: I1101 00:43:56.192198 1438 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Nov 1 00:43:56.198431 kubelet[1438]: E1101 00:43:56.198384 1438 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: nodes \"146.190.149.44\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Nov 1 00:43:56.198809 kubelet[1438]: E1101 00:43:56.198766 1438 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Nov 1 00:43:56.200689 kubelet[1438]: I1101 00:43:56.200661 1438 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Nov 1 00:43:56.201816 kubelet[1438]: I1101 00:43:56.201787 1438 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Nov 1 00:43:56.203364 kubelet[1438]: W1101 00:43:56.203308 1438 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Nov 1 00:43:56.208063 kubelet[1438]: I1101 00:43:56.208027 1438 watchdog_linux.go:99] "Systemd watchdog is not enabled" Nov 1 00:43:56.208154 kubelet[1438]: I1101 00:43:56.208140 1438 server.go:1289] "Started kubelet" Nov 1 00:43:56.215119 kubelet[1438]: I1101 00:43:56.214198 1438 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Nov 1 00:43:56.214000 audit[1438]: AVC avc: denied { mac_admin } for pid=1438 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:56.214000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:43:56.214000 audit[1438]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00066b650 a1=c000258e70 a2=c00066b620 a3=25 items=0 ppid=1 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:56.214000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:43:56.214000 audit[1438]: AVC avc: denied { mac_admin } for pid=1438 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:56.214000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:43:56.214000 audit[1438]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0003b9e80 a1=c000258e88 a2=c00066b6e0 a3=25 items=0 ppid=1 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:56.214000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:43:56.216768 kubelet[1438]: I1101 00:43:56.216168 1438 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Nov 1 00:43:56.216768 kubelet[1438]: I1101 00:43:56.216253 1438 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Nov 1 00:43:56.216768 kubelet[1438]: I1101 00:43:56.216396 1438 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Nov 1 00:43:56.216919 kubelet[1438]: I1101 00:43:56.216894 1438 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Nov 1 00:43:56.217125 kubelet[1438]: I1101 00:43:56.217093 1438 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Nov 1 00:43:56.218876 kubelet[1438]: I1101 00:43:56.218850 1438 server.go:317] "Adding debug handlers to kubelet server" Nov 1 00:43:56.225020 kubelet[1438]: I1101 00:43:56.224971 1438 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Nov 1 00:43:56.230573 kubelet[1438]: I1101 00:43:56.227279 1438 volume_manager.go:297] "Starting Kubelet Volume Manager" Nov 1 00:43:56.231388 kubelet[1438]: I1101 00:43:56.227316 1438 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Nov 1 00:43:56.234244 kubelet[1438]: E1101 00:43:56.227535 1438 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.149.44\" not found" Nov 1 00:43:56.234464 kubelet[1438]: I1101 00:43:56.234448 1438 reconciler.go:26] "Reconciler: start to sync state" Nov 1 00:43:56.244515 kubelet[1438]: I1101 00:43:56.244486 1438 factory.go:223] Registration of the containerd container factory successfully Nov 1 00:43:56.244708 kubelet[1438]: I1101 00:43:56.244694 1438 factory.go:223] Registration of the systemd container factory successfully Nov 1 00:43:56.244881 kubelet[1438]: I1101 00:43:56.244859 1438 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Nov 1 00:43:56.285705 kubelet[1438]: E1101 00:43:56.278005 1438 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"146.190.149.44\" not found" node="146.190.149.44" Nov 1 00:43:56.287090 kubelet[1438]: I1101 00:43:56.287044 1438 cpu_manager.go:221] "Starting CPU manager" policy="none" Nov 1 00:43:56.287090 kubelet[1438]: I1101 00:43:56.287069 1438 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Nov 1 00:43:56.287233 kubelet[1438]: I1101 00:43:56.287109 1438 state_mem.go:36] "Initialized new in-memory state store" Nov 1 00:43:56.291041 kubelet[1438]: I1101 00:43:56.289706 1438 policy_none.go:49] "None policy: Start" Nov 1 00:43:56.291041 kubelet[1438]: I1101 00:43:56.289759 1438 memory_manager.go:186] "Starting memorymanager" policy="None" Nov 1 00:43:56.291041 kubelet[1438]: I1101 00:43:56.289791 1438 state_mem.go:35] "Initializing new in-memory state store" Nov 1 00:43:56.301674 systemd[1]: Created slice kubepods.slice. Nov 1 00:43:56.308350 systemd[1]: Created slice kubepods-besteffort.slice. Nov 1 00:43:56.309000 audit[1461]: NETFILTER_CFG table=mangle:2 family=10 entries=2 op=nft_register_chain pid=1461 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:43:56.309000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd1a2e6290 a2=0 a3=7ffd1a2e627c items=0 ppid=1438 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:56.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Nov 1 00:43:56.311708 kubelet[1438]: I1101 00:43:56.311610 1438 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Nov 1 00:43:56.313000 audit[1462]: NETFILTER_CFG table=mangle:3 family=10 entries=1 op=nft_register_chain pid=1462 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:43:56.313000 audit[1463]: NETFILTER_CFG table=mangle:4 family=2 entries=2 op=nft_register_chain pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:43:56.313000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc4d3534e0 a2=0 a3=7ffc4d3534cc items=0 ppid=1438 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:56.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Nov 1 00:43:56.315929 systemd[1]: Created slice kubepods-burstable.slice. Nov 1 00:43:56.313000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd387bce50 a2=0 a3=7ffd387bce3c items=0 ppid=1438 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:56.313000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Nov 1 00:43:56.318769 kubelet[1438]: E1101 00:43:56.318730 1438 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Nov 1 00:43:56.318000 audit[1438]: AVC avc: denied { mac_admin } for pid=1438 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:56.318000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:43:56.318000 audit[1438]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00098cab0 a1=c000cc6b40 a2=c00098ca80 a3=25 items=0 ppid=1 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:56.318000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:43:56.321097 kubelet[1438]: E1101 00:43:56.320186 1438 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Nov 1 00:43:56.321097 kubelet[1438]: I1101 00:43:56.320409 1438 eviction_manager.go:189] "Eviction manager: starting control loop" Nov 1 00:43:56.321097 kubelet[1438]: I1101 00:43:56.320445 1438 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Nov 1 00:43:56.321097 kubelet[1438]: I1101 00:43:56.321094 1438 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Nov 1 00:43:56.320000 audit[1464]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:43:56.320000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd0219c8e0 a2=0 a3=7ffd0219c8cc items=0 ppid=1438 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:56.320000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Nov 1 00:43:56.323520 kubelet[1438]: E1101 00:43:56.323489 1438 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Nov 1 00:43:56.323710 kubelet[1438]: E1101 00:43:56.323603 1438 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"146.190.149.44\" not found" Nov 1 00:43:56.322000 audit[1465]: NETFILTER_CFG table=nat:6 family=10 entries=2 op=nft_register_chain pid=1465 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:43:56.322000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe4a366b40 a2=0 a3=7ffe4a366b2c items=0 ppid=1438 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:56.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Nov 1 00:43:56.327000 audit[1467]: NETFILTER_CFG table=filter:7 family=10 entries=2 op=nft_register_chain pid=1467 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:43:56.327000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd8a4db090 a2=0 a3=7ffd8a4db07c items=0 ppid=1438 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:56.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Nov 1 00:43:56.329000 audit[1468]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:43:56.329000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffc201ee70 a2=0 a3=7fffc201ee5c items=0 ppid=1438 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:56.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:43:56.352000 audit[1473]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:43:56.352000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff9d734890 a2=0 a3=7fff9d73487c items=0 ppid=1438 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:56.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:43:56.424652 kubelet[1438]: I1101 00:43:56.423077 1438 kubelet_node_status.go:75] "Attempting to register node" node="146.190.149.44" Nov 1 00:43:56.428015 kubelet[1438]: I1101 00:43:56.427974 1438 kubelet_node_status.go:78] "Successfully registered node" node="146.190.149.44" Nov 1 00:43:56.428283 kubelet[1438]: E1101 00:43:56.428250 1438 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"146.190.149.44\": node \"146.190.149.44\" not found" Nov 1 00:43:56.429000 audit[1478]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:43:56.429000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff3f39bff0 a2=0 a3=7fff3f39bfdc items=0 ppid=1438 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:56.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Nov 1 00:43:56.431604 kubelet[1438]: I1101 00:43:56.431552 1438 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Nov 1 00:43:56.431604 kubelet[1438]: I1101 00:43:56.431603 1438 status_manager.go:230] "Starting to sync pod status with apiserver" Nov 1 00:43:56.431746 kubelet[1438]: I1101 00:43:56.431668 1438 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Nov 1 00:43:56.431746 kubelet[1438]: I1101 00:43:56.431682 1438 kubelet.go:2436] "Starting kubelet main sync loop" Nov 1 00:43:56.431911 kubelet[1438]: E1101 00:43:56.431842 1438 kubelet.go:2460] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Nov 1 00:43:56.432000 audit[1479]: NETFILTER_CFG table=mangle:11 family=2 entries=1 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:43:56.432000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd3c774cd0 a2=0 a3=7ffd3c774cbc items=0 ppid=1438 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:56.432000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Nov 1 00:43:56.435000 audit[1480]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:43:56.435000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff87428ae0 a2=0 a3=7fff87428acc items=0 ppid=1438 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:56.435000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Nov 1 00:43:56.439000 audit[1481]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:43:56.439000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2c442680 a2=0 a3=7fff2c44266c items=0 ppid=1438 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:56.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Nov 1 00:43:56.461870 kubelet[1438]: E1101 00:43:56.461835 1438 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.149.44\" not found" Nov 1 00:43:56.513803 sudo[1326]: pam_unix(sudo:session): session closed for user root Nov 1 00:43:56.512000 audit[1326]: USER_END pid=1326 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:43:56.513000 audit[1326]: CRED_DISP pid=1326 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:43:56.520113 sshd[1322]: pam_unix(sshd:session): session closed for user core Nov 1 00:43:56.520000 audit[1322]: USER_END pid=1322 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 00:43:56.520000 audit[1322]: CRED_DISP pid=1322 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 00:43:56.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-146.190.149.44:22-139.178.89.65:36348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:56.524772 systemd-logind[1181]: Session 7 logged out. Waiting for processes to exit. Nov 1 00:43:56.525019 systemd[1]: sshd@6-146.190.149.44:22-139.178.89.65:36348.service: Deactivated successfully. Nov 1 00:43:56.526239 systemd[1]: session-7.scope: Deactivated successfully. Nov 1 00:43:56.527347 systemd-logind[1181]: Removed session 7. Nov 1 00:43:56.563076 kubelet[1438]: E1101 00:43:56.562992 1438 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.149.44\" not found" Nov 1 00:43:56.663383 kubelet[1438]: E1101 00:43:56.663322 1438 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.149.44\" not found" Nov 1 00:43:56.764100 kubelet[1438]: E1101 00:43:56.763922 1438 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.149.44\" not found" Nov 1 00:43:56.865049 kubelet[1438]: E1101 00:43:56.864983 1438 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.149.44\" not found" Nov 1 00:43:56.966236 kubelet[1438]: E1101 00:43:56.966075 1438 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.149.44\" not found" Nov 1 00:43:57.067293 kubelet[1438]: E1101 00:43:57.067135 1438 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.149.44\" not found" Nov 1 00:43:57.117882 kubelet[1438]: I1101 00:43:57.117814 1438 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Nov 1 00:43:57.118822 kubelet[1438]: I1101 00:43:57.118787 1438 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Nov 1 00:43:57.118981 kubelet[1438]: I1101 00:43:57.118789 1438 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Nov 1 00:43:57.168414 kubelet[1438]: E1101 00:43:57.168325 1438 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.149.44\" not found" Nov 1 00:43:57.192707 kubelet[1438]: E1101 00:43:57.192658 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:43:57.270508 kubelet[1438]: I1101 00:43:57.270425 1438 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Nov 1 00:43:57.271022 env[1192]: time="2025-11-01T00:43:57.270920128Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Nov 1 00:43:57.271503 kubelet[1438]: I1101 00:43:57.271307 1438 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Nov 1 00:43:58.193734 kubelet[1438]: E1101 00:43:58.193692 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:43:58.194298 kubelet[1438]: I1101 00:43:58.193809 1438 apiserver.go:52] "Watching apiserver" Nov 1 00:43:58.210033 kubelet[1438]: E1101 00:43:58.209491 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k59zw" podUID="783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676" Nov 1 00:43:58.211342 systemd[1]: Created slice kubepods-besteffort-pod4a28bbd4_fe12_46a4_9aa5_5a6efa07665a.slice. Nov 1 00:43:58.223017 systemd[1]: Created slice kubepods-besteffort-pod91699c3c_6f70_4e27_816b_bb56df3e06b2.slice. Nov 1 00:43:58.237169 kubelet[1438]: I1101 00:43:58.237112 1438 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Nov 1 00:43:58.245264 kubelet[1438]: I1101 00:43:58.245204 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676-socket-dir\") pod \"csi-node-driver-k59zw\" (UID: \"783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676\") " pod="calico-system/csi-node-driver-k59zw" Nov 1 00:43:58.245504 kubelet[1438]: I1101 00:43:58.245485 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4a28bbd4-fe12-46a4-9aa5-5a6efa07665a-cni-bin-dir\") pod \"calico-node-52qnx\" (UID: \"4a28bbd4-fe12-46a4-9aa5-5a6efa07665a\") " pod="calico-system/calico-node-52qnx" Nov 1 00:43:58.245664 kubelet[1438]: I1101 00:43:58.245607 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4a28bbd4-fe12-46a4-9aa5-5a6efa07665a-policysync\") pod \"calico-node-52qnx\" (UID: \"4a28bbd4-fe12-46a4-9aa5-5a6efa07665a\") " pod="calico-system/calico-node-52qnx" Nov 1 00:43:58.245784 kubelet[1438]: I1101 00:43:58.245766 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4a28bbd4-fe12-46a4-9aa5-5a6efa07665a-var-lib-calico\") pod \"calico-node-52qnx\" (UID: \"4a28bbd4-fe12-46a4-9aa5-5a6efa07665a\") " pod="calico-system/calico-node-52qnx" Nov 1 00:43:58.245926 kubelet[1438]: I1101 00:43:58.245899 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676-registration-dir\") pod \"csi-node-driver-k59zw\" (UID: \"783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676\") " pod="calico-system/csi-node-driver-k59zw" Nov 1 00:43:58.246204 kubelet[1438]: I1101 00:43:58.246177 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zqwx5\" (UniqueName: \"kubernetes.io/projected/783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676-kube-api-access-zqwx5\") pod \"csi-node-driver-k59zw\" (UID: \"783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676\") " pod="calico-system/csi-node-driver-k59zw" Nov 1 00:43:58.246378 kubelet[1438]: I1101 00:43:58.246356 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/91699c3c-6f70-4e27-816b-bb56df3e06b2-lib-modules\") pod \"kube-proxy-nfh8l\" (UID: \"91699c3c-6f70-4e27-816b-bb56df3e06b2\") " pod="kube-system/kube-proxy-nfh8l" Nov 1 00:43:58.246520 kubelet[1438]: I1101 00:43:58.246500 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4a28bbd4-fe12-46a4-9aa5-5a6efa07665a-cni-log-dir\") pod \"calico-node-52qnx\" (UID: \"4a28bbd4-fe12-46a4-9aa5-5a6efa07665a\") " pod="calico-system/calico-node-52qnx" Nov 1 00:43:58.246673 kubelet[1438]: I1101 00:43:58.246655 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4a28bbd4-fe12-46a4-9aa5-5a6efa07665a-cni-net-dir\") pod \"calico-node-52qnx\" (UID: \"4a28bbd4-fe12-46a4-9aa5-5a6efa07665a\") " pod="calico-system/calico-node-52qnx" Nov 1 00:43:58.246818 kubelet[1438]: I1101 00:43:58.246798 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4a28bbd4-fe12-46a4-9aa5-5a6efa07665a-node-certs\") pod \"calico-node-52qnx\" (UID: \"4a28bbd4-fe12-46a4-9aa5-5a6efa07665a\") " pod="calico-system/calico-node-52qnx" Nov 1 00:43:58.246959 kubelet[1438]: I1101 00:43:58.246939 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4a28bbd4-fe12-46a4-9aa5-5a6efa07665a-tigera-ca-bundle\") pod \"calico-node-52qnx\" (UID: \"4a28bbd4-fe12-46a4-9aa5-5a6efa07665a\") " pod="calico-system/calico-node-52qnx" Nov 1 00:43:58.247121 kubelet[1438]: I1101 00:43:58.247086 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2hv46\" (UniqueName: \"kubernetes.io/projected/4a28bbd4-fe12-46a4-9aa5-5a6efa07665a-kube-api-access-2hv46\") pod \"calico-node-52qnx\" (UID: \"4a28bbd4-fe12-46a4-9aa5-5a6efa07665a\") " pod="calico-system/calico-node-52qnx" Nov 1 00:43:58.247254 kubelet[1438]: I1101 00:43:58.247235 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4a28bbd4-fe12-46a4-9aa5-5a6efa07665a-flexvol-driver-host\") pod \"calico-node-52qnx\" (UID: \"4a28bbd4-fe12-46a4-9aa5-5a6efa07665a\") " pod="calico-system/calico-node-52qnx" Nov 1 00:43:58.247387 kubelet[1438]: I1101 00:43:58.247367 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4a28bbd4-fe12-46a4-9aa5-5a6efa07665a-var-run-calico\") pod \"calico-node-52qnx\" (UID: \"4a28bbd4-fe12-46a4-9aa5-5a6efa07665a\") " pod="calico-system/calico-node-52qnx" Nov 1 00:43:58.247526 kubelet[1438]: I1101 00:43:58.247507 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676-varrun\") pod \"csi-node-driver-k59zw\" (UID: \"783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676\") " pod="calico-system/csi-node-driver-k59zw" Nov 1 00:43:58.247683 kubelet[1438]: I1101 00:43:58.247650 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/91699c3c-6f70-4e27-816b-bb56df3e06b2-kube-proxy\") pod \"kube-proxy-nfh8l\" (UID: \"91699c3c-6f70-4e27-816b-bb56df3e06b2\") " pod="kube-system/kube-proxy-nfh8l" Nov 1 00:43:58.247805 kubelet[1438]: I1101 00:43:58.247785 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/91699c3c-6f70-4e27-816b-bb56df3e06b2-xtables-lock\") pod \"kube-proxy-nfh8l\" (UID: \"91699c3c-6f70-4e27-816b-bb56df3e06b2\") " pod="kube-system/kube-proxy-nfh8l" Nov 1 00:43:58.247937 kubelet[1438]: I1101 00:43:58.247917 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z8mhh\" (UniqueName: \"kubernetes.io/projected/91699c3c-6f70-4e27-816b-bb56df3e06b2-kube-api-access-z8mhh\") pod \"kube-proxy-nfh8l\" (UID: \"91699c3c-6f70-4e27-816b-bb56df3e06b2\") " pod="kube-system/kube-proxy-nfh8l" Nov 1 00:43:58.248068 kubelet[1438]: I1101 00:43:58.248048 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4a28bbd4-fe12-46a4-9aa5-5a6efa07665a-lib-modules\") pod \"calico-node-52qnx\" (UID: \"4a28bbd4-fe12-46a4-9aa5-5a6efa07665a\") " pod="calico-system/calico-node-52qnx" Nov 1 00:43:58.248213 kubelet[1438]: I1101 00:43:58.248193 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4a28bbd4-fe12-46a4-9aa5-5a6efa07665a-xtables-lock\") pod \"calico-node-52qnx\" (UID: \"4a28bbd4-fe12-46a4-9aa5-5a6efa07665a\") " pod="calico-system/calico-node-52qnx" Nov 1 00:43:58.248370 kubelet[1438]: I1101 00:43:58.248338 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676-kubelet-dir\") pod \"csi-node-driver-k59zw\" (UID: \"783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676\") " pod="calico-system/csi-node-driver-k59zw" Nov 1 00:43:58.352027 kubelet[1438]: I1101 00:43:58.351976 1438 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Nov 1 00:43:58.362338 kubelet[1438]: E1101 00:43:58.362296 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:43:58.362338 kubelet[1438]: W1101 00:43:58.362328 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:43:58.362496 kubelet[1438]: E1101 00:43:58.362375 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:43:58.377125 kubelet[1438]: E1101 00:43:58.377090 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:43:58.377301 kubelet[1438]: W1101 00:43:58.377280 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:43:58.377422 kubelet[1438]: E1101 00:43:58.377405 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:43:58.377880 kubelet[1438]: E1101 00:43:58.377852 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:43:58.377985 kubelet[1438]: W1101 00:43:58.377968 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:43:58.378081 kubelet[1438]: E1101 00:43:58.378066 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:43:58.383887 kubelet[1438]: E1101 00:43:58.383833 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:43:58.383887 kubelet[1438]: W1101 00:43:58.383862 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:43:58.384077 kubelet[1438]: E1101 00:43:58.383898 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:43:58.520257 kubelet[1438]: E1101 00:43:58.520108 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Nov 1 00:43:58.522357 env[1192]: time="2025-11-01T00:43:58.521668510Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-52qnx,Uid:4a28bbd4-fe12-46a4-9aa5-5a6efa07665a,Namespace:calico-system,Attempt:0,}" Nov 1 00:43:58.529302 kubelet[1438]: E1101 00:43:58.529245 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Nov 1 00:43:58.530390 env[1192]: time="2025-11-01T00:43:58.530345275Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nfh8l,Uid:91699c3c-6f70-4e27-816b-bb56df3e06b2,Namespace:kube-system,Attempt:0,}" Nov 1 00:43:59.094971 env[1192]: time="2025-11-01T00:43:59.094874651Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:43:59.097596 env[1192]: time="2025-11-01T00:43:59.097508080Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:43:59.099156 env[1192]: time="2025-11-01T00:43:59.099006841Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:43:59.102590 env[1192]: time="2025-11-01T00:43:59.102531095Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:43:59.106718 env[1192]: time="2025-11-01T00:43:59.106660225Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:43:59.108321 env[1192]: time="2025-11-01T00:43:59.108264055Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:43:59.109327 env[1192]: time="2025-11-01T00:43:59.109290156Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:43:59.112732 env[1192]: time="2025-11-01T00:43:59.112681852Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:43:59.145935 env[1192]: time="2025-11-01T00:43:59.145821364Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:43:59.145935 env[1192]: time="2025-11-01T00:43:59.145863596Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:43:59.145935 env[1192]: time="2025-11-01T00:43:59.145875596Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:43:59.146568 env[1192]: time="2025-11-01T00:43:59.146503366Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/320a9eafee827fd7ced81b8d3cde05cb852f38fedcd7539cb832b8bc93754a65 pid=1508 runtime=io.containerd.runc.v2 Nov 1 00:43:59.148285 env[1192]: time="2025-11-01T00:43:59.148215477Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:43:59.148420 env[1192]: time="2025-11-01T00:43:59.148254697Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:43:59.148541 env[1192]: time="2025-11-01T00:43:59.148501577Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:43:59.148858 env[1192]: time="2025-11-01T00:43:59.148808184Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/513a7ac5744132982d53f9893a641f583c38767def27d7ed4dd460d9c032df5e pid=1507 runtime=io.containerd.runc.v2 Nov 1 00:43:59.169298 systemd[1]: Started cri-containerd-513a7ac5744132982d53f9893a641f583c38767def27d7ed4dd460d9c032df5e.scope. Nov 1 00:43:59.180972 systemd[1]: Started cri-containerd-320a9eafee827fd7ced81b8d3cde05cb852f38fedcd7539cb832b8bc93754a65.scope. Nov 1 00:43:59.195804 kubelet[1438]: E1101 00:43:59.195741 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:43:59.213405 kernel: kauditd_printk_skb: 238 callbacks suppressed Nov 1 00:43:59.213820 kernel: audit: type=1400 audit(1761957839.203:442): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.226977 kernel: audit: type=1400 audit(1761957839.203:443): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.227122 kernel: audit: type=1400 audit(1761957839.203:444): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.239983 kernel: audit: type=1400 audit(1761957839.203:445): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.240101 kernel: audit: type=1400 audit(1761957839.203:446): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.248934 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Nov 1 00:43:59.249068 kernel: audit: type=1400 audit(1761957839.203:447): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.249097 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Nov 1 00:43:59.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.251687 kernel: audit: type=1400 audit(1761957839.203:448): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.251798 kernel: audit: backlog limit exceeded Nov 1 00:43:59.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.204000 audit: BPF prog-id=61 op=LOAD Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit[1527]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1507 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:59.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531336137616335373434313332393832643533663938393361363431 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit[1527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1507 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:59.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531336137616335373434313332393832643533663938393361363431 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit: BPF prog-id=62 op=LOAD Nov 1 00:43:59.212000 audit[1527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025250 items=0 ppid=1507 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:59.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531336137616335373434313332393832643533663938393361363431 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.212000 audit: BPF prog-id=63 op=LOAD Nov 1 00:43:59.212000 audit[1527]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025298 items=0 ppid=1507 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:59.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531336137616335373434313332393832643533663938393361363431 Nov 1 00:43:59.213000 audit: BPF prog-id=63 op=UNLOAD Nov 1 00:43:59.213000 audit: BPF prog-id=62 op=UNLOAD Nov 1 00:43:59.213000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.213000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.213000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.213000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.213000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.213000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.213000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.213000 audit[1527]: AVC avc: denied { perfmon } for pid=1527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.213000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.213000 audit[1527]: AVC avc: denied { bpf } for pid=1527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.213000 audit: BPF prog-id=64 op=LOAD Nov 1 00:43:59.213000 audit[1527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000256a8 items=0 ppid=1507 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:59.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531336137616335373434313332393832643533663938393361363431 Nov 1 00:43:59.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.250000 audit: BPF prog-id=65 op=LOAD Nov 1 00:43:59.259000 audit[1525]: AVC avc: denied { bpf } for pid=1525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.259000 audit[1525]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1508 pid=1525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:59.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332306139656166656538323766643763656438316238643363646530 Nov 1 00:43:59.259000 audit[1525]: AVC avc: denied { perfmon } for pid=1525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.259000 audit[1525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1508 pid=1525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:59.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332306139656166656538323766643763656438316238643363646530 Nov 1 00:43:59.259000 audit[1525]: AVC avc: denied { bpf } for pid=1525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.259000 audit[1525]: AVC avc: denied { bpf } for pid=1525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.259000 audit[1525]: AVC avc: denied { bpf } for pid=1525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.259000 audit[1525]: AVC avc: denied { perfmon } for pid=1525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.259000 audit[1525]: AVC avc: denied { perfmon } for pid=1525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.259000 audit[1525]: AVC avc: denied { perfmon } for pid=1525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.259000 audit[1525]: AVC avc: denied { perfmon } for pid=1525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.259000 audit[1525]: AVC avc: denied { perfmon } for pid=1525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.259000 audit[1525]: AVC avc: denied { bpf } for pid=1525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.259000 audit[1525]: AVC avc: denied { bpf } for pid=1525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.259000 audit: BPF prog-id=66 op=LOAD Nov 1 00:43:59.259000 audit[1525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000326410 items=0 ppid=1508 pid=1525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:59.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332306139656166656538323766643763656438316238643363646530 Nov 1 00:43:59.260000 audit[1525]: AVC avc: denied { bpf } for pid=1525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.260000 audit[1525]: AVC avc: denied { bpf } for pid=1525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.260000 audit[1525]: AVC avc: denied { perfmon } for pid=1525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.260000 audit[1525]: AVC avc: denied { perfmon } for pid=1525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.260000 audit[1525]: AVC avc: denied { perfmon } for pid=1525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.260000 audit[1525]: AVC avc: denied { perfmon } for pid=1525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.260000 audit[1525]: AVC avc: denied { perfmon } for pid=1525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.260000 audit[1525]: AVC avc: denied { bpf } for pid=1525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.260000 audit[1525]: AVC avc: denied { bpf } for pid=1525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.260000 audit: BPF prog-id=67 op=LOAD Nov 1 00:43:59.260000 audit[1525]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000326458 items=0 ppid=1508 pid=1525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:59.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332306139656166656538323766643763656438316238643363646530 Nov 1 00:43:59.261000 audit: BPF prog-id=67 op=UNLOAD Nov 1 00:43:59.261000 audit: BPF prog-id=66 op=UNLOAD Nov 1 00:43:59.261000 audit[1525]: AVC avc: denied { bpf } for pid=1525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.261000 audit[1525]: AVC avc: denied { bpf } for pid=1525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.261000 audit[1525]: AVC avc: denied { bpf } for pid=1525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.261000 audit[1525]: AVC avc: denied { perfmon } for pid=1525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.261000 audit[1525]: AVC avc: denied { perfmon } for pid=1525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.261000 audit[1525]: AVC avc: denied { perfmon } for pid=1525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.261000 audit[1525]: AVC avc: denied { perfmon } for pid=1525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.261000 audit[1525]: AVC avc: denied { perfmon } for pid=1525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.261000 audit[1525]: AVC avc: denied { bpf } for pid=1525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.261000 audit[1525]: AVC avc: denied { bpf } for pid=1525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:43:59.261000 audit: BPF prog-id=68 op=LOAD Nov 1 00:43:59.261000 audit[1525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000326868 items=0 ppid=1508 pid=1525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:43:59.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332306139656166656538323766643763656438316238643363646530 Nov 1 00:43:59.294966 env[1192]: time="2025-11-01T00:43:59.294919178Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nfh8l,Uid:91699c3c-6f70-4e27-816b-bb56df3e06b2,Namespace:kube-system,Attempt:0,} returns sandbox id \"513a7ac5744132982d53f9893a641f583c38767def27d7ed4dd460d9c032df5e\"" Nov 1 00:43:59.297055 kubelet[1438]: E1101 00:43:59.296688 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Nov 1 00:43:59.298309 env[1192]: time="2025-11-01T00:43:59.298261356Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\"" Nov 1 00:43:59.299040 env[1192]: time="2025-11-01T00:43:59.298993958Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-52qnx,Uid:4a28bbd4-fe12-46a4-9aa5-5a6efa07665a,Namespace:calico-system,Attempt:0,} returns sandbox id \"320a9eafee827fd7ced81b8d3cde05cb852f38fedcd7539cb832b8bc93754a65\"" Nov 1 00:43:59.299919 kubelet[1438]: E1101 00:43:59.299740 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Nov 1 00:43:59.361946 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1073012452.mount: Deactivated successfully. Nov 1 00:44:00.196266 kubelet[1438]: E1101 00:44:00.196155 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:00.433439 kubelet[1438]: E1101 00:44:00.432979 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k59zw" podUID="783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676" Nov 1 00:44:00.528400 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1506477234.mount: Deactivated successfully. Nov 1 00:44:01.197309 kubelet[1438]: E1101 00:44:01.197242 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:01.707607 env[1192]: time="2025-11-01T00:44:01.706989639Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:01.716562 env[1192]: time="2025-11-01T00:44:01.716494051Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:01.719563 env[1192]: time="2025-11-01T00:44:01.719492310Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:01.721683 env[1192]: time="2025-11-01T00:44:01.721597890Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:71445ec84ad98bd52a7784865a9d31b1b50b56092d3f7699edc39eefd71befe1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:01.722544 env[1192]: time="2025-11-01T00:44:01.722492883Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\" returns image reference \"sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3\"" Nov 1 00:44:01.728123 env[1192]: time="2025-11-01T00:44:01.727542027Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Nov 1 00:44:01.733324 env[1192]: time="2025-11-01T00:44:01.733096986Z" level=info msg="CreateContainer within sandbox \"513a7ac5744132982d53f9893a641f583c38767def27d7ed4dd460d9c032df5e\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Nov 1 00:44:01.756470 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2613149112.mount: Deactivated successfully. Nov 1 00:44:01.766547 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3815080072.mount: Deactivated successfully. Nov 1 00:44:01.775162 env[1192]: time="2025-11-01T00:44:01.775096914Z" level=info msg="CreateContainer within sandbox \"513a7ac5744132982d53f9893a641f583c38767def27d7ed4dd460d9c032df5e\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"0615959947f4f0e86825dda281e8d55d14f6e5226b7097dede51f301ab4c3d80\"" Nov 1 00:44:01.776429 env[1192]: time="2025-11-01T00:44:01.776374725Z" level=info msg="StartContainer for \"0615959947f4f0e86825dda281e8d55d14f6e5226b7097dede51f301ab4c3d80\"" Nov 1 00:44:01.823244 systemd[1]: Started cri-containerd-0615959947f4f0e86825dda281e8d55d14f6e5226b7097dede51f301ab4c3d80.scope. Nov 1 00:44:01.869000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.869000 audit[1580]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f3efdbb3488 items=0 ppid=1507 pid=1580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:01.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036313539353939343766346630653836383235646461323831653864 Nov 1 00:44:01.869000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.869000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.869000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.869000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.869000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.869000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.869000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.869000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.869000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.869000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.869000 audit: BPF prog-id=69 op=LOAD Nov 1 00:44:01.869000 audit[1580]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000261ba8 items=0 ppid=1507 pid=1580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:01.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036313539353939343766346630653836383235646461323831653864 Nov 1 00:44:01.870000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.870000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.870000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.870000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.870000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.870000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.870000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.870000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.870000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.870000 audit: BPF prog-id=70 op=LOAD Nov 1 00:44:01.870000 audit[1580]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000261bf8 items=0 ppid=1507 pid=1580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:01.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036313539353939343766346630653836383235646461323831653864 Nov 1 00:44:01.870000 audit: BPF prog-id=70 op=UNLOAD Nov 1 00:44:01.870000 audit: BPF prog-id=69 op=UNLOAD Nov 1 00:44:01.870000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.870000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.870000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.870000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.870000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.870000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.870000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.870000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.870000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.870000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:01.870000 audit: BPF prog-id=71 op=LOAD Nov 1 00:44:01.870000 audit[1580]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c000261c88 items=0 ppid=1507 pid=1580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:01.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036313539353939343766346630653836383235646461323831653864 Nov 1 00:44:01.907711 env[1192]: time="2025-11-01T00:44:01.907561737Z" level=info msg="StartContainer for \"0615959947f4f0e86825dda281e8d55d14f6e5226b7097dede51f301ab4c3d80\" returns successfully" Nov 1 00:44:02.089000 audit[1643]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.089000 audit[1643]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc52ba5e20 a2=0 a3=7ffc52ba5e0c items=0 ppid=1591 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.089000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Nov 1 00:44:02.093000 audit[1645]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.093000 audit[1645]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd72475360 a2=0 a3=7ffd7247534c items=0 ppid=1591 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Nov 1 00:44:02.095000 audit[1646]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.095000 audit[1646]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc813a5a00 a2=0 a3=7ffc813a59ec items=0 ppid=1591 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Nov 1 00:44:02.097000 audit[1648]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.097000 audit[1648]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc34634c40 a2=0 a3=7ffc34634c2c items=0 ppid=1591 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.097000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Nov 1 00:44:02.099000 audit[1649]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1649 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.099000 audit[1649]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd56139d0 a2=0 a3=7ffcd56139bc items=0 ppid=1591 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.099000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Nov 1 00:44:02.101000 audit[1650]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1650 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.101000 audit[1650]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9ff7eff0 a2=0 a3=7ffe9ff7efdc items=0 ppid=1591 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.101000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Nov 1 00:44:02.198485 kubelet[1438]: E1101 00:44:02.198410 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:02.199000 audit[1651]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1651 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.199000 audit[1651]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc02c852a0 a2=0 a3=7ffc02c8528c items=0 ppid=1591 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.199000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Nov 1 00:44:02.204000 audit[1653]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1653 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.204000 audit[1653]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff45d39ce0 a2=0 a3=7fff45d39ccc items=0 ppid=1591 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.204000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Nov 1 00:44:02.211000 audit[1656]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1656 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.211000 audit[1656]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffef7724c40 a2=0 a3=7ffef7724c2c items=0 ppid=1591 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.211000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Nov 1 00:44:02.213000 audit[1657]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1657 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.213000 audit[1657]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf612ed80 a2=0 a3=7ffdf612ed6c items=0 ppid=1591 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.213000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Nov 1 00:44:02.218000 audit[1659]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1659 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.218000 audit[1659]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc94da8d60 a2=0 a3=7ffc94da8d4c items=0 ppid=1591 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Nov 1 00:44:02.220000 audit[1660]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1660 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.220000 audit[1660]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdaa376fc0 a2=0 a3=7ffdaa376fac items=0 ppid=1591 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Nov 1 00:44:02.225000 audit[1662]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1662 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.225000 audit[1662]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcdcc0d290 a2=0 a3=7ffcdcc0d27c items=0 ppid=1591 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.225000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Nov 1 00:44:02.231000 audit[1665]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1665 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.231000 audit[1665]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe8189bfb0 a2=0 a3=7ffe8189bf9c items=0 ppid=1591 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.231000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Nov 1 00:44:02.234000 audit[1666]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1666 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.234000 audit[1666]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7b632000 a2=0 a3=7ffc7b631fec items=0 ppid=1591 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.234000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Nov 1 00:44:02.238000 audit[1668]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1668 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.238000 audit[1668]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffa3c91ec0 a2=0 a3=7fffa3c91eac items=0 ppid=1591 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.238000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Nov 1 00:44:02.240000 audit[1669]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1669 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.240000 audit[1669]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcbdee7310 a2=0 a3=7ffcbdee72fc items=0 ppid=1591 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.240000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Nov 1 00:44:02.244000 audit[1671]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1671 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.244000 audit[1671]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd060054a0 a2=0 a3=7ffd0600548c items=0 ppid=1591 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.244000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 00:44:02.253000 audit[1674]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1674 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.253000 audit[1674]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc11cc99c0 a2=0 a3=7ffc11cc99ac items=0 ppid=1591 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.253000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 00:44:02.260000 audit[1677]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1677 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.260000 audit[1677]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd08509430 a2=0 a3=7ffd0850941c items=0 ppid=1591 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.260000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Nov 1 00:44:02.261000 audit[1678]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1678 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.261000 audit[1678]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc993ec5d0 a2=0 a3=7ffc993ec5bc items=0 ppid=1591 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.261000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Nov 1 00:44:02.266000 audit[1680]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.266000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd77ceccb0 a2=0 a3=7ffd77cecc9c items=0 ppid=1591 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.266000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:44:02.296000 audit[1684]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.296000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe3da262d0 a2=0 a3=7ffe3da262bc items=0 ppid=1591 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.296000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:44:02.299000 audit[1685]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.299000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc72d6d70 a2=0 a3=7ffcc72d6d5c items=0 ppid=1591 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Nov 1 00:44:02.303000 audit[1687]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:44:02.303000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff75ea8840 a2=0 a3=7fff75ea882c items=0 ppid=1591 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.303000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Nov 1 00:44:02.349000 audit[1693]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:44:02.349000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffde0a6d130 a2=0 a3=7ffde0a6d11c items=0 ppid=1591 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.349000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:44:02.388000 audit[1693]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:44:02.388000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7ffde0a6d130 a2=0 a3=7ffde0a6d11c items=0 ppid=1591 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:44:02.407000 audit[1702]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.407000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffffd64d840 a2=0 a3=7ffffd64d82c items=0 ppid=1591 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.407000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Nov 1 00:44:02.412000 audit[1704]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.412000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc6c8bda80 a2=0 a3=7ffc6c8bda6c items=0 ppid=1591 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.412000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Nov 1 00:44:02.419000 audit[1707]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.419000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe6c24e370 a2=0 a3=7ffe6c24e35c items=0 ppid=1591 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.419000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Nov 1 00:44:02.422000 audit[1708]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.422000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc66a2d920 a2=0 a3=7ffc66a2d90c items=0 ppid=1591 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.422000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Nov 1 00:44:02.428000 audit[1710]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.428000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd7d0b6770 a2=0 a3=7ffd7d0b675c items=0 ppid=1591 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Nov 1 00:44:02.432000 audit[1711]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.432000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc528eb310 a2=0 a3=7ffc528eb2fc items=0 ppid=1591 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.432000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Nov 1 00:44:02.436807 kubelet[1438]: E1101 00:44:02.436760 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k59zw" podUID="783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676" Nov 1 00:44:02.439000 audit[1713]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1713 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.439000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffffd495740 a2=0 a3=7ffffd49572c items=0 ppid=1591 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Nov 1 00:44:02.446000 audit[1716]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.446000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc487a2140 a2=0 a3=7ffc487a212c items=0 ppid=1591 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.446000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Nov 1 00:44:02.451000 audit[1717]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.451000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8a7d0000 a2=0 a3=7ffc8a7cffec items=0 ppid=1591 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.451000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Nov 1 00:44:02.456250 kubelet[1438]: E1101 00:44:02.456088 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Nov 1 00:44:02.460000 audit[1719]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1719 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.460000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffca603fdc0 a2=0 a3=7ffca603fdac items=0 ppid=1591 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.460000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Nov 1 00:44:02.463000 audit[1720]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.463000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe91aefb10 a2=0 a3=7ffe91aefafc items=0 ppid=1591 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.463000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Nov 1 00:44:02.470478 kubelet[1438]: E1101 00:44:02.470418 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.470478 kubelet[1438]: W1101 00:44:02.470458 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.470728 kubelet[1438]: E1101 00:44:02.470515 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.470953 kubelet[1438]: E1101 00:44:02.470908 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.470953 kubelet[1438]: W1101 00:44:02.470931 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.471070 kubelet[1438]: E1101 00:44:02.470950 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.471287 kubelet[1438]: E1101 00:44:02.471258 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.471287 kubelet[1438]: W1101 00:44:02.471279 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.471383 kubelet[1438]: E1101 00:44:02.471316 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.471881 kubelet[1438]: E1101 00:44:02.471854 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.471881 kubelet[1438]: W1101 00:44:02.471875 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.472009 kubelet[1438]: E1101 00:44:02.471914 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.472273 kubelet[1438]: E1101 00:44:02.472244 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.472323 kubelet[1438]: W1101 00:44:02.472279 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.472323 kubelet[1438]: E1101 00:44:02.472298 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.472655 kubelet[1438]: E1101 00:44:02.472591 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.472710 kubelet[1438]: W1101 00:44:02.472611 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.472710 kubelet[1438]: E1101 00:44:02.472682 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.473003 kubelet[1438]: E1101 00:44:02.472981 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.473089 kubelet[1438]: W1101 00:44:02.473002 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.473089 kubelet[1438]: E1101 00:44:02.473016 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.474178 kubelet[1438]: E1101 00:44:02.474098 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.474178 kubelet[1438]: W1101 00:44:02.474122 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.474178 kubelet[1438]: E1101 00:44:02.474139 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.473000 audit[1722]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.473000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcca6c1a90 a2=0 a3=7ffcca6c1a7c items=0 ppid=1591 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.475159 kubelet[1438]: E1101 00:44:02.475035 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.475159 kubelet[1438]: W1101 00:44:02.475049 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.475159 kubelet[1438]: E1101 00:44:02.475076 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.475376 kubelet[1438]: E1101 00:44:02.475344 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.475376 kubelet[1438]: W1101 00:44:02.475355 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.475376 kubelet[1438]: E1101 00:44:02.475369 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.473000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 00:44:02.475646 kubelet[1438]: E1101 00:44:02.475606 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.475713 kubelet[1438]: W1101 00:44:02.475647 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.475713 kubelet[1438]: E1101 00:44:02.475661 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.475962 kubelet[1438]: E1101 00:44:02.475938 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.475962 kubelet[1438]: W1101 00:44:02.475957 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.476065 kubelet[1438]: E1101 00:44:02.475970 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.476232 kubelet[1438]: E1101 00:44:02.476210 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.476232 kubelet[1438]: W1101 00:44:02.476228 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.476342 kubelet[1438]: E1101 00:44:02.476241 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.476516 kubelet[1438]: E1101 00:44:02.476494 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.476516 kubelet[1438]: W1101 00:44:02.476513 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.476608 kubelet[1438]: E1101 00:44:02.476527 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.476888 kubelet[1438]: E1101 00:44:02.476845 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.476888 kubelet[1438]: W1101 00:44:02.476864 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.476888 kubelet[1438]: E1101 00:44:02.476878 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.477109 kubelet[1438]: E1101 00:44:02.477086 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.477168 kubelet[1438]: W1101 00:44:02.477117 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.477168 kubelet[1438]: E1101 00:44:02.477135 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.477400 kubelet[1438]: E1101 00:44:02.477352 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.477400 kubelet[1438]: W1101 00:44:02.477372 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.477400 kubelet[1438]: E1101 00:44:02.477385 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.477667 kubelet[1438]: E1101 00:44:02.477642 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.477667 kubelet[1438]: W1101 00:44:02.477661 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.477764 kubelet[1438]: E1101 00:44:02.477684 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.477924 kubelet[1438]: E1101 00:44:02.477899 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.477924 kubelet[1438]: W1101 00:44:02.477918 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.478050 kubelet[1438]: E1101 00:44:02.477932 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.478182 kubelet[1438]: E1101 00:44:02.478152 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.478182 kubelet[1438]: W1101 00:44:02.478180 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.478293 kubelet[1438]: E1101 00:44:02.478209 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.482000 audit[1745]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.482000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffda06ab930 a2=0 a3=7ffda06ab91c items=0 ppid=1591 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.482000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Nov 1 00:44:02.487529 kubelet[1438]: E1101 00:44:02.487486 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.487529 kubelet[1438]: W1101 00:44:02.487521 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.491778 kubelet[1438]: E1101 00:44:02.487552 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.491778 kubelet[1438]: E1101 00:44:02.487975 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.491778 kubelet[1438]: W1101 00:44:02.487999 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.491778 kubelet[1438]: E1101 00:44:02.488023 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.491778 kubelet[1438]: E1101 00:44:02.488290 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.491778 kubelet[1438]: W1101 00:44:02.488302 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.491778 kubelet[1438]: E1101 00:44:02.488316 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.491778 kubelet[1438]: E1101 00:44:02.488560 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.491778 kubelet[1438]: W1101 00:44:02.488574 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.491778 kubelet[1438]: E1101 00:44:02.488587 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.492333 kubelet[1438]: E1101 00:44:02.489322 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.492333 kubelet[1438]: W1101 00:44:02.489340 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.492333 kubelet[1438]: E1101 00:44:02.489357 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.492333 kubelet[1438]: E1101 00:44:02.489905 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.492333 kubelet[1438]: W1101 00:44:02.489918 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.492333 kubelet[1438]: E1101 00:44:02.489934 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.492333 kubelet[1438]: E1101 00:44:02.490303 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.492333 kubelet[1438]: W1101 00:44:02.490317 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.492333 kubelet[1438]: E1101 00:44:02.490334 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.492333 kubelet[1438]: E1101 00:44:02.490595 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.492794 kubelet[1438]: W1101 00:44:02.490606 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.492794 kubelet[1438]: E1101 00:44:02.490652 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.492794 kubelet[1438]: E1101 00:44:02.490854 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.492794 kubelet[1438]: W1101 00:44:02.490865 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.492794 kubelet[1438]: E1101 00:44:02.490881 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.492794 kubelet[1438]: E1101 00:44:02.491062 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.492794 kubelet[1438]: W1101 00:44:02.491073 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.492794 kubelet[1438]: E1101 00:44:02.491086 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.492794 kubelet[1438]: E1101 00:44:02.491323 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.492794 kubelet[1438]: W1101 00:44:02.491346 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.493206 kubelet[1438]: E1101 00:44:02.491359 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.493206 kubelet[1438]: E1101 00:44:02.491871 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:44:02.493206 kubelet[1438]: W1101 00:44:02.491884 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:44:02.493206 kubelet[1438]: E1101 00:44:02.491896 1438 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:44:02.492000 audit[1760]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.492000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe965f8f90 a2=0 a3=7ffe965f8f7c items=0 ppid=1591 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.492000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Nov 1 00:44:02.494000 audit[1761]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.494000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc2605ae80 a2=0 a3=7ffc2605ae6c items=0 ppid=1591 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.494000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Nov 1 00:44:02.499000 audit[1763]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.499000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcdcf8caf0 a2=0 a3=7ffcdcf8cadc items=0 ppid=1591 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.499000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:44:02.508000 audit[1766]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.508000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffcf44b440 a2=0 a3=7fffcf44b42c items=0 ppid=1591 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.508000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:44:02.510000 audit[1767]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.510000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2974e820 a2=0 a3=7ffe2974e80c items=0 ppid=1591 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.510000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Nov 1 00:44:02.514000 audit[1769]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.514000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffed51ed7a0 a2=0 a3=7ffed51ed78c items=0 ppid=1591 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.514000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Nov 1 00:44:02.516000 audit[1770]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.516000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdafdfde50 a2=0 a3=7ffdafdfde3c items=0 ppid=1591 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.516000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Nov 1 00:44:02.521000 audit[1772]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.521000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffec7405e60 a2=0 a3=7ffec7405e4c items=0 ppid=1591 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:44:02.527000 audit[1775]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:44:02.527000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd495bf1f0 a2=0 a3=7ffd495bf1dc items=0 ppid=1591 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:44:02.533000 audit[1777]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Nov 1 00:44:02.533000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffdf12e1390 a2=0 a3=7ffdf12e137c items=0 ppid=1591 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.533000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:44:02.535000 audit[1777]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Nov 1 00:44:02.535000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdf12e1390 a2=0 a3=7ffdf12e137c items=0 ppid=1591 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:02.535000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:44:02.957787 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4261170142.mount: Deactivated successfully. Nov 1 00:44:03.126730 env[1192]: time="2025-11-01T00:44:03.126641580Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:03.129475 env[1192]: time="2025-11-01T00:44:03.129412487Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:03.131364 env[1192]: time="2025-11-01T00:44:03.131309924Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:03.132943 env[1192]: time="2025-11-01T00:44:03.132894693Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:03.133702 env[1192]: time="2025-11-01T00:44:03.133664579Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5\"" Nov 1 00:44:03.138910 env[1192]: time="2025-11-01T00:44:03.138868239Z" level=info msg="CreateContainer within sandbox \"320a9eafee827fd7ced81b8d3cde05cb852f38fedcd7539cb832b8bc93754a65\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Nov 1 00:44:03.153603 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1428518689.mount: Deactivated successfully. Nov 1 00:44:03.161155 env[1192]: time="2025-11-01T00:44:03.161090377Z" level=info msg="CreateContainer within sandbox \"320a9eafee827fd7ced81b8d3cde05cb852f38fedcd7539cb832b8bc93754a65\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"eaa9cef1b7c7a822476093ebd2359f6c7fb33dc646e39d18eac1a75d401caf99\"" Nov 1 00:44:03.163301 env[1192]: time="2025-11-01T00:44:03.163242353Z" level=info msg="StartContainer for \"eaa9cef1b7c7a822476093ebd2359f6c7fb33dc646e39d18eac1a75d401caf99\"" Nov 1 00:44:03.190357 systemd[1]: Started cri-containerd-eaa9cef1b7c7a822476093ebd2359f6c7fb33dc646e39d18eac1a75d401caf99.scope. Nov 1 00:44:03.199640 kubelet[1438]: E1101 00:44:03.199551 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:03.237000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.237000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fbefec4cb68 items=0 ppid=1508 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:03.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561613963656631623763376138323234373630393365626432333539 Nov 1 00:44:03.238000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.238000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.238000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.238000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.238000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.238000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.238000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.238000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.238000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.238000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.238000 audit: BPF prog-id=72 op=LOAD Nov 1 00:44:03.238000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003740b8 items=0 ppid=1508 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:03.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561613963656631623763376138323234373630393365626432333539 Nov 1 00:44:03.239000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.239000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.239000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.239000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.239000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.239000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.239000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.239000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.239000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.239000 audit: BPF prog-id=73 op=LOAD Nov 1 00:44:03.239000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000374108 items=0 ppid=1508 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:03.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561613963656631623763376138323234373630393365626432333539 Nov 1 00:44:03.240000 audit: BPF prog-id=73 op=UNLOAD Nov 1 00:44:03.240000 audit: BPF prog-id=72 op=UNLOAD Nov 1 00:44:03.240000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.240000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.240000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.240000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.240000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.240000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.240000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.240000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.240000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.240000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:03.240000 audit: BPF prog-id=74 op=LOAD Nov 1 00:44:03.240000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000374198 items=0 ppid=1508 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:03.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561613963656631623763376138323234373630393365626432333539 Nov 1 00:44:03.274774 env[1192]: time="2025-11-01T00:44:03.271453766Z" level=info msg="StartContainer for \"eaa9cef1b7c7a822476093ebd2359f6c7fb33dc646e39d18eac1a75d401caf99\" returns successfully" Nov 1 00:44:03.285214 systemd[1]: cri-containerd-eaa9cef1b7c7a822476093ebd2359f6c7fb33dc646e39d18eac1a75d401caf99.scope: Deactivated successfully. Nov 1 00:44:03.287000 audit: BPF prog-id=74 op=UNLOAD Nov 1 00:44:03.461534 kubelet[1438]: E1101 00:44:03.461076 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Nov 1 00:44:03.461534 kubelet[1438]: E1101 00:44:03.461366 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Nov 1 00:44:03.474324 env[1192]: time="2025-11-01T00:44:03.474254310Z" level=info msg="shim disconnected" id=eaa9cef1b7c7a822476093ebd2359f6c7fb33dc646e39d18eac1a75d401caf99 Nov 1 00:44:03.474671 env[1192]: time="2025-11-01T00:44:03.474606219Z" level=warning msg="cleaning up after shim disconnected" id=eaa9cef1b7c7a822476093ebd2359f6c7fb33dc646e39d18eac1a75d401caf99 namespace=k8s.io Nov 1 00:44:03.474838 env[1192]: time="2025-11-01T00:44:03.474811193Z" level=info msg="cleaning up dead shim" Nov 1 00:44:03.481062 kubelet[1438]: I1101 00:44:03.480952 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-nfh8l" podStartSLOduration=5.054530373 podStartE2EDuration="7.48092458s" podCreationTimestamp="2025-11-01 00:43:56 +0000 UTC" firstStartedPulling="2025-11-01 00:43:59.297757932 +0000 UTC m=+4.838303814" lastFinishedPulling="2025-11-01 00:44:01.724152132 +0000 UTC m=+7.264698021" observedRunningTime="2025-11-01 00:44:02.47488554 +0000 UTC m=+8.015431454" watchObservedRunningTime="2025-11-01 00:44:03.48092458 +0000 UTC m=+9.021470475" Nov 1 00:44:03.493998 env[1192]: time="2025-11-01T00:44:03.493838116Z" level=warning msg="cleanup warnings time=\"2025-11-01T00:44:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1829 runtime=io.containerd.runc.v2\n" Nov 1 00:44:04.200235 kubelet[1438]: E1101 00:44:04.200186 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:04.433074 kubelet[1438]: E1101 00:44:04.433014 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k59zw" podUID="783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676" Nov 1 00:44:04.464151 kubelet[1438]: E1101 00:44:04.464012 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Nov 1 00:44:04.466270 env[1192]: time="2025-11-01T00:44:04.466211407Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Nov 1 00:44:05.201562 kubelet[1438]: E1101 00:44:05.201509 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:06.202657 kubelet[1438]: E1101 00:44:06.202568 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:06.433286 kubelet[1438]: E1101 00:44:06.433216 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k59zw" podUID="783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676" Nov 1 00:44:07.202887 kubelet[1438]: E1101 00:44:07.202792 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:08.203842 kubelet[1438]: E1101 00:44:08.203737 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:08.435784 kubelet[1438]: E1101 00:44:08.433609 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k59zw" podUID="783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676" Nov 1 00:44:08.439166 env[1192]: time="2025-11-01T00:44:08.439122487Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:08.440880 env[1192]: time="2025-11-01T00:44:08.440847652Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:08.442488 env[1192]: time="2025-11-01T00:44:08.442447856Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:08.443933 env[1192]: time="2025-11-01T00:44:08.443901394Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:08.444757 env[1192]: time="2025-11-01T00:44:08.444707918Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd\"" Nov 1 00:44:08.451382 env[1192]: time="2025-11-01T00:44:08.451337644Z" level=info msg="CreateContainer within sandbox \"320a9eafee827fd7ced81b8d3cde05cb852f38fedcd7539cb832b8bc93754a65\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Nov 1 00:44:08.466782 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1456041078.mount: Deactivated successfully. Nov 1 00:44:08.475648 env[1192]: time="2025-11-01T00:44:08.475533024Z" level=info msg="CreateContainer within sandbox \"320a9eafee827fd7ced81b8d3cde05cb852f38fedcd7539cb832b8bc93754a65\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c897bda11aa48e59f4545a17b763f296cc4c0975cd1fd9edf458c2f369b9f948\"" Nov 1 00:44:08.476998 env[1192]: time="2025-11-01T00:44:08.476900851Z" level=info msg="StartContainer for \"c897bda11aa48e59f4545a17b763f296cc4c0975cd1fd9edf458c2f369b9f948\"" Nov 1 00:44:08.517889 systemd[1]: Started cri-containerd-c897bda11aa48e59f4545a17b763f296cc4c0975cd1fd9edf458c2f369b9f948.scope. Nov 1 00:44:08.572098 kernel: kauditd_printk_skb: 346 callbacks suppressed Nov 1 00:44:08.572275 kernel: audit: type=1400 audit(1761957848.562:541): avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.562000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.562000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f32b79d97d8 items=0 ppid=1508 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:08.581894 kernel: audit: type=1300 audit(1761957848.562:541): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f32b79d97d8 items=0 ppid=1508 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:08.582059 kernel: audit: type=1327 audit(1761957848.562:541): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338393762646131316161343865353966343534356131376237363366 Nov 1 00:44:08.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338393762646131316161343865353966343534356131376237363366 Nov 1 00:44:08.565000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.595901 kernel: audit: type=1400 audit(1761957848.565:542): avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.565000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.565000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.610005 kernel: audit: type=1400 audit(1761957848.565:542): avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.610193 kernel: audit: type=1400 audit(1761957848.565:542): avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.610231 kernel: audit: type=1400 audit(1761957848.565:542): avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.565000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.622522 kernel: audit: type=1400 audit(1761957848.565:542): avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.622875 kernel: audit: type=1400 audit(1761957848.565:542): avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.565000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.565000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.565000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.565000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.565000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.565000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.636248 kernel: audit: type=1400 audit(1761957848.565:542): avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.565000 audit: BPF prog-id=75 op=LOAD Nov 1 00:44:08.565000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000e7e58 items=0 ppid=1508 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:08.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338393762646131316161343865353966343534356131376237363366 Nov 1 00:44:08.570000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.570000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.570000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.570000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.570000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.570000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.570000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.570000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.570000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.570000 audit: BPF prog-id=76 op=LOAD Nov 1 00:44:08.570000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000e7ea8 items=0 ppid=1508 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:08.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338393762646131316161343865353966343534356131376237363366 Nov 1 00:44:08.570000 audit: BPF prog-id=76 op=UNLOAD Nov 1 00:44:08.570000 audit: BPF prog-id=75 op=UNLOAD Nov 1 00:44:08.570000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.570000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.570000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.570000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.570000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.570000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.570000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.570000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.570000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.570000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:08.570000 audit: BPF prog-id=77 op=LOAD Nov 1 00:44:08.570000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000e7f38 items=0 ppid=1508 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:08.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338393762646131316161343865353966343534356131376237363366 Nov 1 00:44:08.638553 env[1192]: time="2025-11-01T00:44:08.638493894Z" level=info msg="StartContainer for \"c897bda11aa48e59f4545a17b763f296cc4c0975cd1fd9edf458c2f369b9f948\" returns successfully" Nov 1 00:44:09.204849 kubelet[1438]: E1101 00:44:09.204778 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:09.475817 kubelet[1438]: E1101 00:44:09.475707 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Nov 1 00:44:09.487904 env[1192]: time="2025-11-01T00:44:09.487827074Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Nov 1 00:44:09.494830 systemd[1]: cri-containerd-c897bda11aa48e59f4545a17b763f296cc4c0975cd1fd9edf458c2f369b9f948.scope: Deactivated successfully. Nov 1 00:44:09.498000 audit: BPF prog-id=77 op=UNLOAD Nov 1 00:44:09.525188 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c897bda11aa48e59f4545a17b763f296cc4c0975cd1fd9edf458c2f369b9f948-rootfs.mount: Deactivated successfully. Nov 1 00:44:09.574535 kubelet[1438]: I1101 00:44:09.573913 1438 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Nov 1 00:44:09.620399 env[1192]: time="2025-11-01T00:44:09.620304543Z" level=info msg="shim disconnected" id=c897bda11aa48e59f4545a17b763f296cc4c0975cd1fd9edf458c2f369b9f948 Nov 1 00:44:09.620399 env[1192]: time="2025-11-01T00:44:09.620377985Z" level=warning msg="cleaning up after shim disconnected" id=c897bda11aa48e59f4545a17b763f296cc4c0975cd1fd9edf458c2f369b9f948 namespace=k8s.io Nov 1 00:44:09.620399 env[1192]: time="2025-11-01T00:44:09.620392790Z" level=info msg="cleaning up dead shim" Nov 1 00:44:09.632524 env[1192]: time="2025-11-01T00:44:09.632445247Z" level=warning msg="cleanup warnings time=\"2025-11-01T00:44:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1896 runtime=io.containerd.runc.v2\n" Nov 1 00:44:10.205104 kubelet[1438]: E1101 00:44:10.204999 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:10.438976 systemd[1]: Created slice kubepods-besteffort-pod783e6c0a_ea22_45e9_ba9a_fb5f6bd9b676.slice. Nov 1 00:44:10.442516 env[1192]: time="2025-11-01T00:44:10.442440955Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k59zw,Uid:783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676,Namespace:calico-system,Attempt:0,}" Nov 1 00:44:10.481002 kubelet[1438]: E1101 00:44:10.480283 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Nov 1 00:44:10.483058 env[1192]: time="2025-11-01T00:44:10.483004152Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Nov 1 00:44:10.531033 env[1192]: time="2025-11-01T00:44:10.530959414Z" level=error msg="Failed to destroy network for sandbox \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:44:10.533537 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5-shm.mount: Deactivated successfully. Nov 1 00:44:10.534973 env[1192]: time="2025-11-01T00:44:10.534893243Z" level=error msg="encountered an error cleaning up failed sandbox \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:44:10.535238 env[1192]: time="2025-11-01T00:44:10.535174810Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k59zw,Uid:783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:44:10.536290 kubelet[1438]: E1101 00:44:10.535753 1438 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:44:10.536290 kubelet[1438]: E1101 00:44:10.535845 1438 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-k59zw" Nov 1 00:44:10.536290 kubelet[1438]: E1101 00:44:10.535897 1438 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-k59zw" Nov 1 00:44:10.536517 kubelet[1438]: E1101 00:44:10.535978 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-k59zw_calico-system(783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-k59zw_calico-system(783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-k59zw" podUID="783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676" Nov 1 00:44:11.205994 kubelet[1438]: E1101 00:44:11.205917 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:11.484842 kubelet[1438]: I1101 00:44:11.483809 1438 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Nov 1 00:44:11.485189 env[1192]: time="2025-11-01T00:44:11.485046994Z" level=info msg="StopPodSandbox for \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\"" Nov 1 00:44:11.521100 env[1192]: time="2025-11-01T00:44:11.521027849Z" level=error msg="StopPodSandbox for \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\" failed" error="failed to destroy network for sandbox \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:44:11.521927 kubelet[1438]: E1101 00:44:11.521560 1438 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Nov 1 00:44:11.521927 kubelet[1438]: E1101 00:44:11.521687 1438 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5"} Nov 1 00:44:11.521927 kubelet[1438]: E1101 00:44:11.521779 1438 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 00:44:11.521927 kubelet[1438]: E1101 00:44:11.521844 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-k59zw" podUID="783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676" Nov 1 00:44:12.206450 kubelet[1438]: E1101 00:44:12.206355 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:13.206837 kubelet[1438]: E1101 00:44:13.206764 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:13.632772 systemd[1]: Created slice kubepods-besteffort-pod171afe9b_a064_414a_9990_169d6c02e8cb.slice. Nov 1 00:44:13.760221 kubelet[1438]: I1101 00:44:13.760156 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2z8rc\" (UniqueName: \"kubernetes.io/projected/171afe9b-a064-414a-9990-169d6c02e8cb-kube-api-access-2z8rc\") pod \"nginx-deployment-7fcdb87857-24g42\" (UID: \"171afe9b-a064-414a-9990-169d6c02e8cb\") " pod="default/nginx-deployment-7fcdb87857-24g42" Nov 1 00:44:13.938218 env[1192]: time="2025-11-01T00:44:13.937708488Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-24g42,Uid:171afe9b-a064-414a-9990-169d6c02e8cb,Namespace:default,Attempt:0,}" Nov 1 00:44:14.088289 env[1192]: time="2025-11-01T00:44:14.088204499Z" level=error msg="Failed to destroy network for sandbox \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:44:14.091192 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85-shm.mount: Deactivated successfully. Nov 1 00:44:14.092796 env[1192]: time="2025-11-01T00:44:14.092714512Z" level=error msg="encountered an error cleaning up failed sandbox \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:44:14.092940 env[1192]: time="2025-11-01T00:44:14.092827385Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-24g42,Uid:171afe9b-a064-414a-9990-169d6c02e8cb,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:44:14.093306 kubelet[1438]: E1101 00:44:14.093243 1438 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:44:14.093409 kubelet[1438]: E1101 00:44:14.093348 1438 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-24g42" Nov 1 00:44:14.093409 kubelet[1438]: E1101 00:44:14.093384 1438 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-24g42" Nov 1 00:44:14.093518 kubelet[1438]: E1101 00:44:14.093486 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-24g42_default(171afe9b-a064-414a-9990-169d6c02e8cb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-24g42_default(171afe9b-a064-414a-9990-169d6c02e8cb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-24g42" podUID="171afe9b-a064-414a-9990-169d6c02e8cb" Nov 1 00:44:14.208489 kubelet[1438]: E1101 00:44:14.207713 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:14.489988 kubelet[1438]: I1101 00:44:14.489599 1438 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Nov 1 00:44:14.490920 env[1192]: time="2025-11-01T00:44:14.490880851Z" level=info msg="StopPodSandbox for \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\"" Nov 1 00:44:14.545504 env[1192]: time="2025-11-01T00:44:14.545438676Z" level=error msg="StopPodSandbox for \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\" failed" error="failed to destroy network for sandbox \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:44:14.546190 kubelet[1438]: E1101 00:44:14.545977 1438 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Nov 1 00:44:14.546190 kubelet[1438]: E1101 00:44:14.546035 1438 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85"} Nov 1 00:44:14.546190 kubelet[1438]: E1101 00:44:14.546105 1438 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"171afe9b-a064-414a-9990-169d6c02e8cb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 00:44:14.546190 kubelet[1438]: E1101 00:44:14.546137 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"171afe9b-a064-414a-9990-169d6c02e8cb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-24g42" podUID="171afe9b-a064-414a-9990-169d6c02e8cb" Nov 1 00:44:15.208753 kubelet[1438]: E1101 00:44:15.208656 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:16.181643 kubelet[1438]: E1101 00:44:16.181563 1438 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:16.209362 kubelet[1438]: E1101 00:44:16.209277 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:17.209512 kubelet[1438]: E1101 00:44:17.209426 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:18.210723 kubelet[1438]: E1101 00:44:18.210644 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:19.033191 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3512686030.mount: Deactivated successfully. Nov 1 00:44:19.073777 env[1192]: time="2025-11-01T00:44:19.073706784Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:19.075266 env[1192]: time="2025-11-01T00:44:19.075210053Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:19.076819 env[1192]: time="2025-11-01T00:44:19.076776536Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:19.078362 env[1192]: time="2025-11-01T00:44:19.078322037Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:19.079200 env[1192]: time="2025-11-01T00:44:19.079162321Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9\"" Nov 1 00:44:19.101862 env[1192]: time="2025-11-01T00:44:19.101803656Z" level=info msg="CreateContainer within sandbox \"320a9eafee827fd7ced81b8d3cde05cb852f38fedcd7539cb832b8bc93754a65\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Nov 1 00:44:19.116873 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount644526606.mount: Deactivated successfully. Nov 1 00:44:19.123502 env[1192]: time="2025-11-01T00:44:19.123428955Z" level=info msg="CreateContainer within sandbox \"320a9eafee827fd7ced81b8d3cde05cb852f38fedcd7539cb832b8bc93754a65\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"9325f7885cdb74f3fb53e015532898e086e772cd295b98abbac237fb57190706\"" Nov 1 00:44:19.124348 env[1192]: time="2025-11-01T00:44:19.124315653Z" level=info msg="StartContainer for \"9325f7885cdb74f3fb53e015532898e086e772cd295b98abbac237fb57190706\"" Nov 1 00:44:19.148186 systemd[1]: Started cri-containerd-9325f7885cdb74f3fb53e015532898e086e772cd295b98abbac237fb57190706.scope. Nov 1 00:44:19.189000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.193231 kernel: kauditd_printk_skb: 34 callbacks suppressed Nov 1 00:44:19.193363 kernel: audit: type=1400 audit(1761957859.189:548): avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.189000 audit[2003]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f687827aa78 items=0 ppid=1508 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:19.211734 kernel: audit: type=1300 audit(1761957859.189:548): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f687827aa78 items=0 ppid=1508 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:19.211918 kubelet[1438]: E1101 00:44:19.211863 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:19.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933323566373838356364623734663366623533653031353533323839 Nov 1 00:44:19.221514 kernel: audit: type=1327 audit(1761957859.189:548): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933323566373838356364623734663366623533653031353533323839 Nov 1 00:44:19.221722 kernel: audit: type=1400 audit(1761957859.189:549): avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.189000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.189000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.235235 kernel: audit: type=1400 audit(1761957859.189:549): avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.235449 kernel: audit: type=1400 audit(1761957859.189:549): avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.189000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.189000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.248920 kernel: audit: type=1400 audit(1761957859.189:549): avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.189000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.256046 kernel: audit: type=1400 audit(1761957859.189:549): avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.189000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.263570 kernel: audit: type=1400 audit(1761957859.189:549): avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.263718 kernel: audit: type=1400 audit(1761957859.189:549): avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.189000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.189000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.189000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.189000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.189000 audit: BPF prog-id=78 op=LOAD Nov 1 00:44:19.189000 audit[2003]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000391738 items=0 ppid=1508 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:19.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933323566373838356364623734663366623533653031353533323839 Nov 1 00:44:19.199000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.199000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.199000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.199000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.199000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.199000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.199000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.199000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.199000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.199000 audit: BPF prog-id=79 op=LOAD Nov 1 00:44:19.199000 audit[2003]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000391788 items=0 ppid=1508 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:19.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933323566373838356364623734663366623533653031353533323839 Nov 1 00:44:19.227000 audit: BPF prog-id=79 op=UNLOAD Nov 1 00:44:19.227000 audit: BPF prog-id=78 op=UNLOAD Nov 1 00:44:19.227000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.227000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.227000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.227000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.227000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.227000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.227000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.227000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.227000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.227000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:19.227000 audit: BPF prog-id=80 op=LOAD Nov 1 00:44:19.227000 audit[2003]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000391818 items=0 ppid=1508 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:19.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933323566373838356364623734663366623533653031353533323839 Nov 1 00:44:19.293195 env[1192]: time="2025-11-01T00:44:19.293041585Z" level=info msg="StartContainer for \"9325f7885cdb74f3fb53e015532898e086e772cd295b98abbac237fb57190706\" returns successfully" Nov 1 00:44:19.435316 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Nov 1 00:44:19.435495 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Nov 1 00:44:19.509984 kubelet[1438]: E1101 00:44:19.509215 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Nov 1 00:44:20.213098 kubelet[1438]: E1101 00:44:20.213020 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:20.512087 kubelet[1438]: E1101 00:44:20.511797 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Nov 1 00:44:20.535033 systemd[1]: run-containerd-runc-k8s.io-9325f7885cdb74f3fb53e015532898e086e772cd295b98abbac237fb57190706-runc.4pYkMt.mount: Deactivated successfully. Nov 1 00:44:20.862000 audit[2153]: AVC avc: denied { write } for pid=2153 comm="tee" name="fd" dev="proc" ino=20208 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:44:20.862000 audit[2153]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe223c27d2 a2=241 a3=1b6 items=1 ppid=2114 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:20.862000 audit: CWD cwd="/etc/service/enabled/bird6/log" Nov 1 00:44:20.862000 audit: PATH item=0 name="/dev/fd/63" inode=20201 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:44:20.857000 audit[2149]: AVC avc: denied { write } for pid=2149 comm="tee" name="fd" dev="proc" ino=20210 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:44:20.857000 audit[2149]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc91f997d2 a2=241 a3=1b6 items=1 ppid=2117 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:20.857000 audit: CWD cwd="/etc/service/enabled/confd/log" Nov 1 00:44:20.865000 audit[2158]: AVC avc: denied { write } for pid=2158 comm="tee" name="fd" dev="proc" ino=19062 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:44:20.857000 audit: PATH item=0 name="/dev/fd/63" inode=20196 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:44:20.857000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:44:20.871000 audit[2168]: AVC avc: denied { write } for pid=2168 comm="tee" name="fd" dev="proc" ino=20215 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:44:20.871000 audit[2168]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff45c6c7c3 a2=241 a3=1b6 items=1 ppid=2121 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:20.871000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Nov 1 00:44:20.871000 audit: PATH item=0 name="/dev/fd/63" inode=20205 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:44:20.871000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:44:20.862000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:44:20.876000 audit[2156]: AVC avc: denied { write } for pid=2156 comm="tee" name="fd" dev="proc" ino=19072 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:44:20.876000 audit[2156]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea6d3f7d4 a2=241 a3=1b6 items=1 ppid=2119 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:20.876000 audit: CWD cwd="/etc/service/enabled/cni/log" Nov 1 00:44:20.876000 audit: PATH item=0 name="/dev/fd/63" inode=20202 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:44:20.876000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:44:20.884000 audit[2178]: AVC avc: denied { write } for pid=2178 comm="tee" name="fd" dev="proc" ino=20219 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:44:20.884000 audit[2178]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe900f7d3 a2=241 a3=1b6 items=1 ppid=2124 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:20.884000 audit: CWD cwd="/etc/service/enabled/bird/log" Nov 1 00:44:20.865000 audit[2158]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3d5e57c2 a2=241 a3=1b6 items=1 ppid=2112 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:20.865000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Nov 1 00:44:20.865000 audit: PATH item=0 name="/dev/fd/63" inode=19055 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:44:20.865000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:44:20.884000 audit: PATH item=0 name="/dev/fd/63" inode=20212 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:44:20.884000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:44:20.899000 audit[2184]: AVC avc: denied { write } for pid=2184 comm="tee" name="fd" dev="proc" ino=20224 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:44:20.899000 audit[2184]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffddf71e7d2 a2=241 a3=1b6 items=1 ppid=2127 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:20.899000 audit: CWD cwd="/etc/service/enabled/felix/log" Nov 1 00:44:20.899000 audit: PATH item=0 name="/dev/fd/63" inode=20221 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:44:20.899000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:44:21.213791 kubelet[1438]: E1101 00:44:21.213662 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:21.216000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.216000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.216000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.216000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.216000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.216000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.216000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.216000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.216000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.216000 audit: BPF prog-id=81 op=LOAD Nov 1 00:44:21.216000 audit[2221]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff8f340460 a2=98 a3=1fffffffffffffff items=0 ppid=2129 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.216000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:44:21.218000 audit: BPF prog-id=81 op=UNLOAD Nov 1 00:44:21.218000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.218000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.218000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.218000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.218000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.218000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.218000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.218000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.218000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.218000 audit: BPF prog-id=82 op=LOAD Nov 1 00:44:21.218000 audit[2221]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff8f340340 a2=94 a3=3 items=0 ppid=2129 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.218000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:44:21.218000 audit: BPF prog-id=82 op=UNLOAD Nov 1 00:44:21.218000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.218000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.218000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.218000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.218000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.218000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.218000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.218000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.218000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.218000 audit: BPF prog-id=83 op=LOAD Nov 1 00:44:21.218000 audit[2221]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff8f340380 a2=94 a3=7fff8f340560 items=0 ppid=2129 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.218000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:44:21.219000 audit: BPF prog-id=83 op=UNLOAD Nov 1 00:44:21.219000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.219000 audit[2221]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff8f340450 a2=50 a3=a000000085 items=0 ppid=2129 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.219000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:44:21.222000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.222000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.222000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.222000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.222000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.222000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.222000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.222000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.222000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.222000 audit: BPF prog-id=84 op=LOAD Nov 1 00:44:21.222000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe559d0d0 a2=98 a3=3 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.222000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.223000 audit: BPF prog-id=84 op=UNLOAD Nov 1 00:44:21.223000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.223000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.223000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.223000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.223000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.223000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.223000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.223000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.223000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.223000 audit: BPF prog-id=85 op=LOAD Nov 1 00:44:21.223000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffe559cec0 a2=94 a3=54428f items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.223000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.224000 audit: BPF prog-id=85 op=UNLOAD Nov 1 00:44:21.224000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.224000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.224000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.224000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.224000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.224000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.224000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.224000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.224000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.224000 audit: BPF prog-id=86 op=LOAD Nov 1 00:44:21.224000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffe559cef0 a2=94 a3=2 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.224000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.224000 audit: BPF prog-id=86 op=UNLOAD Nov 1 00:44:21.367000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.367000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.367000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.367000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.367000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.367000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.367000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.367000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.367000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.367000 audit: BPF prog-id=87 op=LOAD Nov 1 00:44:21.367000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffe559cdb0 a2=94 a3=1 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.367000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.368000 audit: BPF prog-id=87 op=UNLOAD Nov 1 00:44:21.368000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.368000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffe559ce80 a2=50 a3=7fffe559cf60 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.368000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.380000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.380000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe559cdc0 a2=28 a3=0 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.380000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.380000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.380000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe559cdf0 a2=28 a3=0 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.380000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.380000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.380000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe559cd00 a2=28 a3=0 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.380000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.381000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.381000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe559ce10 a2=28 a3=0 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.381000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.381000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe559cdf0 a2=28 a3=0 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.381000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.381000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe559cde0 a2=28 a3=0 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.381000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.381000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe559ce10 a2=28 a3=0 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.381000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.381000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe559cdf0 a2=28 a3=0 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.381000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.381000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe559ce10 a2=28 a3=0 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.382000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.382000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe559cde0 a2=28 a3=0 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.382000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.382000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.382000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe559ce50 a2=28 a3=0 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.382000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.383000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.383000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffe559cc00 a2=50 a3=1 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.383000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.383000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.383000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.383000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.383000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.383000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.383000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.383000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.383000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.383000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.383000 audit: BPF prog-id=88 op=LOAD Nov 1 00:44:21.383000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffe559cc00 a2=94 a3=5 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.383000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.384000 audit: BPF prog-id=88 op=UNLOAD Nov 1 00:44:21.384000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.384000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffe559ccb0 a2=50 a3=1 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.384000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.384000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.384000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffe559cdd0 a2=4 a3=38 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.384000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.384000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.384000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.384000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.384000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.384000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.384000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.384000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.384000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.384000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.384000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.384000 audit[2222]: AVC avc: denied { confidentiality } for pid=2222 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:21.384000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffe559ce20 a2=94 a3=6 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.384000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.386000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.386000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.386000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.386000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.386000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.386000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.386000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.386000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.386000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.386000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.386000 audit[2222]: AVC avc: denied { confidentiality } for pid=2222 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:21.386000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffe559c5d0 a2=94 a3=88 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.386000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.387000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.387000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.387000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.387000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.387000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.387000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.387000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.387000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.387000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.387000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.387000 audit[2222]: AVC avc: denied { confidentiality } for pid=2222 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:21.387000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffe559c5d0 a2=94 a3=88 items=0 ppid=2129 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.387000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:44:21.402000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.402000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.402000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.402000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.402000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.402000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.402000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.402000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.402000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.402000 audit: BPF prog-id=89 op=LOAD Nov 1 00:44:21.402000 audit[2225]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf1c74320 a2=98 a3=1999999999999999 items=0 ppid=2129 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.402000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 00:44:21.403000 audit: BPF prog-id=89 op=UNLOAD Nov 1 00:44:21.403000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.403000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.403000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.403000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.403000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.403000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.403000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.403000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.403000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.403000 audit: BPF prog-id=90 op=LOAD Nov 1 00:44:21.403000 audit[2225]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf1c74200 a2=94 a3=ffff items=0 ppid=2129 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.403000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 00:44:21.404000 audit: BPF prog-id=90 op=UNLOAD Nov 1 00:44:21.404000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.404000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.404000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.404000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.404000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.404000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.404000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.404000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.404000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.404000 audit: BPF prog-id=91 op=LOAD Nov 1 00:44:21.404000 audit[2225]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf1c74240 a2=94 a3=7ffdf1c74420 items=0 ppid=2129 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.404000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 00:44:21.405000 audit: BPF prog-id=91 op=UNLOAD Nov 1 00:44:21.492395 systemd-networkd[1010]: vxlan.calico: Link UP Nov 1 00:44:21.522466 kubelet[1438]: E1101 00:44:21.513233 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Nov 1 00:44:21.492407 systemd-networkd[1010]: vxlan.calico: Gained carrier Nov 1 00:44:21.560992 systemd[1]: run-containerd-runc-k8s.io-9325f7885cdb74f3fb53e015532898e086e772cd295b98abbac237fb57190706-runc.hszLeX.mount: Deactivated successfully. Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit: BPF prog-id=92 op=LOAD Nov 1 00:44:21.569000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd00603d50 a2=98 a3=0 items=0 ppid=2129 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.569000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:44:21.569000 audit: BPF prog-id=92 op=UNLOAD Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit: BPF prog-id=93 op=LOAD Nov 1 00:44:21.569000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd00603b60 a2=94 a3=54428f items=0 ppid=2129 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.569000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:44:21.569000 audit: BPF prog-id=93 op=UNLOAD Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit: BPF prog-id=94 op=LOAD Nov 1 00:44:21.569000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd00603b90 a2=94 a3=2 items=0 ppid=2129 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.569000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:44:21.569000 audit: BPF prog-id=94 op=UNLOAD Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd00603a60 a2=28 a3=0 items=0 ppid=2129 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.569000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:44:21.569000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.569000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd00603a90 a2=28 a3=0 items=0 ppid=2129 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.569000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:44:21.570000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.570000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd006039a0 a2=28 a3=0 items=0 ppid=2129 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.570000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:44:21.570000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.570000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd00603ab0 a2=28 a3=0 items=0 ppid=2129 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.570000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:44:21.570000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.570000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd00603a90 a2=28 a3=0 items=0 ppid=2129 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.570000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:44:21.570000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.570000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd00603a80 a2=28 a3=0 items=0 ppid=2129 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.570000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:44:21.570000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.570000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd00603ab0 a2=28 a3=0 items=0 ppid=2129 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.570000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:44:21.570000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.570000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd00603a90 a2=28 a3=0 items=0 ppid=2129 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.570000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:44:21.570000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.570000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd00603ab0 a2=28 a3=0 items=0 ppid=2129 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.570000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:44:21.570000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.570000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd00603a80 a2=28 a3=0 items=0 ppid=2129 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.570000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:44:21.570000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.570000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd00603af0 a2=28 a3=0 items=0 ppid=2129 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.570000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:44:21.570000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.570000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.570000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.570000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.570000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.570000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.570000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.570000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.570000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.570000 audit: BPF prog-id=95 op=LOAD Nov 1 00:44:21.570000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd00603960 a2=94 a3=0 items=0 ppid=2129 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.570000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:44:21.570000 audit: BPF prog-id=95 op=UNLOAD Nov 1 00:44:21.571000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.571000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd00603950 a2=50 a3=2800 items=0 ppid=2129 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.571000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd00603950 a2=50 a3=2800 items=0 ppid=2129 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.573000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit: BPF prog-id=96 op=LOAD Nov 1 00:44:21.573000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd00603170 a2=94 a3=2 items=0 ppid=2129 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.573000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:44:21.573000 audit: BPF prog-id=96 op=UNLOAD Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.573000 audit: BPF prog-id=97 op=LOAD Nov 1 00:44:21.573000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd00603270 a2=94 a3=30 items=0 ppid=2129 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.573000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:44:21.586000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.586000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.586000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.586000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.586000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.586000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.586000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.586000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.586000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.586000 audit: BPF prog-id=98 op=LOAD Nov 1 00:44:21.586000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdeb988170 a2=98 a3=0 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.586000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.589000 audit: BPF prog-id=98 op=UNLOAD Nov 1 00:44:21.589000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.589000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.589000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.589000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.589000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.589000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.589000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.589000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.589000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.589000 audit: BPF prog-id=99 op=LOAD Nov 1 00:44:21.589000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdeb987f60 a2=94 a3=54428f items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.589000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.589000 audit: BPF prog-id=99 op=UNLOAD Nov 1 00:44:21.589000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.589000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.589000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.589000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.589000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.589000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.589000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.589000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.589000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.589000 audit: BPF prog-id=100 op=LOAD Nov 1 00:44:21.589000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdeb987f90 a2=94 a3=2 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.589000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.589000 audit: BPF prog-id=100 op=UNLOAD Nov 1 00:44:21.752000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.752000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.752000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.752000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.752000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.752000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.752000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.752000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.752000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.752000 audit: BPF prog-id=101 op=LOAD Nov 1 00:44:21.752000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdeb987e50 a2=94 a3=1 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.752000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.752000 audit: BPF prog-id=101 op=UNLOAD Nov 1 00:44:21.752000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.752000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdeb987f20 a2=50 a3=7ffdeb988000 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.752000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.763000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.763000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdeb987e60 a2=28 a3=0 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.763000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.763000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdeb987e90 a2=28 a3=0 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.763000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.763000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdeb987da0 a2=28 a3=0 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.763000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.763000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdeb987eb0 a2=28 a3=0 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.763000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.763000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdeb987e90 a2=28 a3=0 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.763000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.763000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdeb987e80 a2=28 a3=0 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.763000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.763000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdeb987eb0 a2=28 a3=0 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.763000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.763000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdeb987e90 a2=28 a3=0 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.763000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.763000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdeb987eb0 a2=28 a3=0 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdeb987e80 a2=28 a3=0 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdeb987ef0 a2=28 a3=0 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdeb987ca0 a2=50 a3=1 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit: BPF prog-id=102 op=LOAD Nov 1 00:44:21.764000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdeb987ca0 a2=94 a3=5 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.764000 audit: BPF prog-id=102 op=UNLOAD Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdeb987d50 a2=50 a3=1 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdeb987e70 a2=4 a3=38 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { confidentiality } for pid=2269 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:21.764000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdeb987ec0 a2=94 a3=6 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.764000 audit[2269]: AVC avc: denied { confidentiality } for pid=2269 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:21.764000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdeb987670 a2=94 a3=88 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.765000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.765000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.765000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.765000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.765000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.765000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.765000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.765000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.765000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.765000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.765000 audit[2269]: AVC avc: denied { confidentiality } for pid=2269 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:21.765000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdeb987670 a2=94 a3=88 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.765000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.765000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.765000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdeb9890a0 a2=10 a3=f8f00800 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.765000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.765000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.765000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdeb988f40 a2=10 a3=3 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.765000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.765000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.765000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdeb988ee0 a2=10 a3=3 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.765000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.765000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:21.765000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdeb988ee0 a2=10 a3=7 items=0 ppid=2129 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.765000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:44:21.775000 audit: BPF prog-id=97 op=UNLOAD Nov 1 00:44:21.869000 audit[2301]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:44:21.869000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd2410a9a0 a2=0 a3=7ffd2410a98c items=0 ppid=2129 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.869000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:44:21.889000 audit[2302]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:44:21.889000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe9230df30 a2=0 a3=7ffe9230df1c items=0 ppid=2129 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.889000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:44:21.890000 audit[2303]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:44:21.890000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd27b2bec0 a2=0 a3=7ffd27b2beac items=0 ppid=2129 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.890000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:44:21.892000 audit[2300]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:44:21.892000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffcf920b350 a2=0 a3=7ffcf920b33c items=0 ppid=2129 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:21.892000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:44:22.214962 kubelet[1438]: E1101 00:44:22.214758 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:23.215075 kubelet[1438]: E1101 00:44:23.214976 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:23.543916 systemd-networkd[1010]: vxlan.calico: Gained IPv6LL Nov 1 00:44:24.215929 kubelet[1438]: E1101 00:44:24.215863 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:25.217599 kubelet[1438]: E1101 00:44:25.217501 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:25.433543 env[1192]: time="2025-11-01T00:44:25.433452081Z" level=info msg="StopPodSandbox for \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\"" Nov 1 00:44:25.519504 kubelet[1438]: I1101 00:44:25.519303 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-52qnx" podStartSLOduration=9.740129046 podStartE2EDuration="29.519264178s" podCreationTimestamp="2025-11-01 00:43:56 +0000 UTC" firstStartedPulling="2025-11-01 00:43:59.301055881 +0000 UTC m=+4.841601748" lastFinishedPulling="2025-11-01 00:44:19.080190997 +0000 UTC m=+24.620736880" observedRunningTime="2025-11-01 00:44:19.540073498 +0000 UTC m=+25.080619384" watchObservedRunningTime="2025-11-01 00:44:25.519264178 +0000 UTC m=+31.059810075" Nov 1 00:44:25.600065 env[1192]: 2025-11-01 00:44:25.520 [INFO][2323] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Nov 1 00:44:25.600065 env[1192]: 2025-11-01 00:44:25.520 [INFO][2323] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" iface="eth0" netns="/var/run/netns/cni-2af217ca-64a2-d668-812d-d8da4a8cd907" Nov 1 00:44:25.600065 env[1192]: 2025-11-01 00:44:25.522 [INFO][2323] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" iface="eth0" netns="/var/run/netns/cni-2af217ca-64a2-d668-812d-d8da4a8cd907" Nov 1 00:44:25.600065 env[1192]: 2025-11-01 00:44:25.523 [INFO][2323] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" iface="eth0" netns="/var/run/netns/cni-2af217ca-64a2-d668-812d-d8da4a8cd907" Nov 1 00:44:25.600065 env[1192]: 2025-11-01 00:44:25.523 [INFO][2323] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Nov 1 00:44:25.600065 env[1192]: 2025-11-01 00:44:25.523 [INFO][2323] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Nov 1 00:44:25.600065 env[1192]: 2025-11-01 00:44:25.581 [INFO][2330] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" HandleID="k8s-pod-network.67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Workload="146.190.149.44-k8s-csi--node--driver--k59zw-eth0" Nov 1 00:44:25.600065 env[1192]: 2025-11-01 00:44:25.581 [INFO][2330] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:44:25.600065 env[1192]: 2025-11-01 00:44:25.581 [INFO][2330] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:44:25.600065 env[1192]: 2025-11-01 00:44:25.591 [WARNING][2330] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" HandleID="k8s-pod-network.67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Workload="146.190.149.44-k8s-csi--node--driver--k59zw-eth0" Nov 1 00:44:25.600065 env[1192]: 2025-11-01 00:44:25.591 [INFO][2330] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" HandleID="k8s-pod-network.67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Workload="146.190.149.44-k8s-csi--node--driver--k59zw-eth0" Nov 1 00:44:25.600065 env[1192]: 2025-11-01 00:44:25.594 [INFO][2330] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:44:25.600065 env[1192]: 2025-11-01 00:44:25.597 [INFO][2323] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Nov 1 00:44:25.603961 env[1192]: time="2025-11-01T00:44:25.603891879Z" level=info msg="TearDown network for sandbox \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\" successfully" Nov 1 00:44:25.604001 systemd[1]: run-netns-cni\x2d2af217ca\x2d64a2\x2dd668\x2d812d\x2dd8da4a8cd907.mount: Deactivated successfully. Nov 1 00:44:25.605413 env[1192]: time="2025-11-01T00:44:25.605355574Z" level=info msg="StopPodSandbox for \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\" returns successfully" Nov 1 00:44:25.606931 env[1192]: time="2025-11-01T00:44:25.606611365Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k59zw,Uid:783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676,Namespace:calico-system,Attempt:1,}" Nov 1 00:44:25.799445 systemd-networkd[1010]: cali424be299207: Link UP Nov 1 00:44:25.802063 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:44:25.802175 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali424be299207: link becomes ready Nov 1 00:44:25.805000 systemd-networkd[1010]: cali424be299207: Gained carrier Nov 1 00:44:25.825798 env[1192]: 2025-11-01 00:44:25.693 [INFO][2336] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {146.190.149.44-k8s-csi--node--driver--k59zw-eth0 csi-node-driver- calico-system 783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676 1393 0 2025-11-01 00:43:56 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:857b56db8f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 146.190.149.44 csi-node-driver-k59zw eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali424be299207 [] [] }} ContainerID="0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a" Namespace="calico-system" Pod="csi-node-driver-k59zw" WorkloadEndpoint="146.190.149.44-k8s-csi--node--driver--k59zw-" Nov 1 00:44:25.825798 env[1192]: 2025-11-01 00:44:25.693 [INFO][2336] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a" Namespace="calico-system" Pod="csi-node-driver-k59zw" WorkloadEndpoint="146.190.149.44-k8s-csi--node--driver--k59zw-eth0" Nov 1 00:44:25.825798 env[1192]: 2025-11-01 00:44:25.731 [INFO][2349] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a" HandleID="k8s-pod-network.0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a" Workload="146.190.149.44-k8s-csi--node--driver--k59zw-eth0" Nov 1 00:44:25.825798 env[1192]: 2025-11-01 00:44:25.731 [INFO][2349] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a" HandleID="k8s-pod-network.0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a" Workload="146.190.149.44-k8s-csi--node--driver--k59zw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00025cfe0), Attrs:map[string]string{"namespace":"calico-system", "node":"146.190.149.44", "pod":"csi-node-driver-k59zw", "timestamp":"2025-11-01 00:44:25.731262428 +0000 UTC"}, Hostname:"146.190.149.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:44:25.825798 env[1192]: 2025-11-01 00:44:25.731 [INFO][2349] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:44:25.825798 env[1192]: 2025-11-01 00:44:25.731 [INFO][2349] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:44:25.825798 env[1192]: 2025-11-01 00:44:25.731 [INFO][2349] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '146.190.149.44' Nov 1 00:44:25.825798 env[1192]: 2025-11-01 00:44:25.746 [INFO][2349] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a" host="146.190.149.44" Nov 1 00:44:25.825798 env[1192]: 2025-11-01 00:44:25.755 [INFO][2349] ipam/ipam.go 394: Looking up existing affinities for host host="146.190.149.44" Nov 1 00:44:25.825798 env[1192]: 2025-11-01 00:44:25.764 [INFO][2349] ipam/ipam.go 511: Trying affinity for 192.168.61.192/26 host="146.190.149.44" Nov 1 00:44:25.825798 env[1192]: 2025-11-01 00:44:25.767 [INFO][2349] ipam/ipam.go 158: Attempting to load block cidr=192.168.61.192/26 host="146.190.149.44" Nov 1 00:44:25.825798 env[1192]: 2025-11-01 00:44:25.771 [INFO][2349] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.61.192/26 host="146.190.149.44" Nov 1 00:44:25.825798 env[1192]: 2025-11-01 00:44:25.771 [INFO][2349] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.61.192/26 handle="k8s-pod-network.0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a" host="146.190.149.44" Nov 1 00:44:25.825798 env[1192]: 2025-11-01 00:44:25.774 [INFO][2349] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a Nov 1 00:44:25.825798 env[1192]: 2025-11-01 00:44:25.781 [INFO][2349] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.61.192/26 handle="k8s-pod-network.0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a" host="146.190.149.44" Nov 1 00:44:25.825798 env[1192]: 2025-11-01 00:44:25.787 [INFO][2349] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.61.193/26] block=192.168.61.192/26 handle="k8s-pod-network.0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a" host="146.190.149.44" Nov 1 00:44:25.825798 env[1192]: 2025-11-01 00:44:25.787 [INFO][2349] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.61.193/26] handle="k8s-pod-network.0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a" host="146.190.149.44" Nov 1 00:44:25.825798 env[1192]: 2025-11-01 00:44:25.788 [INFO][2349] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:44:25.825798 env[1192]: 2025-11-01 00:44:25.788 [INFO][2349] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.61.193/26] IPv6=[] ContainerID="0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a" HandleID="k8s-pod-network.0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a" Workload="146.190.149.44-k8s-csi--node--driver--k59zw-eth0" Nov 1 00:44:25.826676 env[1192]: 2025-11-01 00:44:25.790 [INFO][2336] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a" Namespace="calico-system" Pod="csi-node-driver-k59zw" WorkloadEndpoint="146.190.149.44-k8s-csi--node--driver--k59zw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.149.44-k8s-csi--node--driver--k59zw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676", ResourceVersion:"1393", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.149.44", ContainerID:"", Pod:"csi-node-driver-k59zw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.61.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali424be299207", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:44:25.826676 env[1192]: 2025-11-01 00:44:25.790 [INFO][2336] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.61.193/32] ContainerID="0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a" Namespace="calico-system" Pod="csi-node-driver-k59zw" WorkloadEndpoint="146.190.149.44-k8s-csi--node--driver--k59zw-eth0" Nov 1 00:44:25.826676 env[1192]: 2025-11-01 00:44:25.790 [INFO][2336] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali424be299207 ContainerID="0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a" Namespace="calico-system" Pod="csi-node-driver-k59zw" WorkloadEndpoint="146.190.149.44-k8s-csi--node--driver--k59zw-eth0" Nov 1 00:44:25.826676 env[1192]: 2025-11-01 00:44:25.805 [INFO][2336] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a" Namespace="calico-system" Pod="csi-node-driver-k59zw" WorkloadEndpoint="146.190.149.44-k8s-csi--node--driver--k59zw-eth0" Nov 1 00:44:25.826676 env[1192]: 2025-11-01 00:44:25.806 [INFO][2336] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a" Namespace="calico-system" Pod="csi-node-driver-k59zw" WorkloadEndpoint="146.190.149.44-k8s-csi--node--driver--k59zw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.149.44-k8s-csi--node--driver--k59zw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676", ResourceVersion:"1393", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.149.44", ContainerID:"0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a", Pod:"csi-node-driver-k59zw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.61.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali424be299207", MAC:"86:4c:55:ba:11:03", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:44:25.826676 env[1192]: 2025-11-01 00:44:25.822 [INFO][2336] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a" Namespace="calico-system" Pod="csi-node-driver-k59zw" WorkloadEndpoint="146.190.149.44-k8s-csi--node--driver--k59zw-eth0" Nov 1 00:44:25.840461 env[1192]: time="2025-11-01T00:44:25.840385741Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:44:25.840754 env[1192]: time="2025-11-01T00:44:25.840698170Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:44:25.840907 env[1192]: time="2025-11-01T00:44:25.840879718Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:44:25.841282 env[1192]: time="2025-11-01T00:44:25.841213134Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a pid=2374 runtime=io.containerd.runc.v2 Nov 1 00:44:25.876696 kernel: kauditd_printk_skb: 590 callbacks suppressed Nov 1 00:44:25.876871 kernel: audit: type=1325 audit(1761957865.840:663): table=filter:69 family=2 entries=38 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:44:25.840000 audit[2366]: NETFILTER_CFG table=filter:69 family=2 entries=38 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:44:25.864637 systemd[1]: Started cri-containerd-0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a.scope. Nov 1 00:44:25.840000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffef969bfc0 a2=0 a3=7ffef969bfac items=0 ppid=2129 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:25.887726 kernel: audit: type=1300 audit(1761957865.840:663): arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffef969bfc0 a2=0 a3=7ffef969bfac items=0 ppid=2129 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:25.840000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:44:25.896559 kernel: audit: type=1327 audit(1761957865.840:663): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:44:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911726 kernel: audit: type=1400 audit(1761957865.904:664): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.924935 kernel: audit: type=1400 audit(1761957865.904:665): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.925076 kernel: audit: type=1400 audit(1761957865.904:666): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.931287 kernel: audit: type=1400 audit(1761957865.904:667): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.937372 kernel: audit: type=1400 audit(1761957865.904:668): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.943473 kernel: audit: type=1400 audit(1761957865.904:669): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.950728 kernel: audit: type=1400 audit(1761957865.904:670): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.910000 audit: BPF prog-id=103 op=LOAD Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2374 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:25.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066633066343933363833303538346363656434333461383535366436 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2374 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:25.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066633066343933363833303538346363656434333461383535366436 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit: BPF prog-id=104 op=LOAD Nov 1 00:44:25.911000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00039c2d0 items=0 ppid=2374 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:25.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066633066343933363833303538346363656434333461383535366436 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit: BPF prog-id=105 op=LOAD Nov 1 00:44:25.911000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00039c318 items=0 ppid=2374 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:25.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066633066343933363833303538346363656434333461383535366436 Nov 1 00:44:25.911000 audit: BPF prog-id=105 op=UNLOAD Nov 1 00:44:25.911000 audit: BPF prog-id=104 op=UNLOAD Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:25.911000 audit: BPF prog-id=106 op=LOAD Nov 1 00:44:25.911000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00039c728 items=0 ppid=2374 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:25.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066633066343933363833303538346363656434333461383535366436 Nov 1 00:44:25.965205 env[1192]: time="2025-11-01T00:44:25.965153336Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k59zw,Uid:783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676,Namespace:calico-system,Attempt:1,} returns sandbox id \"0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a\"" Nov 1 00:44:25.967902 env[1192]: time="2025-11-01T00:44:25.967855534Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:44:26.218256 kubelet[1438]: E1101 00:44:26.218188 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:26.276118 env[1192]: time="2025-11-01T00:44:26.276045954Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:44:26.277215 env[1192]: time="2025-11-01T00:44:26.277114700Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:44:26.277546 kubelet[1438]: E1101 00:44:26.277491 1438 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:44:26.277715 kubelet[1438]: E1101 00:44:26.277586 1438 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:44:26.278218 kubelet[1438]: E1101 00:44:26.277859 1438 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-zqwx5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-k59zw_calico-system(783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:44:26.280400 env[1192]: time="2025-11-01T00:44:26.280348904Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:44:26.580563 env[1192]: time="2025-11-01T00:44:26.580361990Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:44:26.582202 env[1192]: time="2025-11-01T00:44:26.582037441Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:44:26.582577 kubelet[1438]: E1101 00:44:26.582517 1438 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:44:26.582723 kubelet[1438]: E1101 00:44:26.582597 1438 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:44:26.583050 kubelet[1438]: E1101 00:44:26.582846 1438 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-zqwx5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-k59zw_calico-system(783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:44:26.584458 kubelet[1438]: E1101 00:44:26.584415 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-k59zw" podUID="783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676" Nov 1 00:44:27.218853 kubelet[1438]: E1101 00:44:27.218805 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:27.433535 env[1192]: time="2025-11-01T00:44:27.433341992Z" level=info msg="StopPodSandbox for \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\"" Nov 1 00:44:27.531192 kubelet[1438]: E1101 00:44:27.530858 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-k59zw" podUID="783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676" Nov 1 00:44:27.531766 env[1192]: 2025-11-01 00:44:27.484 [INFO][2429] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Nov 1 00:44:27.531766 env[1192]: 2025-11-01 00:44:27.484 [INFO][2429] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" iface="eth0" netns="/var/run/netns/cni-931d68ee-304f-924e-7306-287f15872ecf" Nov 1 00:44:27.531766 env[1192]: 2025-11-01 00:44:27.484 [INFO][2429] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" iface="eth0" netns="/var/run/netns/cni-931d68ee-304f-924e-7306-287f15872ecf" Nov 1 00:44:27.531766 env[1192]: 2025-11-01 00:44:27.485 [INFO][2429] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" iface="eth0" netns="/var/run/netns/cni-931d68ee-304f-924e-7306-287f15872ecf" Nov 1 00:44:27.531766 env[1192]: 2025-11-01 00:44:27.485 [INFO][2429] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Nov 1 00:44:27.531766 env[1192]: 2025-11-01 00:44:27.485 [INFO][2429] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Nov 1 00:44:27.531766 env[1192]: 2025-11-01 00:44:27.514 [INFO][2437] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" HandleID="k8s-pod-network.080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Workload="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0" Nov 1 00:44:27.531766 env[1192]: 2025-11-01 00:44:27.514 [INFO][2437] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:44:27.531766 env[1192]: 2025-11-01 00:44:27.514 [INFO][2437] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:44:27.531766 env[1192]: 2025-11-01 00:44:27.522 [WARNING][2437] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" HandleID="k8s-pod-network.080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Workload="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0" Nov 1 00:44:27.531766 env[1192]: 2025-11-01 00:44:27.522 [INFO][2437] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" HandleID="k8s-pod-network.080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Workload="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0" Nov 1 00:44:27.531766 env[1192]: 2025-11-01 00:44:27.525 [INFO][2437] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:44:27.531766 env[1192]: 2025-11-01 00:44:27.527 [INFO][2429] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Nov 1 00:44:27.536782 env[1192]: time="2025-11-01T00:44:27.534776131Z" level=info msg="TearDown network for sandbox \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\" successfully" Nov 1 00:44:27.536782 env[1192]: time="2025-11-01T00:44:27.534824470Z" level=info msg="StopPodSandbox for \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\" returns successfully" Nov 1 00:44:27.536076 systemd[1]: run-netns-cni\x2d931d68ee\x2d304f\x2d924e\x2d7306\x2d287f15872ecf.mount: Deactivated successfully. Nov 1 00:44:27.538525 env[1192]: time="2025-11-01T00:44:27.538402428Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-24g42,Uid:171afe9b-a064-414a-9990-169d6c02e8cb,Namespace:default,Attempt:1,}" Nov 1 00:44:27.704924 systemd-networkd[1010]: cali424be299207: Gained IPv6LL Nov 1 00:44:27.707477 systemd-networkd[1010]: cali258d290c1e8: Link UP Nov 1 00:44:27.709102 systemd-networkd[1010]: cali258d290c1e8: Gained carrier Nov 1 00:44:27.710065 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:44:27.710172 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali258d290c1e8: link becomes ready Nov 1 00:44:27.725879 env[1192]: 2025-11-01 00:44:27.610 [INFO][2443] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0 nginx-deployment-7fcdb87857- default 171afe9b-a064-414a-9990-169d6c02e8cb 1415 0 2025-11-01 00:44:13 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 146.190.149.44 nginx-deployment-7fcdb87857-24g42 eth0 default [] [] [kns.default ksa.default.default] cali258d290c1e8 [] [] }} ContainerID="851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd" Namespace="default" Pod="nginx-deployment-7fcdb87857-24g42" WorkloadEndpoint="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-" Nov 1 00:44:27.725879 env[1192]: 2025-11-01 00:44:27.610 [INFO][2443] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd" Namespace="default" Pod="nginx-deployment-7fcdb87857-24g42" WorkloadEndpoint="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0" Nov 1 00:44:27.725879 env[1192]: 2025-11-01 00:44:27.644 [INFO][2457] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd" HandleID="k8s-pod-network.851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd" Workload="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0" Nov 1 00:44:27.725879 env[1192]: 2025-11-01 00:44:27.644 [INFO][2457] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd" HandleID="k8s-pod-network.851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd" Workload="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002518e0), Attrs:map[string]string{"namespace":"default", "node":"146.190.149.44", "pod":"nginx-deployment-7fcdb87857-24g42", "timestamp":"2025-11-01 00:44:27.644534804 +0000 UTC"}, Hostname:"146.190.149.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:44:27.725879 env[1192]: 2025-11-01 00:44:27.644 [INFO][2457] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:44:27.725879 env[1192]: 2025-11-01 00:44:27.644 [INFO][2457] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:44:27.725879 env[1192]: 2025-11-01 00:44:27.645 [INFO][2457] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '146.190.149.44' Nov 1 00:44:27.725879 env[1192]: 2025-11-01 00:44:27.654 [INFO][2457] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd" host="146.190.149.44" Nov 1 00:44:27.725879 env[1192]: 2025-11-01 00:44:27.661 [INFO][2457] ipam/ipam.go 394: Looking up existing affinities for host host="146.190.149.44" Nov 1 00:44:27.725879 env[1192]: 2025-11-01 00:44:27.668 [INFO][2457] ipam/ipam.go 511: Trying affinity for 192.168.61.192/26 host="146.190.149.44" Nov 1 00:44:27.725879 env[1192]: 2025-11-01 00:44:27.671 [INFO][2457] ipam/ipam.go 158: Attempting to load block cidr=192.168.61.192/26 host="146.190.149.44" Nov 1 00:44:27.725879 env[1192]: 2025-11-01 00:44:27.674 [INFO][2457] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.61.192/26 host="146.190.149.44" Nov 1 00:44:27.725879 env[1192]: 2025-11-01 00:44:27.674 [INFO][2457] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.61.192/26 handle="k8s-pod-network.851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd" host="146.190.149.44" Nov 1 00:44:27.725879 env[1192]: 2025-11-01 00:44:27.677 [INFO][2457] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd Nov 1 00:44:27.725879 env[1192]: 2025-11-01 00:44:27.682 [INFO][2457] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.61.192/26 handle="k8s-pod-network.851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd" host="146.190.149.44" Nov 1 00:44:27.725879 env[1192]: 2025-11-01 00:44:27.691 [INFO][2457] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.61.194/26] block=192.168.61.192/26 handle="k8s-pod-network.851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd" host="146.190.149.44" Nov 1 00:44:27.725879 env[1192]: 2025-11-01 00:44:27.691 [INFO][2457] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.61.194/26] handle="k8s-pod-network.851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd" host="146.190.149.44" Nov 1 00:44:27.725879 env[1192]: 2025-11-01 00:44:27.691 [INFO][2457] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:44:27.725879 env[1192]: 2025-11-01 00:44:27.691 [INFO][2457] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.61.194/26] IPv6=[] ContainerID="851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd" HandleID="k8s-pod-network.851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd" Workload="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0" Nov 1 00:44:27.727551 env[1192]: 2025-11-01 00:44:27.693 [INFO][2443] cni-plugin/k8s.go 418: Populated endpoint ContainerID="851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd" Namespace="default" Pod="nginx-deployment-7fcdb87857-24g42" WorkloadEndpoint="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"171afe9b-a064-414a-9990-169d6c02e8cb", ResourceVersion:"1415", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 44, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.149.44", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-24g42", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.61.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali258d290c1e8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:44:27.727551 env[1192]: 2025-11-01 00:44:27.694 [INFO][2443] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.61.194/32] ContainerID="851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd" Namespace="default" Pod="nginx-deployment-7fcdb87857-24g42" WorkloadEndpoint="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0" Nov 1 00:44:27.727551 env[1192]: 2025-11-01 00:44:27.694 [INFO][2443] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali258d290c1e8 ContainerID="851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd" Namespace="default" Pod="nginx-deployment-7fcdb87857-24g42" WorkloadEndpoint="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0" Nov 1 00:44:27.727551 env[1192]: 2025-11-01 00:44:27.710 [INFO][2443] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd" Namespace="default" Pod="nginx-deployment-7fcdb87857-24g42" WorkloadEndpoint="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0" Nov 1 00:44:27.727551 env[1192]: 2025-11-01 00:44:27.713 [INFO][2443] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd" Namespace="default" Pod="nginx-deployment-7fcdb87857-24g42" WorkloadEndpoint="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"171afe9b-a064-414a-9990-169d6c02e8cb", ResourceVersion:"1415", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 44, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.149.44", ContainerID:"851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd", Pod:"nginx-deployment-7fcdb87857-24g42", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.61.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali258d290c1e8", MAC:"e6:a9:46:bb:31:13", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:44:27.727551 env[1192]: 2025-11-01 00:44:27.723 [INFO][2443] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd" Namespace="default" Pod="nginx-deployment-7fcdb87857-24g42" WorkloadEndpoint="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0" Nov 1 00:44:27.764340 env[1192]: time="2025-11-01T00:44:27.764067120Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:44:27.764340 env[1192]: time="2025-11-01T00:44:27.764113406Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:44:27.764340 env[1192]: time="2025-11-01T00:44:27.764130735Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:44:27.764674 env[1192]: time="2025-11-01T00:44:27.764395382Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd pid=2480 runtime=io.containerd.runc.v2 Nov 1 00:44:27.772000 audit[2479]: NETFILTER_CFG table=filter:70 family=2 entries=42 op=nft_register_chain pid=2479 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:44:27.772000 audit[2479]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffdd7fd57c0 a2=0 a3=7ffdd7fd57ac items=0 ppid=2129 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:27.772000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:44:27.789764 systemd[1]: Started cri-containerd-851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd.scope. Nov 1 00:44:27.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.813000 audit: BPF prog-id=107 op=LOAD Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2480 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:27.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835313233373932336231353664373061336566306363363164353533 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2480 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:27.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835313233373932336231353664373061336566306363363164353533 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit: BPF prog-id=108 op=LOAD Nov 1 00:44:27.814000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c8200 items=0 ppid=2480 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:27.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835313233373932336231353664373061336566306363363164353533 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.814000 audit: BPF prog-id=109 op=LOAD Nov 1 00:44:27.814000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c8248 items=0 ppid=2480 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:27.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835313233373932336231353664373061336566306363363164353533 Nov 1 00:44:27.815000 audit: BPF prog-id=109 op=UNLOAD Nov 1 00:44:27.815000 audit: BPF prog-id=108 op=UNLOAD Nov 1 00:44:27.815000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.815000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.815000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.815000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.815000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.815000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.815000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.815000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.815000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.815000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:27.815000 audit: BPF prog-id=110 op=LOAD Nov 1 00:44:27.815000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c8658 items=0 ppid=2480 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:27.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835313233373932336231353664373061336566306363363164353533 Nov 1 00:44:27.850421 env[1192]: time="2025-11-01T00:44:27.850365761Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-24g42,Uid:171afe9b-a064-414a-9990-169d6c02e8cb,Namespace:default,Attempt:1,} returns sandbox id \"851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd\"" Nov 1 00:44:27.852716 env[1192]: time="2025-11-01T00:44:27.852607792Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Nov 1 00:44:28.220128 kubelet[1438]: E1101 00:44:28.220062 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:28.536320 systemd[1]: run-containerd-runc-k8s.io-851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd-runc.qsDSfq.mount: Deactivated successfully. Nov 1 00:44:29.220751 kubelet[1438]: E1101 00:44:29.220663 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:29.432475 systemd-networkd[1010]: cali258d290c1e8: Gained IPv6LL Nov 1 00:44:30.221127 kubelet[1438]: E1101 00:44:30.221061 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:30.800135 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2690038114.mount: Deactivated successfully. Nov 1 00:44:31.222311 kubelet[1438]: E1101 00:44:31.222240 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:32.223426 kubelet[1438]: E1101 00:44:32.223364 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:33.148692 env[1192]: time="2025-11-01T00:44:33.148601410Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:33.152835 env[1192]: time="2025-11-01T00:44:33.152775894Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:33.156947 env[1192]: time="2025-11-01T00:44:33.156890450Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:33.160750 env[1192]: time="2025-11-01T00:44:33.160693247Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:33.163692 env[1192]: time="2025-11-01T00:44:33.162317293Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9\"" Nov 1 00:44:33.169505 env[1192]: time="2025-11-01T00:44:33.169444180Z" level=info msg="CreateContainer within sandbox \"851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Nov 1 00:44:33.187000 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount790480362.mount: Deactivated successfully. Nov 1 00:44:33.197798 env[1192]: time="2025-11-01T00:44:33.197681586Z" level=info msg="CreateContainer within sandbox \"851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"a754f5c44e17172c7edf335cae3216554946acb4cc53fdd963614ba6fdeeb474\"" Nov 1 00:44:33.198912 env[1192]: time="2025-11-01T00:44:33.198850390Z" level=info msg="StartContainer for \"a754f5c44e17172c7edf335cae3216554946acb4cc53fdd963614ba6fdeeb474\"" Nov 1 00:44:33.225956 kubelet[1438]: E1101 00:44:33.225878 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:33.234900 systemd[1]: Started cri-containerd-a754f5c44e17172c7edf335cae3216554946acb4cc53fdd963614ba6fdeeb474.scope. Nov 1 00:44:33.277465 kernel: kauditd_printk_skb: 110 callbacks suppressed Nov 1 00:44:33.277701 kernel: audit: type=1400 audit(1761957873.267:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.292001 kernel: audit: type=1400 audit(1761957873.267:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.292962 kernel: audit: type=1400 audit(1761957873.267:703): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.308315 kernel: audit: type=1400 audit(1761957873.267:704): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.308514 kernel: audit: type=1400 audit(1761957873.267:705): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.323257 kernel: audit: type=1400 audit(1761957873.267:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.323464 kernel: audit: type=1400 audit(1761957873.267:707): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.339969 kernel: audit: type=1400 audit(1761957873.267:708): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.340290 kernel: audit: type=1400 audit(1761957873.267:709): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.346545 env[1192]: time="2025-11-01T00:44:33.346496757Z" level=info msg="StartContainer for \"a754f5c44e17172c7edf335cae3216554946acb4cc53fdd963614ba6fdeeb474\" returns successfully" Nov 1 00:44:33.351752 kernel: audit: type=1400 audit(1761957873.267:710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.267000 audit: BPF prog-id=111 op=LOAD Nov 1 00:44:33.273000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.273000 audit[2532]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2480 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:33.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353466356334346531373137326337656466333335636165333231 Nov 1 00:44:33.273000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.273000 audit[2532]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2480 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:33.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353466356334346531373137326337656466333335636165333231 Nov 1 00:44:33.273000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.273000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.273000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.273000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.273000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.273000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.273000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.273000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.273000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.273000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.273000 audit: BPF prog-id=112 op=LOAD Nov 1 00:44:33.273000 audit[2532]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00028bbd0 items=0 ppid=2480 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:33.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353466356334346531373137326337656466333335636165333231 Nov 1 00:44:33.276000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.276000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.276000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.276000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.276000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.276000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.276000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.276000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.276000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.276000 audit: BPF prog-id=113 op=LOAD Nov 1 00:44:33.276000 audit[2532]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00028bc18 items=0 ppid=2480 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:33.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353466356334346531373137326337656466333335636165333231 Nov 1 00:44:33.277000 audit: BPF prog-id=113 op=UNLOAD Nov 1 00:44:33.277000 audit: BPF prog-id=112 op=UNLOAD Nov 1 00:44:33.277000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.277000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.277000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.277000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.277000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.277000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.277000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.277000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.277000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.277000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:33.277000 audit: BPF prog-id=114 op=LOAD Nov 1 00:44:33.277000 audit[2532]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00038c028 items=0 ppid=2480 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:33.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353466356334346531373137326337656466333335636165333231 Nov 1 00:44:33.569273 kubelet[1438]: I1101 00:44:33.569185 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-24g42" podStartSLOduration=15.255899686 podStartE2EDuration="20.569160215s" podCreationTimestamp="2025-11-01 00:44:13 +0000 UTC" firstStartedPulling="2025-11-01 00:44:27.851885973 +0000 UTC m=+33.392431841" lastFinishedPulling="2025-11-01 00:44:33.165146483 +0000 UTC m=+38.705692370" observedRunningTime="2025-11-01 00:44:33.568828162 +0000 UTC m=+39.109374055" watchObservedRunningTime="2025-11-01 00:44:33.569160215 +0000 UTC m=+39.109706139" Nov 1 00:44:34.226180 kubelet[1438]: E1101 00:44:34.226115 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:34.678694 update_engine[1184]: I1101 00:44:34.678328 1184 update_attempter.cc:509] Updating boot flags... Nov 1 00:44:35.227353 kubelet[1438]: E1101 00:44:35.227287 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:36.181405 kubelet[1438]: E1101 00:44:36.181328 1438 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:36.228272 kubelet[1438]: E1101 00:44:36.228216 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:36.234000 audit[2595]: NETFILTER_CFG table=filter:71 family=2 entries=26 op=nft_register_rule pid=2595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:44:36.234000 audit[2595]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffd97088fe0 a2=0 a3=7ffd97088fcc items=0 ppid=1591 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:36.234000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:44:36.239000 audit[2595]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=2595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:44:36.239000 audit[2595]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd97088fe0 a2=0 a3=0 items=0 ppid=1591 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:36.239000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:44:36.253000 audit[2598]: NETFILTER_CFG table=filter:73 family=2 entries=38 op=nft_register_rule pid=2598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:44:36.253000 audit[2598]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffe483c72b0 a2=0 a3=7ffe483c729c items=0 ppid=1591 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:36.253000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:44:36.258000 audit[2598]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=2598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:44:36.258000 audit[2598]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe483c72b0 a2=0 a3=0 items=0 ppid=1591 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:36.258000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:44:36.335554 systemd[1]: Created slice kubepods-besteffort-pod64ae1d52_0d0f_4feb_ad5e_93661daa5959.slice. Nov 1 00:44:36.423552 kubelet[1438]: I1101 00:44:36.423467 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5hf96\" (UniqueName: \"kubernetes.io/projected/64ae1d52-0d0f-4feb-ad5e-93661daa5959-kube-api-access-5hf96\") pod \"nfs-server-provisioner-0\" (UID: \"64ae1d52-0d0f-4feb-ad5e-93661daa5959\") " pod="default/nfs-server-provisioner-0" Nov 1 00:44:36.423552 kubelet[1438]: I1101 00:44:36.423523 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/64ae1d52-0d0f-4feb-ad5e-93661daa5959-data\") pod \"nfs-server-provisioner-0\" (UID: \"64ae1d52-0d0f-4feb-ad5e-93661daa5959\") " pod="default/nfs-server-provisioner-0" Nov 1 00:44:36.641178 env[1192]: time="2025-11-01T00:44:36.640422913Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:64ae1d52-0d0f-4feb-ad5e-93661daa5959,Namespace:default,Attempt:0,}" Nov 1 00:44:36.831863 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:44:36.832496 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Nov 1 00:44:36.829244 systemd-networkd[1010]: cali60e51b789ff: Link UP Nov 1 00:44:36.831968 systemd-networkd[1010]: cali60e51b789ff: Gained carrier Nov 1 00:44:36.854027 env[1192]: 2025-11-01 00:44:36.710 [INFO][2600] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {146.190.149.44-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 64ae1d52-0d0f-4feb-ad5e-93661daa5959 1491 0 2025-11-01 00:44:36 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 146.190.149.44 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.149.44-k8s-nfs--server--provisioner--0-" Nov 1 00:44:36.854027 env[1192]: 2025-11-01 00:44:36.711 [INFO][2600] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.149.44-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:44:36.854027 env[1192]: 2025-11-01 00:44:36.753 [INFO][2613] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc" HandleID="k8s-pod-network.f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc" Workload="146.190.149.44-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:44:36.854027 env[1192]: 2025-11-01 00:44:36.753 [INFO][2613] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc" HandleID="k8s-pod-network.f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc" Workload="146.190.149.44-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000325750), Attrs:map[string]string{"namespace":"default", "node":"146.190.149.44", "pod":"nfs-server-provisioner-0", "timestamp":"2025-11-01 00:44:36.753216626 +0000 UTC"}, Hostname:"146.190.149.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:44:36.854027 env[1192]: 2025-11-01 00:44:36.753 [INFO][2613] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:44:36.854027 env[1192]: 2025-11-01 00:44:36.753 [INFO][2613] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:44:36.854027 env[1192]: 2025-11-01 00:44:36.753 [INFO][2613] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '146.190.149.44' Nov 1 00:44:36.854027 env[1192]: 2025-11-01 00:44:36.763 [INFO][2613] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc" host="146.190.149.44" Nov 1 00:44:36.854027 env[1192]: 2025-11-01 00:44:36.772 [INFO][2613] ipam/ipam.go 394: Looking up existing affinities for host host="146.190.149.44" Nov 1 00:44:36.854027 env[1192]: 2025-11-01 00:44:36.783 [INFO][2613] ipam/ipam.go 511: Trying affinity for 192.168.61.192/26 host="146.190.149.44" Nov 1 00:44:36.854027 env[1192]: 2025-11-01 00:44:36.787 [INFO][2613] ipam/ipam.go 158: Attempting to load block cidr=192.168.61.192/26 host="146.190.149.44" Nov 1 00:44:36.854027 env[1192]: 2025-11-01 00:44:36.803 [INFO][2613] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.61.192/26 host="146.190.149.44" Nov 1 00:44:36.854027 env[1192]: 2025-11-01 00:44:36.803 [INFO][2613] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.61.192/26 handle="k8s-pod-network.f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc" host="146.190.149.44" Nov 1 00:44:36.854027 env[1192]: 2025-11-01 00:44:36.806 [INFO][2613] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc Nov 1 00:44:36.854027 env[1192]: 2025-11-01 00:44:36.811 [INFO][2613] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.61.192/26 handle="k8s-pod-network.f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc" host="146.190.149.44" Nov 1 00:44:36.854027 env[1192]: 2025-11-01 00:44:36.819 [INFO][2613] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.61.195/26] block=192.168.61.192/26 handle="k8s-pod-network.f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc" host="146.190.149.44" Nov 1 00:44:36.854027 env[1192]: 2025-11-01 00:44:36.819 [INFO][2613] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.61.195/26] handle="k8s-pod-network.f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc" host="146.190.149.44" Nov 1 00:44:36.854027 env[1192]: 2025-11-01 00:44:36.819 [INFO][2613] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:44:36.854027 env[1192]: 2025-11-01 00:44:36.820 [INFO][2613] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.61.195/26] IPv6=[] ContainerID="f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc" HandleID="k8s-pod-network.f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc" Workload="146.190.149.44-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:44:36.854856 env[1192]: 2025-11-01 00:44:36.823 [INFO][2600] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.149.44-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.149.44-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"64ae1d52-0d0f-4feb-ad5e-93661daa5959", ResourceVersion:"1491", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 44, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.149.44", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.61.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:44:36.854856 env[1192]: 2025-11-01 00:44:36.823 [INFO][2600] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.61.195/32] ContainerID="f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.149.44-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:44:36.854856 env[1192]: 2025-11-01 00:44:36.823 [INFO][2600] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.149.44-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:44:36.854856 env[1192]: 2025-11-01 00:44:36.833 [INFO][2600] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.149.44-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:44:36.855121 env[1192]: 2025-11-01 00:44:36.835 [INFO][2600] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.149.44-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.149.44-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"64ae1d52-0d0f-4feb-ad5e-93661daa5959", ResourceVersion:"1491", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 44, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.149.44", ContainerID:"f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.61.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"26:34:e3:b4:6b:bd", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:44:36.855121 env[1192]: 2025-11-01 00:44:36.851 [INFO][2600] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.149.44-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:44:36.882953 env[1192]: time="2025-11-01T00:44:36.880207575Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:44:36.882953 env[1192]: time="2025-11-01T00:44:36.881017899Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:44:36.882953 env[1192]: time="2025-11-01T00:44:36.881035848Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:44:36.882953 env[1192]: time="2025-11-01T00:44:36.881265106Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc pid=2634 runtime=io.containerd.runc.v2 Nov 1 00:44:36.881000 audit[2639]: NETFILTER_CFG table=filter:75 family=2 entries=40 op=nft_register_chain pid=2639 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:44:36.881000 audit[2639]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7fffaf812aa0 a2=0 a3=7fffaf812a8c items=0 ppid=2129 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:36.881000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:44:36.912911 systemd[1]: Started cri-containerd-f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc.scope. Nov 1 00:44:36.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.933000 audit: BPF prog-id=115 op=LOAD Nov 1 00:44:36.934000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.934000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2634 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:36.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636386665653061366461646637383037323965646564326439386232 Nov 1 00:44:36.935000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.935000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2634 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:36.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636386665653061366461646637383037323965646564326439386232 Nov 1 00:44:36.935000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.935000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.935000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.935000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.935000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.935000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.935000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.935000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.935000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.935000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.935000 audit: BPF prog-id=116 op=LOAD Nov 1 00:44:36.935000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021e8c0 items=0 ppid=2634 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:36.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636386665653061366461646637383037323965646564326439386232 Nov 1 00:44:36.936000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.936000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.936000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.936000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.936000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.936000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.936000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.936000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.936000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.936000 audit: BPF prog-id=117 op=LOAD Nov 1 00:44:36.936000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021e908 items=0 ppid=2634 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:36.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636386665653061366461646637383037323965646564326439386232 Nov 1 00:44:36.937000 audit: BPF prog-id=117 op=UNLOAD Nov 1 00:44:36.937000 audit: BPF prog-id=116 op=UNLOAD Nov 1 00:44:36.937000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.937000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.937000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.937000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.937000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.937000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.937000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.937000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.937000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.937000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:36.937000 audit: BPF prog-id=118 op=LOAD Nov 1 00:44:36.937000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021ed18 items=0 ppid=2634 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:36.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636386665653061366461646637383037323965646564326439386232 Nov 1 00:44:36.984162 env[1192]: time="2025-11-01T00:44:36.984106782Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:64ae1d52-0d0f-4feb-ad5e-93661daa5959,Namespace:default,Attempt:0,} returns sandbox id \"f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc\"" Nov 1 00:44:36.986870 env[1192]: time="2025-11-01T00:44:36.986800007Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Nov 1 00:44:37.228995 kubelet[1438]: E1101 00:44:37.228833 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:37.543868 systemd[1]: run-containerd-runc-k8s.io-f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc-runc.Yrqn3X.mount: Deactivated successfully. Nov 1 00:44:38.229479 kubelet[1438]: E1101 00:44:38.229389 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:38.478185 systemd-networkd[1010]: cali60e51b789ff: Gained IPv6LL Nov 1 00:44:39.230067 kubelet[1438]: E1101 00:44:39.230000 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:39.749042 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1957849165.mount: Deactivated successfully. Nov 1 00:44:40.230412 kubelet[1438]: E1101 00:44:40.230348 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:41.231550 kubelet[1438]: E1101 00:44:41.231486 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:42.232395 kubelet[1438]: E1101 00:44:42.232315 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:42.846233 env[1192]: time="2025-11-01T00:44:42.846165788Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:42.850413 env[1192]: time="2025-11-01T00:44:42.850365971Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:42.854305 env[1192]: time="2025-11-01T00:44:42.854256516Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:42.855945 env[1192]: time="2025-11-01T00:44:42.855901792Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:44:42.857008 env[1192]: time="2025-11-01T00:44:42.856959737Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Nov 1 00:44:42.860214 env[1192]: time="2025-11-01T00:44:42.859432332Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:44:42.869180 env[1192]: time="2025-11-01T00:44:42.869099833Z" level=info msg="CreateContainer within sandbox \"f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Nov 1 00:44:42.882090 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3211822232.mount: Deactivated successfully. Nov 1 00:44:42.889584 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2625546504.mount: Deactivated successfully. Nov 1 00:44:42.894567 env[1192]: time="2025-11-01T00:44:42.894505618Z" level=info msg="CreateContainer within sandbox \"f68fee0a6dadf780729eded2d98b2b275f624735c6f68d7ad62ae7d987c609bc\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"bbab92f4ffbe8ff3c85e5b0f9d9b2e8c3b54677707c53bf4ef8a0b33ff247a50\"" Nov 1 00:44:42.895893 env[1192]: time="2025-11-01T00:44:42.895838544Z" level=info msg="StartContainer for \"bbab92f4ffbe8ff3c85e5b0f9d9b2e8c3b54677707c53bf4ef8a0b33ff247a50\"" Nov 1 00:44:42.919972 systemd[1]: Started cri-containerd-bbab92f4ffbe8ff3c85e5b0f9d9b2e8c3b54677707c53bf4ef8a0b33ff247a50.scope. Nov 1 00:44:42.969169 kernel: kauditd_printk_skb: 119 callbacks suppressed Nov 1 00:44:42.969390 kernel: audit: type=1400 audit(1761957882.960:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.969798 kernel: audit: type=1400 audit(1761957882.960:743): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.981866 kernel: audit: type=1400 audit(1761957882.960:744): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.981998 kernel: audit: type=1400 audit(1761957882.960:745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.993487 kernel: audit: type=1400 audit(1761957882.960:746): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.993635 kernel: audit: type=1400 audit(1761957882.960:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:43.012558 kernel: audit: type=1400 audit(1761957882.960:748): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:43.012815 kernel: audit: type=1400 audit(1761957882.960:749): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:43.019737 kernel: audit: type=1400 audit(1761957882.960:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:43.019880 kernel: audit: type=1400 audit(1761957882.967:751): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.967000 audit: BPF prog-id=119 op=LOAD Nov 1 00:44:42.968000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.968000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2634 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:42.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262616239326634666662653866663363383565356230663964396232 Nov 1 00:44:42.968000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.968000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2634 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:42.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262616239326634666662653866663363383565356230663964396232 Nov 1 00:44:42.968000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.968000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.968000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.968000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.968000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.968000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.968000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.968000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.968000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.968000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.968000 audit: BPF prog-id=120 op=LOAD Nov 1 00:44:42.968000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003a30d0 items=0 ppid=2634 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:42.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262616239326634666662653866663363383565356230663964396232 Nov 1 00:44:42.974000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.974000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.974000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.974000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.974000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.974000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.974000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.974000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.974000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.974000 audit: BPF prog-id=121 op=LOAD Nov 1 00:44:42.974000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003a3118 items=0 ppid=2634 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:42.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262616239326634666662653866663363383565356230663964396232 Nov 1 00:44:42.992000 audit: BPF prog-id=121 op=UNLOAD Nov 1 00:44:42.992000 audit: BPF prog-id=120 op=UNLOAD Nov 1 00:44:42.992000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.992000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.992000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.992000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.992000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.992000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.992000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.992000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.992000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.992000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:44:42.992000 audit: BPF prog-id=122 op=LOAD Nov 1 00:44:42.992000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a3528 items=0 ppid=2634 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:42.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262616239326634666662653866663363383565356230663964396232 Nov 1 00:44:43.054272 env[1192]: time="2025-11-01T00:44:43.054207307Z" level=info msg="StartContainer for \"bbab92f4ffbe8ff3c85e5b0f9d9b2e8c3b54677707c53bf4ef8a0b33ff247a50\" returns successfully" Nov 1 00:44:43.098000 audit[2718]: AVC avc: denied { search } for pid=2718 comm="rpcbind" name="crypto" dev="proc" ino=22817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c263,c664 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 00:44:43.098000 audit[2718]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fa6752f50c0 a2=0 a3=0 items=0 ppid=2699 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c263,c664 key=(null) Nov 1 00:44:43.098000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Nov 1 00:44:43.139000 audit[2723]: AVC avc: denied { search } for pid=2723 comm="dbus-daemon" name="crypto" dev="proc" ino=22817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c263,c664 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 00:44:43.139000 audit[2723]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fc211a300c0 a2=0 a3=0 items=0 ppid=2699 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c263,c664 key=(null) Nov 1 00:44:43.139000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Nov 1 00:44:43.142000 audit[2724]: AVC avc: denied { watch } for pid=2724 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537418 scontext=system_u:system_r:svirt_lxc_net_t:s0:c263,c664 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c263,c664 tclass=dir permissive=0 Nov 1 00:44:43.142000 audit[2724]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55c7b1633c10 a2=2c8 a3=7ffd00a24e8c items=0 ppid=2699 pid=2724 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c263,c664 key=(null) Nov 1 00:44:43.142000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Nov 1 00:44:43.147000 audit[2725]: AVC avc: denied { read } for pid=2725 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22848 scontext=system_u:system_r:svirt_lxc_net_t:s0:c263,c664 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Nov 1 00:44:43.147000 audit[2725]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f4891749320 a1=80000 a2=d a3=7ffc113a8e90 items=0 ppid=2699 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c263,c664 key=(null) Nov 1 00:44:43.147000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Nov 1 00:44:43.148000 audit[2725]: AVC avc: denied { search } for pid=2725 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c263,c664 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 00:44:43.148000 audit[2725]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f4890c9d0c0 a2=0 a3=0 items=0 ppid=2699 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c263,c664 key=(null) Nov 1 00:44:43.148000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Nov 1 00:44:43.166407 env[1192]: time="2025-11-01T00:44:43.166353672Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:44:43.167738 env[1192]: time="2025-11-01T00:44:43.167643600Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:44:43.168502 kubelet[1438]: E1101 00:44:43.168357 1438 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:44:43.170680 kubelet[1438]: E1101 00:44:43.170339 1438 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:44:43.170680 kubelet[1438]: E1101 00:44:43.170594 1438 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-zqwx5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-k59zw_calico-system(783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:44:43.172951 env[1192]: time="2025-11-01T00:44:43.172901464Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:44:43.232740 kubelet[1438]: E1101 00:44:43.232686 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:43.455808 env[1192]: time="2025-11-01T00:44:43.455715014Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:44:43.456751 env[1192]: time="2025-11-01T00:44:43.456678064Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:44:43.457074 kubelet[1438]: E1101 00:44:43.456999 1438 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:44:43.457148 kubelet[1438]: E1101 00:44:43.457079 1438 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:44:43.457727 kubelet[1438]: E1101 00:44:43.457590 1438 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-zqwx5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-k59zw_calico-system(783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:44:43.459178 kubelet[1438]: E1101 00:44:43.459033 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-k59zw" podUID="783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676" Nov 1 00:44:43.624000 audit[2745]: NETFILTER_CFG table=filter:76 family=2 entries=26 op=nft_register_rule pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:44:43.624000 audit[2745]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc8b5cb370 a2=0 a3=7ffc8b5cb35c items=0 ppid=1591 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:43.624000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:44:43.635000 audit[2745]: NETFILTER_CFG table=nat:77 family=2 entries=104 op=nft_register_chain pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:44:43.635000 audit[2745]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffc8b5cb370 a2=0 a3=7ffc8b5cb35c items=0 ppid=1591 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:43.635000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:44:44.234132 kubelet[1438]: E1101 00:44:44.234060 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:45.234551 kubelet[1438]: E1101 00:44:45.234476 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:46.235024 kubelet[1438]: E1101 00:44:46.234939 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:47.235702 kubelet[1438]: E1101 00:44:47.235611 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:48.236781 kubelet[1438]: E1101 00:44:48.236696 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:48.307949 kubelet[1438]: I1101 00:44:48.307734 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=6.435031417 podStartE2EDuration="12.307701684s" podCreationTimestamp="2025-11-01 00:44:36 +0000 UTC" firstStartedPulling="2025-11-01 00:44:36.986077193 +0000 UTC m=+42.526623061" lastFinishedPulling="2025-11-01 00:44:42.858747457 +0000 UTC m=+48.399293328" observedRunningTime="2025-11-01 00:44:43.602267412 +0000 UTC m=+49.142813317" watchObservedRunningTime="2025-11-01 00:44:48.307701684 +0000 UTC m=+53.848247574" Nov 1 00:44:48.317648 systemd[1]: Created slice kubepods-besteffort-pod65b5f7fc_29bf_4d09_a08a_c128d86652ee.slice. Nov 1 00:44:48.415742 kubelet[1438]: I1101 00:44:48.415685 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7g8mc\" (UniqueName: \"kubernetes.io/projected/65b5f7fc-29bf-4d09-a08a-c128d86652ee-kube-api-access-7g8mc\") pod \"test-pod-1\" (UID: \"65b5f7fc-29bf-4d09-a08a-c128d86652ee\") " pod="default/test-pod-1" Nov 1 00:44:48.416166 kubelet[1438]: I1101 00:44:48.416141 1438 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-d12a0394-7a6d-49c4-a591-0ab69fb6e733\" (UniqueName: \"kubernetes.io/nfs/65b5f7fc-29bf-4d09-a08a-c128d86652ee-pvc-d12a0394-7a6d-49c4-a591-0ab69fb6e733\") pod \"test-pod-1\" (UID: \"65b5f7fc-29bf-4d09-a08a-c128d86652ee\") " pod="default/test-pod-1" Nov 1 00:44:48.544641 kernel: Failed to create system directory netfs Nov 1 00:44:48.544822 kernel: kauditd_printk_skb: 68 callbacks suppressed Nov 1 00:44:48.544855 kernel: audit: type=1400 audit(1761957888.539:767): avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.539000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.552846 kernel: Failed to create system directory netfs Nov 1 00:44:48.552992 kernel: audit: type=1400 audit(1761957888.539:767): avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.539000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.561007 kernel: Failed to create system directory netfs Nov 1 00:44:48.561162 kernel: audit: type=1400 audit(1761957888.539:767): avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.539000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.569276 kernel: Failed to create system directory netfs Nov 1 00:44:48.569441 kernel: audit: type=1400 audit(1761957888.539:767): avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.539000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.539000 audit[2751]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5580ba8075e0 a1=153bc a2=55808c52f2b0 a3=5 items=0 ppid=57 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:48.539000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:44:48.594855 kernel: audit: type=1300 audit(1761957888.539:767): arch=c000003e syscall=175 success=yes exit=0 a0=5580ba8075e0 a1=153bc a2=55808c52f2b0 a3=5 items=0 ppid=57 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:48.595002 kernel: audit: type=1327 audit(1761957888.539:767): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:44:48.587000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.597645 kernel: Failed to create system directory fscache Nov 1 00:44:48.597682 kernel: audit: type=1400 audit(1761957888.587:768): avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.605779 kernel: Failed to create system directory fscache Nov 1 00:44:48.605959 kernel: audit: type=1400 audit(1761957888.587:768): avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.587000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.612101 kernel: Failed to create system directory fscache Nov 1 00:44:48.619991 kernel: audit: type=1400 audit(1761957888.587:768): avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.620116 kernel: Failed to create system directory fscache Nov 1 00:44:48.587000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.627967 kernel: audit: type=1400 audit(1761957888.587:768): avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.628132 kernel: Failed to create system directory fscache Nov 1 00:44:48.587000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.587000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.629736 kernel: Failed to create system directory fscache Nov 1 00:44:48.587000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.587000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.632949 kernel: Failed to create system directory fscache Nov 1 00:44:48.633033 kernel: Failed to create system directory fscache Nov 1 00:44:48.587000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.587000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.636405 kernel: Failed to create system directory fscache Nov 1 00:44:48.636505 kernel: Failed to create system directory fscache Nov 1 00:44:48.587000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.587000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.639845 kernel: Failed to create system directory fscache Nov 1 00:44:48.639916 kernel: Failed to create system directory fscache Nov 1 00:44:48.587000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.587000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.643023 kernel: Failed to create system directory fscache Nov 1 00:44:48.643151 kernel: Failed to create system directory fscache Nov 1 00:44:48.587000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.647662 kernel: FS-Cache: Loaded Nov 1 00:44:48.587000 audit[2751]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5580baa1c9c0 a1=4c0fc a2=55808c52f2b0 a3=5 items=0 ppid=57 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:48.587000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.700125 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.700244 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.700276 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.703311 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.703397 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.706395 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.706483 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.709652 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.709734 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.713129 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.713218 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.716883 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.716971 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.720354 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.720467 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.723814 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.723927 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.727022 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.727133 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.728665 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.731723 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.731845 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.734911 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.734991 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.738116 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.738240 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.741414 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.741499 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.744601 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.744749 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.747925 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.748079 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.752916 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.753001 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.753033 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.756263 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.756395 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.759611 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.759781 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.762981 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.763214 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.767998 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.768096 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.768122 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.771201 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.771357 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.774594 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.774673 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.776419 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.779749 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.779868 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.782891 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.783108 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.786311 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.786453 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.789591 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.789708 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.791348 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.794776 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.794895 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.798828 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.798958 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.802898 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.803150 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.806361 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.806499 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.809503 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.809641 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.811132 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.813008 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.814604 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.816212 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.817890 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.819459 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.822489 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.822574 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.823965 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.825587 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.827081 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.828869 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.830344 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.831980 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.833515 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.835453 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.837148 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.839306 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.840846 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.842536 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.844126 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.845937 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.847609 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.849118 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.850755 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.853978 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.854093 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.855494 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.857035 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.858555 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.862197 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.862308 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.863861 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.865420 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.867018 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.868782 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.870334 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.871903 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.873380 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.875053 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.876742 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.878351 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.879840 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.881510 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.883044 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.884574 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.886051 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.887750 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.889203 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.890766 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.892347 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.900316 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.901847 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.903482 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.906559 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.906699 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.908084 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.909648 kernel: Failed to create system directory sunrpc Nov 1 00:44:48.677000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.926600 kernel: RPC: Registered named UNIX socket transport module. Nov 1 00:44:48.926763 kernel: RPC: Registered udp transport module. Nov 1 00:44:48.926838 kernel: RPC: Registered tcp transport module. Nov 1 00:44:48.928068 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Nov 1 00:44:48.677000 audit[2751]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5580baa68ad0 a1=1a8274 a2=55808c52f2b0 a3=5 items=6 ppid=57 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:48.677000 audit: CWD cwd="/" Nov 1 00:44:48.677000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:44:48.677000 audit: PATH item=1 name=(null) inode=23569 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:44:48.677000 audit: PATH item=2 name=(null) inode=23569 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:44:48.677000 audit: PATH item=3 name=(null) inode=23570 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:44:48.677000 audit: PATH item=4 name=(null) inode=23569 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:44:48.677000 audit: PATH item=5 name=(null) inode=23571 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:44:48.677000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.989128 kernel: Failed to create system directory nfs Nov 1 00:44:48.989254 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.990935 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.992767 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.994722 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.996678 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.998406 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.000020 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.001718 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.003551 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.005700 kernel: Failed to create system directory nfs Nov 1 00:44:49.007641 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.011666 kernel: Failed to create system directory nfs Nov 1 00:44:49.011736 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.012657 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.015730 kernel: Failed to create system directory nfs Nov 1 00:44:49.015809 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.019597 kernel: Failed to create system directory nfs Nov 1 00:44:49.019693 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.023389 kernel: Failed to create system directory nfs Nov 1 00:44:49.023479 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.027122 kernel: Failed to create system directory nfs Nov 1 00:44:49.027254 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.030880 kernel: Failed to create system directory nfs Nov 1 00:44:49.030994 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.034615 kernel: Failed to create system directory nfs Nov 1 00:44:49.034732 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.038400 kernel: Failed to create system directory nfs Nov 1 00:44:49.038510 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.042151 kernel: Failed to create system directory nfs Nov 1 00:44:49.042280 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.045922 kernel: Failed to create system directory nfs Nov 1 00:44:49.046047 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.049653 kernel: Failed to create system directory nfs Nov 1 00:44:49.049758 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.057912 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.062255 kernel: Failed to create system directory nfs Nov 1 00:44:49.062526 kernel: Failed to create system directory nfs Nov 1 00:44:49.062567 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.066322 kernel: Failed to create system directory nfs Nov 1 00:44:49.066406 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.068294 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.070172 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.073832 kernel: Failed to create system directory nfs Nov 1 00:44:49.073946 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.077474 kernel: Failed to create system directory nfs Nov 1 00:44:49.077634 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.081112 kernel: Failed to create system directory nfs Nov 1 00:44:49.081220 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.084772 kernel: Failed to create system directory nfs Nov 1 00:44:49.084884 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.088485 kernel: Failed to create system directory nfs Nov 1 00:44:49.088603 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.092297 kernel: Failed to create system directory nfs Nov 1 00:44:49.092430 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.096089 kernel: Failed to create system directory nfs Nov 1 00:44:49.096208 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.100061 kernel: Failed to create system directory nfs Nov 1 00:44:49.100190 kernel: Failed to create system directory nfs Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:48.971000 audit[2751]: AVC avc: denied { confidentiality } for pid=2751 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.104029 kernel: Failed to create system directory nfs Nov 1 00:44:49.136430 kernel: FS-Cache: Netfs 'nfs' registered for caching Nov 1 00:44:48.971000 audit[2751]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5580bac89c10 a1=16eb2c a2=55808c52f2b0 a3=5 items=0 ppid=57 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:48.971000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.207832 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.207923 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.209466 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.209530 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.211341 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.214601 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.214715 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.217774 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.217880 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.221480 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.221593 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.224808 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.225007 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.226430 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.229649 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.229802 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.233161 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.233407 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.236739 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.236967 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.238414 kubelet[1438]: E1101 00:44:49.238370 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.240175 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.240294 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.243571 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.243705 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.246685 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.246796 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.249706 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.249803 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.251293 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.254389 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.254481 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.256040 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.259091 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.259211 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.262457 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.262556 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.263985 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.265578 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.267116 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.268606 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.270373 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.271937 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.273524 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.276781 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.276895 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.278251 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.279907 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.281758 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.284728 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.284855 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.287767 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.287872 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.289337 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.290826 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.292417 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.295511 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.295660 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.298847 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.298968 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.300385 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.304869 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.304996 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.310588 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.310716 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.310791 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.314229 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.314330 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.315894 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.319046 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.319146 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.322259 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.322381 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.325944 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.326085 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.329673 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.329794 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.331415 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.334942 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.335031 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.338347 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.338440 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.340115 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.341980 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.345339 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.345448 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.348601 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.348701 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.350222 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.351971 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.353729 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.355604 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.359328 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.359401 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.183000 audit[2756]: AVC avc: denied { confidentiality } for pid=2756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.362991 kernel: Failed to create system directory nfs4 Nov 1 00:44:49.506958 kernel: NFS: Registering the id_resolver key type Nov 1 00:44:49.507156 kernel: Key type id_resolver registered Nov 1 00:44:49.507199 kernel: Key type id_legacy registered Nov 1 00:44:49.183000 audit[2756]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f61e3c5c010 a1=2095c4 a2=55c1ca5022b0 a3=5 items=0 ppid=57 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:49.183000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.530779 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.531012 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.532809 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.534649 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.536510 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.540051 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.540128 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.541925 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.543794 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.545595 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.555766 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.555855 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.557730 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.559635 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.559714 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.561169 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.562829 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.564477 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.566058 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.569572 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.569654 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.572886 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.572962 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.574437 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.576103 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.522000 audit[2757]: AVC avc: denied { confidentiality } for pid=2757 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:44:49.579435 kernel: Failed to create system directory rpcgss Nov 1 00:44:49.522000 audit[2757]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fc268ab2010 a1=70bf4 a2=560f6b8662b0 a3=5 items=0 ppid=57 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:44:49.522000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Nov 1 00:44:50.238944 kubelet[1438]: E1101 00:44:50.238859 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:51.239819 kubelet[1438]: E1101 00:44:51.239757 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:51.543689 systemd[1]: run-containerd-runc-k8s.io-9325f7885cdb74f3fb53e015532898e086e772cd295b98abbac237fb57190706-runc.NiLO0a.mount: Deactivated successfully. Nov 1 00:44:51.640604 kubelet[1438]: E1101 00:44:51.640003 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Nov 1 00:44:52.241013 kubelet[1438]: E1101 00:44:52.240931 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:53.241748 kubelet[1438]: E1101 00:44:53.241686 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:54.242353 kubelet[1438]: E1101 00:44:54.242232 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:54.434703 kubelet[1438]: E1101 00:44:54.434646 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-k59zw" podUID="783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676" Nov 1 00:44:55.242950 kubelet[1438]: E1101 00:44:55.242855 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:55.742851 nfsidmap[2764]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-5dc6352429' Nov 1 00:44:56.181268 kubelet[1438]: E1101 00:44:56.181190 1438 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:56.244077 kubelet[1438]: E1101 00:44:56.243685 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:56.244576 env[1192]: time="2025-11-01T00:44:56.244064874Z" level=info msg="StopPodSandbox for \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\"" Nov 1 00:44:56.360531 env[1192]: 2025-11-01 00:44:56.305 [WARNING][2795] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"171afe9b-a064-414a-9990-169d6c02e8cb", ResourceVersion:"1462", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 44, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.149.44", ContainerID:"851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd", Pod:"nginx-deployment-7fcdb87857-24g42", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.61.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali258d290c1e8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:44:56.360531 env[1192]: 2025-11-01 00:44:56.306 [INFO][2795] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Nov 1 00:44:56.360531 env[1192]: 2025-11-01 00:44:56.306 [INFO][2795] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" iface="eth0" netns="" Nov 1 00:44:56.360531 env[1192]: 2025-11-01 00:44:56.306 [INFO][2795] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Nov 1 00:44:56.360531 env[1192]: 2025-11-01 00:44:56.306 [INFO][2795] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Nov 1 00:44:56.360531 env[1192]: 2025-11-01 00:44:56.339 [INFO][2803] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" HandleID="k8s-pod-network.080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Workload="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0" Nov 1 00:44:56.360531 env[1192]: 2025-11-01 00:44:56.339 [INFO][2803] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:44:56.360531 env[1192]: 2025-11-01 00:44:56.339 [INFO][2803] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:44:56.360531 env[1192]: 2025-11-01 00:44:56.351 [WARNING][2803] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" HandleID="k8s-pod-network.080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Workload="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0" Nov 1 00:44:56.360531 env[1192]: 2025-11-01 00:44:56.351 [INFO][2803] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" HandleID="k8s-pod-network.080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Workload="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0" Nov 1 00:44:56.360531 env[1192]: 2025-11-01 00:44:56.357 [INFO][2803] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:44:56.360531 env[1192]: 2025-11-01 00:44:56.358 [INFO][2795] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Nov 1 00:44:56.361084 env[1192]: time="2025-11-01T00:44:56.360567832Z" level=info msg="TearDown network for sandbox \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\" successfully" Nov 1 00:44:56.361084 env[1192]: time="2025-11-01T00:44:56.360611391Z" level=info msg="StopPodSandbox for \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\" returns successfully" Nov 1 00:44:56.364929 env[1192]: time="2025-11-01T00:44:56.364873690Z" level=info msg="RemovePodSandbox for \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\"" Nov 1 00:44:56.365087 env[1192]: time="2025-11-01T00:44:56.364922010Z" level=info msg="Forcibly stopping sandbox \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\"" Nov 1 00:44:56.474835 env[1192]: 2025-11-01 00:44:56.423 [WARNING][2818] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"171afe9b-a064-414a-9990-169d6c02e8cb", ResourceVersion:"1462", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 44, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.149.44", ContainerID:"851237923b156d70a3ef0cc61d553409215c5d7364f6ddffabe57c053c4b9afd", Pod:"nginx-deployment-7fcdb87857-24g42", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.61.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali258d290c1e8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:44:56.474835 env[1192]: 2025-11-01 00:44:56.423 [INFO][2818] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Nov 1 00:44:56.474835 env[1192]: 2025-11-01 00:44:56.423 [INFO][2818] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" iface="eth0" netns="" Nov 1 00:44:56.474835 env[1192]: 2025-11-01 00:44:56.423 [INFO][2818] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Nov 1 00:44:56.474835 env[1192]: 2025-11-01 00:44:56.423 [INFO][2818] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Nov 1 00:44:56.474835 env[1192]: 2025-11-01 00:44:56.461 [INFO][2827] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" HandleID="k8s-pod-network.080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Workload="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0" Nov 1 00:44:56.474835 env[1192]: 2025-11-01 00:44:56.461 [INFO][2827] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:44:56.474835 env[1192]: 2025-11-01 00:44:56.461 [INFO][2827] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:44:56.474835 env[1192]: 2025-11-01 00:44:56.469 [WARNING][2827] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" HandleID="k8s-pod-network.080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Workload="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0" Nov 1 00:44:56.474835 env[1192]: 2025-11-01 00:44:56.469 [INFO][2827] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" HandleID="k8s-pod-network.080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Workload="146.190.149.44-k8s-nginx--deployment--7fcdb87857--24g42-eth0" Nov 1 00:44:56.474835 env[1192]: 2025-11-01 00:44:56.471 [INFO][2827] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:44:56.474835 env[1192]: 2025-11-01 00:44:56.472 [INFO][2818] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85" Nov 1 00:44:56.474835 env[1192]: time="2025-11-01T00:44:56.474768362Z" level=info msg="TearDown network for sandbox \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\" successfully" Nov 1 00:44:56.481110 env[1192]: time="2025-11-01T00:44:56.481045512Z" level=info msg="RemovePodSandbox \"080edbd1e2a115568ccb6ae6a9a3c7623f5cdbbdeb522abecaa6ab9b65d8fc85\" returns successfully" Nov 1 00:44:56.481830 env[1192]: time="2025-11-01T00:44:56.481798187Z" level=info msg="StopPodSandbox for \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\"" Nov 1 00:44:56.579159 env[1192]: 2025-11-01 00:44:56.536 [WARNING][2843] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.149.44-k8s-csi--node--driver--k59zw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676", ResourceVersion:"1610", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.149.44", ContainerID:"0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a", Pod:"csi-node-driver-k59zw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.61.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali424be299207", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:44:56.579159 env[1192]: 2025-11-01 00:44:56.536 [INFO][2843] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Nov 1 00:44:56.579159 env[1192]: 2025-11-01 00:44:56.536 [INFO][2843] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" iface="eth0" netns="" Nov 1 00:44:56.579159 env[1192]: 2025-11-01 00:44:56.537 [INFO][2843] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Nov 1 00:44:56.579159 env[1192]: 2025-11-01 00:44:56.537 [INFO][2843] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Nov 1 00:44:56.579159 env[1192]: 2025-11-01 00:44:56.565 [INFO][2850] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" HandleID="k8s-pod-network.67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Workload="146.190.149.44-k8s-csi--node--driver--k59zw-eth0" Nov 1 00:44:56.579159 env[1192]: 2025-11-01 00:44:56.565 [INFO][2850] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:44:56.579159 env[1192]: 2025-11-01 00:44:56.565 [INFO][2850] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:44:56.579159 env[1192]: 2025-11-01 00:44:56.573 [WARNING][2850] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" HandleID="k8s-pod-network.67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Workload="146.190.149.44-k8s-csi--node--driver--k59zw-eth0" Nov 1 00:44:56.579159 env[1192]: 2025-11-01 00:44:56.573 [INFO][2850] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" HandleID="k8s-pod-network.67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Workload="146.190.149.44-k8s-csi--node--driver--k59zw-eth0" Nov 1 00:44:56.579159 env[1192]: 2025-11-01 00:44:56.576 [INFO][2850] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:44:56.579159 env[1192]: 2025-11-01 00:44:56.577 [INFO][2843] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Nov 1 00:44:56.580332 env[1192]: time="2025-11-01T00:44:56.580271659Z" level=info msg="TearDown network for sandbox \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\" successfully" Nov 1 00:44:56.580712 env[1192]: time="2025-11-01T00:44:56.580680477Z" level=info msg="StopPodSandbox for \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\" returns successfully" Nov 1 00:44:56.581492 env[1192]: time="2025-11-01T00:44:56.581461286Z" level=info msg="RemovePodSandbox for \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\"" Nov 1 00:44:56.581807 env[1192]: time="2025-11-01T00:44:56.581748722Z" level=info msg="Forcibly stopping sandbox \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\"" Nov 1 00:44:56.684368 env[1192]: 2025-11-01 00:44:56.632 [WARNING][2864] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.149.44-k8s-csi--node--driver--k59zw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676", ResourceVersion:"1610", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 43, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.149.44", ContainerID:"0fc0f4936830584cced434a8556d6c1daaa4505e33a824b999390379e4d74b3a", Pod:"csi-node-driver-k59zw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.61.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali424be299207", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:44:56.684368 env[1192]: 2025-11-01 00:44:56.633 [INFO][2864] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Nov 1 00:44:56.684368 env[1192]: 2025-11-01 00:44:56.633 [INFO][2864] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" iface="eth0" netns="" Nov 1 00:44:56.684368 env[1192]: 2025-11-01 00:44:56.633 [INFO][2864] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Nov 1 00:44:56.684368 env[1192]: 2025-11-01 00:44:56.633 [INFO][2864] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Nov 1 00:44:56.684368 env[1192]: 2025-11-01 00:44:56.667 [INFO][2872] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" HandleID="k8s-pod-network.67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Workload="146.190.149.44-k8s-csi--node--driver--k59zw-eth0" Nov 1 00:44:56.684368 env[1192]: 2025-11-01 00:44:56.667 [INFO][2872] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:44:56.684368 env[1192]: 2025-11-01 00:44:56.668 [INFO][2872] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:44:56.684368 env[1192]: 2025-11-01 00:44:56.678 [WARNING][2872] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" HandleID="k8s-pod-network.67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Workload="146.190.149.44-k8s-csi--node--driver--k59zw-eth0" Nov 1 00:44:56.684368 env[1192]: 2025-11-01 00:44:56.678 [INFO][2872] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" HandleID="k8s-pod-network.67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Workload="146.190.149.44-k8s-csi--node--driver--k59zw-eth0" Nov 1 00:44:56.684368 env[1192]: 2025-11-01 00:44:56.681 [INFO][2872] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:44:56.684368 env[1192]: 2025-11-01 00:44:56.682 [INFO][2864] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5" Nov 1 00:44:56.685125 env[1192]: time="2025-11-01T00:44:56.684372550Z" level=info msg="TearDown network for sandbox \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\" successfully" Nov 1 00:44:56.687786 env[1192]: time="2025-11-01T00:44:56.687728962Z" level=info msg="RemovePodSandbox \"67e6af9c5c9309bbfb71bb238c29f42f1cf2d2325dd1118124b0daaa631d40b5\" returns successfully" Nov 1 00:44:57.244849 kubelet[1438]: E1101 00:44:57.244768 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:58.245045 kubelet[1438]: E1101 00:44:58.244982 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:44:59.246747 kubelet[1438]: E1101 00:44:59.246678 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:45:00.247901 kubelet[1438]: E1101 00:45:00.247816 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:45:01.248911 kubelet[1438]: E1101 00:45:01.248828 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:45:01.888865 nfsidmap[2785]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-5dc6352429' Nov 1 00:45:01.923107 kernel: kauditd_printk_skb: 333 callbacks suppressed Nov 1 00:45:01.923257 kernel: audit: type=1400 audit(1761957901.909:773): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2604 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:45:01.923298 kernel: audit: type=1400 audit(1761957901.909:774): avc: denied { watch_reads } for pid=1259 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2604 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:45:01.909000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2604 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:45:01.909000 audit[1259]: AVC avc: denied { watch_reads } for pid=1259 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2604 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:45:01.909000 audit[1259]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56181fcccc90 a2=10 a3=2f0c79e18d1e406c items=0 ppid=1 pid=1259 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:45:01.947673 kernel: audit: type=1300 audit(1761957901.909:774): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56181fcccc90 a2=10 a3=2f0c79e18d1e406c items=0 ppid=1 pid=1259 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:45:01.909000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 00:45:01.961429 kernel: audit: type=1327 audit(1761957901.909:774): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 00:45:01.961581 kernel: audit: type=1400 audit(1761957901.909:775): avc: denied { watch_reads } for pid=1259 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2604 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:45:01.909000 audit[1259]: AVC avc: denied { watch_reads } for pid=1259 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2604 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:45:01.909000 audit[1259]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56181fcccc90 a2=10 a3=2f0c79e18d1e406c items=0 ppid=1 pid=1259 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:45:01.972922 kernel: audit: type=1300 audit(1761957901.909:775): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56181fcccc90 a2=10 a3=2f0c79e18d1e406c items=0 ppid=1 pid=1259 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:45:01.972984 kernel: audit: type=1327 audit(1761957901.909:775): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 00:45:01.909000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 00:45:01.909000 audit[1259]: AVC avc: denied { watch_reads } for pid=1259 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2604 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:45:01.986973 kernel: audit: type=1400 audit(1761957901.909:776): avc: denied { watch_reads } for pid=1259 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2604 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:45:01.987163 kernel: audit: type=1300 audit(1761957901.909:776): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56181fcccc90 a2=10 a3=2f0c79e18d1e406c items=0 ppid=1 pid=1259 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:45:01.909000 audit[1259]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56181fcccc90 a2=10 a3=2f0c79e18d1e406c items=0 ppid=1 pid=1259 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:45:02.004058 kernel: audit: type=1327 audit(1761957901.909:776): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 00:45:01.909000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 00:45:01.922000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2604 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:45:01.922000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2604 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:45:02.124276 env[1192]: time="2025-11-01T00:45:02.124182265Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:65b5f7fc-29bf-4d09-a08a-c128d86652ee,Namespace:default,Attempt:0,}" Nov 1 00:45:02.249933 kubelet[1438]: E1101 00:45:02.249820 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:45:02.396910 systemd-networkd[1010]: cali5ec59c6bf6e: Link UP Nov 1 00:45:02.406896 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:45:02.407319 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Nov 1 00:45:02.406739 systemd-networkd[1010]: cali5ec59c6bf6e: Gained carrier Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.237 [INFO][2911] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {146.190.149.44-k8s-test--pod--1-eth0 default 65b5f7fc-29bf-4d09-a08a-c128d86652ee 1584 0 2025-11-01 00:44:36 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 146.190.149.44 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.149.44-k8s-test--pod--1-" Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.237 [INFO][2911] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.149.44-k8s-test--pod--1-eth0" Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.287 [INFO][2922] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8" HandleID="k8s-pod-network.4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8" Workload="146.190.149.44-k8s-test--pod--1-eth0" Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.287 [INFO][2922] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8" HandleID="k8s-pod-network.4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8" Workload="146.190.149.44-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad650), Attrs:map[string]string{"namespace":"default", "node":"146.190.149.44", "pod":"test-pod-1", "timestamp":"2025-11-01 00:45:02.287280472 +0000 UTC"}, Hostname:"146.190.149.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.288 [INFO][2922] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.288 [INFO][2922] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.288 [INFO][2922] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '146.190.149.44' Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.302 [INFO][2922] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8" host="146.190.149.44" Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.316 [INFO][2922] ipam/ipam.go 394: Looking up existing affinities for host host="146.190.149.44" Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.328 [INFO][2922] ipam/ipam.go 511: Trying affinity for 192.168.61.192/26 host="146.190.149.44" Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.335 [INFO][2922] ipam/ipam.go 158: Attempting to load block cidr=192.168.61.192/26 host="146.190.149.44" Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.341 [INFO][2922] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.61.192/26 host="146.190.149.44" Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.341 [INFO][2922] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.61.192/26 handle="k8s-pod-network.4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8" host="146.190.149.44" Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.346 [INFO][2922] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8 Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.364 [INFO][2922] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.61.192/26 handle="k8s-pod-network.4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8" host="146.190.149.44" Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.386 [INFO][2922] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.61.196/26] block=192.168.61.192/26 handle="k8s-pod-network.4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8" host="146.190.149.44" Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.386 [INFO][2922] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.61.196/26] handle="k8s-pod-network.4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8" host="146.190.149.44" Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.386 [INFO][2922] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.386 [INFO][2922] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.61.196/26] IPv6=[] ContainerID="4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8" HandleID="k8s-pod-network.4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8" Workload="146.190.149.44-k8s-test--pod--1-eth0" Nov 1 00:45:02.451104 env[1192]: 2025-11-01 00:45:02.390 [INFO][2911] cni-plugin/k8s.go 418: Populated endpoint ContainerID="4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.149.44-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.149.44-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"65b5f7fc-29bf-4d09-a08a-c128d86652ee", ResourceVersion:"1584", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 44, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.149.44", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.61.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:45:02.452316 env[1192]: 2025-11-01 00:45:02.390 [INFO][2911] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.61.196/32] ContainerID="4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.149.44-k8s-test--pod--1-eth0" Nov 1 00:45:02.452316 env[1192]: 2025-11-01 00:45:02.390 [INFO][2911] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.149.44-k8s-test--pod--1-eth0" Nov 1 00:45:02.452316 env[1192]: 2025-11-01 00:45:02.413 [INFO][2911] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.149.44-k8s-test--pod--1-eth0" Nov 1 00:45:02.452316 env[1192]: 2025-11-01 00:45:02.413 [INFO][2911] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.149.44-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.149.44-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"65b5f7fc-29bf-4d09-a08a-c128d86652ee", ResourceVersion:"1584", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 44, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.149.44", ContainerID:"4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.61.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"6e:3f:42:c2:31:b4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:45:02.452316 env[1192]: 2025-11-01 00:45:02.443 [INFO][2911] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.149.44-k8s-test--pod--1-eth0" Nov 1 00:45:02.477000 audit[2939]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=2939 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:45:02.477000 audit[2939]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fff239e4780 a2=0 a3=7fff239e476c items=0 ppid=2129 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:45:02.477000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:45:02.478658 env[1192]: time="2025-11-01T00:45:02.478514315Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:45:02.478722 env[1192]: time="2025-11-01T00:45:02.478677941Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:45:02.478775 env[1192]: time="2025-11-01T00:45:02.478739024Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:45:02.479762 env[1192]: time="2025-11-01T00:45:02.479580446Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8 pid=2946 runtime=io.containerd.runc.v2 Nov 1 00:45:02.528321 systemd[1]: Started cri-containerd-4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8.scope. Nov 1 00:45:02.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.565000 audit: BPF prog-id=123 op=LOAD Nov 1 00:45:02.566000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.566000 audit[2957]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2946 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:45:02.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466333133396363323063376639366265613638333765373830666439 Nov 1 00:45:02.566000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.566000 audit[2957]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2946 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:45:02.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466333133396363323063376639366265613638333765373830666439 Nov 1 00:45:02.566000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.566000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.566000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.566000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.566000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.566000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.566000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.566000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.566000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.566000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.566000 audit: BPF prog-id=124 op=LOAD Nov 1 00:45:02.566000 audit[2957]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000323e20 items=0 ppid=2946 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:45:02.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466333133396363323063376639366265613638333765373830666439 Nov 1 00:45:02.567000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.567000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.567000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.567000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.567000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.567000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.567000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.567000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.567000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.567000 audit: BPF prog-id=125 op=LOAD Nov 1 00:45:02.567000 audit[2957]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000323e68 items=0 ppid=2946 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:45:02.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466333133396363323063376639366265613638333765373830666439 Nov 1 00:45:02.567000 audit: BPF prog-id=125 op=UNLOAD Nov 1 00:45:02.567000 audit: BPF prog-id=124 op=UNLOAD Nov 1 00:45:02.567000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.567000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.567000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.567000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.567000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.567000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.567000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.567000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.567000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.567000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:02.567000 audit: BPF prog-id=126 op=LOAD Nov 1 00:45:02.567000 audit[2957]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00038a278 items=0 ppid=2946 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:45:02.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466333133396363323063376639366265613638333765373830666439 Nov 1 00:45:02.627509 env[1192]: time="2025-11-01T00:45:02.627347029Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:65b5f7fc-29bf-4d09-a08a-c128d86652ee,Namespace:default,Attempt:0,} returns sandbox id \"4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8\"" Nov 1 00:45:02.631139 env[1192]: time="2025-11-01T00:45:02.631077662Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Nov 1 00:45:02.993907 env[1192]: time="2025-11-01T00:45:02.993812631Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:45:03.000581 env[1192]: time="2025-11-01T00:45:03.000501342Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:45:03.006231 env[1192]: time="2025-11-01T00:45:03.005919191Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:45:03.012674 env[1192]: time="2025-11-01T00:45:03.011450224Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:45:03.019957 env[1192]: time="2025-11-01T00:45:03.019885738Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9\"" Nov 1 00:45:03.029677 env[1192]: time="2025-11-01T00:45:03.029575112Z" level=info msg="CreateContainer within sandbox \"4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8\" for container &ContainerMetadata{Name:test,Attempt:0,}" Nov 1 00:45:03.051115 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3498276985.mount: Deactivated successfully. Nov 1 00:45:03.075792 env[1192]: time="2025-11-01T00:45:03.075549143Z" level=info msg="CreateContainer within sandbox \"4f3139cc20c7f96bea6837e780fd96370a71d956726e59fa863b8671814a16e8\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"72f901158eac3dd9cd81ecbfb12594e582f6b6c7e32629b96bb31fe85ec41c41\"" Nov 1 00:45:03.077525 env[1192]: time="2025-11-01T00:45:03.077370958Z" level=info msg="StartContainer for \"72f901158eac3dd9cd81ecbfb12594e582f6b6c7e32629b96bb31fe85ec41c41\"" Nov 1 00:45:03.113744 systemd[1]: Started cri-containerd-72f901158eac3dd9cd81ecbfb12594e582f6b6c7e32629b96bb31fe85ec41c41.scope. Nov 1 00:45:03.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.144000 audit: BPF prog-id=127 op=LOAD Nov 1 00:45:03.147000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.147000 audit[2989]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2946 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:45:03.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732663930313135386561633364643963643831656362666231323539 Nov 1 00:45:03.147000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.147000 audit[2989]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2946 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:45:03.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732663930313135386561633364643963643831656362666231323539 Nov 1 00:45:03.148000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.148000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.148000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.148000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.148000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.148000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.148000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.148000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.148000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.148000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.148000 audit: BPF prog-id=128 op=LOAD Nov 1 00:45:03.148000 audit[2989]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003470f0 items=0 ppid=2946 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:45:03.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732663930313135386561633364643963643831656362666231323539 Nov 1 00:45:03.149000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.149000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.149000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.149000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.149000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.149000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.149000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.149000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.149000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.149000 audit: BPF prog-id=129 op=LOAD Nov 1 00:45:03.149000 audit[2989]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000347138 items=0 ppid=2946 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:45:03.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732663930313135386561633364643963643831656362666231323539 Nov 1 00:45:03.150000 audit: BPF prog-id=129 op=UNLOAD Nov 1 00:45:03.150000 audit: BPF prog-id=128 op=UNLOAD Nov 1 00:45:03.150000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.150000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.150000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.150000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.150000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.150000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.150000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.150000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.150000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.150000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:45:03.150000 audit: BPF prog-id=130 op=LOAD Nov 1 00:45:03.150000 audit[2989]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000347548 items=0 ppid=2946 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:45:03.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732663930313135386561633364643963643831656362666231323539 Nov 1 00:45:03.183329 env[1192]: time="2025-11-01T00:45:03.182835760Z" level=info msg="StartContainer for \"72f901158eac3dd9cd81ecbfb12594e582f6b6c7e32629b96bb31fe85ec41c41\" returns successfully" Nov 1 00:45:03.250996 kubelet[1438]: E1101 00:45:03.250798 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:45:03.676339 kubelet[1438]: I1101 00:45:03.676257 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=27.285311605 podStartE2EDuration="27.676231407s" podCreationTimestamp="2025-11-01 00:44:36 +0000 UTC" firstStartedPulling="2025-11-01 00:45:02.630487604 +0000 UTC m=+68.171033480" lastFinishedPulling="2025-11-01 00:45:03.021407412 +0000 UTC m=+68.561953282" observedRunningTime="2025-11-01 00:45:03.676209605 +0000 UTC m=+69.216755496" watchObservedRunningTime="2025-11-01 00:45:03.676231407 +0000 UTC m=+69.216777322" Nov 1 00:45:03.864075 systemd-networkd[1010]: cali5ec59c6bf6e: Gained IPv6LL Nov 1 00:45:04.251883 kubelet[1438]: E1101 00:45:04.251824 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:45:05.253330 kubelet[1438]: E1101 00:45:05.253208 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:45:06.253550 kubelet[1438]: E1101 00:45:06.253448 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:45:06.438302 env[1192]: time="2025-11-01T00:45:06.438222877Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:45:06.740717 env[1192]: time="2025-11-01T00:45:06.740605171Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:45:06.741980 env[1192]: time="2025-11-01T00:45:06.741899640Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:45:06.742318 kubelet[1438]: E1101 00:45:06.742244 1438 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:45:06.742421 kubelet[1438]: E1101 00:45:06.742319 1438 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:45:06.742681 kubelet[1438]: E1101 00:45:06.742585 1438 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-zqwx5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-k59zw_calico-system(783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:45:06.745603 env[1192]: time="2025-11-01T00:45:06.745539875Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:45:07.046741 env[1192]: time="2025-11-01T00:45:07.045868932Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:45:07.047145 env[1192]: time="2025-11-01T00:45:07.047089645Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:45:07.047675 kubelet[1438]: E1101 00:45:07.047588 1438 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:45:07.047825 kubelet[1438]: E1101 00:45:07.047797 1438 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:45:07.049651 kubelet[1438]: E1101 00:45:07.048489 1438 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-zqwx5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-k59zw_calico-system(783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:45:07.055216 kubelet[1438]: E1101 00:45:07.055129 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-k59zw" podUID="783e6c0a-ea22-45e9-ba9a-fb5f6bd9b676" Nov 1 00:45:07.254143 kubelet[1438]: E1101 00:45:07.254065 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:45:08.254883 kubelet[1438]: E1101 00:45:08.254762 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:45:09.256096 kubelet[1438]: E1101 00:45:09.256023 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:45:10.256807 kubelet[1438]: E1101 00:45:10.256746 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:45:11.258338 kubelet[1438]: E1101 00:45:11.258288 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:45:12.259122 kubelet[1438]: E1101 00:45:12.259052 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"