Nov 1 00:49:18.193944 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Oct 31 23:02:53 -00 2025 Nov 1 00:49:18.194004 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 Nov 1 00:49:18.194023 kernel: BIOS-provided physical RAM map: Nov 1 00:49:18.194036 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Nov 1 00:49:18.194049 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Nov 1 00:49:18.194063 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Nov 1 00:49:18.194085 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Nov 1 00:49:18.194099 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Nov 1 00:49:18.194114 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd26afff] usable Nov 1 00:49:18.194128 kernel: BIOS-e820: [mem 0x00000000bd26b000-0x00000000bd275fff] ACPI data Nov 1 00:49:18.194142 kernel: BIOS-e820: [mem 0x00000000bd276000-0x00000000bf8ecfff] usable Nov 1 00:49:18.194156 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Nov 1 00:49:18.194171 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Nov 1 00:49:18.194186 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Nov 1 00:49:18.194208 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Nov 1 00:49:18.194224 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Nov 1 00:49:18.194239 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Nov 1 00:49:18.194255 kernel: NX (Execute Disable) protection: active Nov 1 00:49:18.194271 kernel: efi: EFI v2.70 by EDK II Nov 1 00:49:18.194286 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbd327018 RNG=0xbfb73018 TPMEventLog=0xbd26b018 Nov 1 00:49:18.194302 kernel: random: crng init done Nov 1 00:49:18.194317 kernel: SMBIOS 2.4 present. Nov 1 00:49:18.194337 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 Nov 1 00:49:18.194352 kernel: Hypervisor detected: KVM Nov 1 00:49:18.194367 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Nov 1 00:49:18.194383 kernel: kvm-clock: cpu 0, msr 20e1a0001, primary cpu clock Nov 1 00:49:18.194399 kernel: kvm-clock: using sched offset of 13902703433 cycles Nov 1 00:49:18.194415 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Nov 1 00:49:18.194431 kernel: tsc: Detected 2299.998 MHz processor Nov 1 00:49:18.194447 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Nov 1 00:49:18.194464 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Nov 1 00:49:18.194479 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Nov 1 00:49:18.194499 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Nov 1 00:49:18.194515 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Nov 1 00:49:18.194531 kernel: Using GB pages for direct mapping Nov 1 00:49:18.194546 kernel: Secure boot disabled Nov 1 00:49:18.194562 kernel: ACPI: Early table checksum verification disabled Nov 1 00:49:18.194578 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Nov 1 00:49:18.194594 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Nov 1 00:49:18.194609 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Nov 1 00:49:18.194637 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Nov 1 00:49:18.194654 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Nov 1 00:49:18.194671 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20250404) Nov 1 00:49:18.194688 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Nov 1 00:49:18.194706 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Nov 1 00:49:18.194723 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Nov 1 00:49:18.194753 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Nov 1 00:49:18.194771 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Nov 1 00:49:18.194788 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Nov 1 00:49:18.194818 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Nov 1 00:49:18.194836 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Nov 1 00:49:18.194853 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Nov 1 00:49:18.194870 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Nov 1 00:49:18.194887 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Nov 1 00:49:18.194904 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Nov 1 00:49:18.194926 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Nov 1 00:49:18.194944 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Nov 1 00:49:18.194960 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Nov 1 00:49:18.194978 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Nov 1 00:49:18.194994 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Nov 1 00:49:18.195012 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Nov 1 00:49:18.195029 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Nov 1 00:49:18.195046 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Nov 1 00:49:18.195063 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Nov 1 00:49:18.195084 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Nov 1 00:49:18.195102 kernel: Zone ranges: Nov 1 00:49:18.195119 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Nov 1 00:49:18.195136 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Nov 1 00:49:18.195153 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Nov 1 00:49:18.195170 kernel: Movable zone start for each node Nov 1 00:49:18.195186 kernel: Early memory node ranges Nov 1 00:49:18.195202 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Nov 1 00:49:18.195219 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Nov 1 00:49:18.195241 kernel: node 0: [mem 0x0000000000100000-0x00000000bd26afff] Nov 1 00:49:18.195258 kernel: node 0: [mem 0x00000000bd276000-0x00000000bf8ecfff] Nov 1 00:49:18.195275 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Nov 1 00:49:18.195292 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Nov 1 00:49:18.195323 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Nov 1 00:49:18.195340 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Nov 1 00:49:18.195357 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Nov 1 00:49:18.195374 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Nov 1 00:49:18.195391 kernel: On node 0, zone DMA32: 11 pages in unavailable ranges Nov 1 00:49:18.195412 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Nov 1 00:49:18.195430 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Nov 1 00:49:18.195447 kernel: ACPI: PM-Timer IO Port: 0xb008 Nov 1 00:49:18.195464 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Nov 1 00:49:18.195480 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Nov 1 00:49:18.195497 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Nov 1 00:49:18.195513 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Nov 1 00:49:18.195530 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Nov 1 00:49:18.195548 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Nov 1 00:49:18.195569 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Nov 1 00:49:18.195587 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Nov 1 00:49:18.195604 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Nov 1 00:49:18.195621 kernel: Booting paravirtualized kernel on KVM Nov 1 00:49:18.195639 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Nov 1 00:49:18.195656 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Nov 1 00:49:18.195674 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Nov 1 00:49:18.195691 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Nov 1 00:49:18.195707 kernel: pcpu-alloc: [0] 0 1 Nov 1 00:49:18.195728 kernel: kvm-guest: PV spinlocks enabled Nov 1 00:49:18.195753 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Nov 1 00:49:18.195769 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932269 Nov 1 00:49:18.195786 kernel: Policy zone: Normal Nov 1 00:49:18.198123 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 Nov 1 00:49:18.198153 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Nov 1 00:49:18.198171 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Nov 1 00:49:18.198337 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Nov 1 00:49:18.198363 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Nov 1 00:49:18.198381 kernel: Memory: 7515408K/7860540K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 344872K reserved, 0K cma-reserved) Nov 1 00:49:18.198399 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Nov 1 00:49:18.198551 kernel: Kernel/User page tables isolation: enabled Nov 1 00:49:18.198568 kernel: ftrace: allocating 34614 entries in 136 pages Nov 1 00:49:18.198585 kernel: ftrace: allocated 136 pages with 2 groups Nov 1 00:49:18.198603 kernel: rcu: Hierarchical RCU implementation. Nov 1 00:49:18.198621 kernel: rcu: RCU event tracing is enabled. Nov 1 00:49:18.198782 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Nov 1 00:49:18.198818 kernel: Rude variant of Tasks RCU enabled. Nov 1 00:49:18.198936 kernel: Tracing variant of Tasks RCU enabled. Nov 1 00:49:18.198954 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Nov 1 00:49:18.198976 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Nov 1 00:49:18.198994 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Nov 1 00:49:18.199012 kernel: Console: colour dummy device 80x25 Nov 1 00:49:18.199029 kernel: printk: console [ttyS0] enabled Nov 1 00:49:18.199048 kernel: ACPI: Core revision 20210730 Nov 1 00:49:18.199065 kernel: APIC: Switch to symmetric I/O mode setup Nov 1 00:49:18.199084 kernel: x2apic enabled Nov 1 00:49:18.199106 kernel: Switched APIC routing to physical x2apic. Nov 1 00:49:18.199124 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Nov 1 00:49:18.199142 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Nov 1 00:49:18.199160 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Nov 1 00:49:18.199178 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Nov 1 00:49:18.199194 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Nov 1 00:49:18.199210 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Nov 1 00:49:18.199231 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Nov 1 00:49:18.199246 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Nov 1 00:49:18.199275 kernel: Spectre V2 : Mitigation: IBRS Nov 1 00:49:18.199299 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Nov 1 00:49:18.199324 kernel: RETBleed: Mitigation: IBRS Nov 1 00:49:18.199343 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Nov 1 00:49:18.199368 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Nov 1 00:49:18.199387 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Nov 1 00:49:18.199402 kernel: MDS: Mitigation: Clear CPU buffers Nov 1 00:49:18.199425 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Nov 1 00:49:18.199449 kernel: active return thunk: its_return_thunk Nov 1 00:49:18.199466 kernel: ITS: Mitigation: Aligned branch/return thunks Nov 1 00:49:18.199483 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Nov 1 00:49:18.199501 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Nov 1 00:49:18.199524 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Nov 1 00:49:18.199541 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Nov 1 00:49:18.199558 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Nov 1 00:49:18.199576 kernel: Freeing SMP alternatives memory: 32K Nov 1 00:49:18.199598 kernel: pid_max: default: 32768 minimum: 301 Nov 1 00:49:18.199615 kernel: LSM: Security Framework initializing Nov 1 00:49:18.199631 kernel: SELinux: Initializing. Nov 1 00:49:18.199649 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Nov 1 00:49:18.199666 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Nov 1 00:49:18.199683 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Nov 1 00:49:18.199701 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Nov 1 00:49:18.199718 kernel: signal: max sigframe size: 1776 Nov 1 00:49:18.199742 kernel: rcu: Hierarchical SRCU implementation. Nov 1 00:49:18.199764 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Nov 1 00:49:18.199780 kernel: smp: Bringing up secondary CPUs ... Nov 1 00:49:18.199818 kernel: x86: Booting SMP configuration: Nov 1 00:49:18.199836 kernel: .... node #0, CPUs: #1 Nov 1 00:49:18.199853 kernel: kvm-clock: cpu 1, msr 20e1a0041, secondary cpu clock Nov 1 00:49:18.199872 kernel: Transient Scheduler Attacks: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Nov 1 00:49:18.199891 kernel: Transient Scheduler Attacks: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Nov 1 00:49:18.199907 kernel: smp: Brought up 1 node, 2 CPUs Nov 1 00:49:18.199929 kernel: smpboot: Max logical packages: 1 Nov 1 00:49:18.199946 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Nov 1 00:49:18.199969 kernel: devtmpfs: initialized Nov 1 00:49:18.199985 kernel: x86/mm: Memory block size: 128MB Nov 1 00:49:18.200003 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Nov 1 00:49:18.200020 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Nov 1 00:49:18.200037 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Nov 1 00:49:18.200058 kernel: pinctrl core: initialized pinctrl subsystem Nov 1 00:49:18.200075 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Nov 1 00:49:18.200097 kernel: audit: initializing netlink subsys (disabled) Nov 1 00:49:18.200114 kernel: audit: type=2000 audit(1761958156.627:1): state=initialized audit_enabled=0 res=1 Nov 1 00:49:18.200131 kernel: thermal_sys: Registered thermal governor 'step_wise' Nov 1 00:49:18.200148 kernel: thermal_sys: Registered thermal governor 'user_space' Nov 1 00:49:18.200165 kernel: cpuidle: using governor menu Nov 1 00:49:18.200181 kernel: ACPI: bus type PCI registered Nov 1 00:49:18.200198 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Nov 1 00:49:18.200215 kernel: dca service started, version 1.12.1 Nov 1 00:49:18.200232 kernel: PCI: Using configuration type 1 for base access Nov 1 00:49:18.200253 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Nov 1 00:49:18.200271 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Nov 1 00:49:18.200288 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Nov 1 00:49:18.200305 kernel: ACPI: Added _OSI(Module Device) Nov 1 00:49:18.200322 kernel: ACPI: Added _OSI(Processor Device) Nov 1 00:49:18.200339 kernel: ACPI: Added _OSI(Processor Aggregator Device) Nov 1 00:49:18.200356 kernel: ACPI: Added _OSI(Linux-Dell-Video) Nov 1 00:49:18.200378 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Nov 1 00:49:18.200395 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Nov 1 00:49:18.200422 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Nov 1 00:49:18.200440 kernel: ACPI: Interpreter enabled Nov 1 00:49:18.200457 kernel: ACPI: PM: (supports S0 S3 S5) Nov 1 00:49:18.200473 kernel: ACPI: Using IOAPIC for interrupt routing Nov 1 00:49:18.200490 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Nov 1 00:49:18.200508 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Nov 1 00:49:18.200525 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Nov 1 00:49:18.200818 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Nov 1 00:49:18.201000 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Nov 1 00:49:18.201022 kernel: PCI host bridge to bus 0000:00 Nov 1 00:49:18.201187 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Nov 1 00:49:18.201337 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Nov 1 00:49:18.201484 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Nov 1 00:49:18.201631 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Nov 1 00:49:18.201783 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Nov 1 00:49:18.203890 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Nov 1 00:49:18.204093 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Nov 1 00:49:18.204272 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Nov 1 00:49:18.204436 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Nov 1 00:49:18.204615 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Nov 1 00:49:18.204795 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Nov 1 00:49:18.204984 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Nov 1 00:49:18.205155 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Nov 1 00:49:18.205320 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Nov 1 00:49:18.205498 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Nov 1 00:49:18.205671 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Nov 1 00:49:18.205854 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Nov 1 00:49:18.206016 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Nov 1 00:49:18.206042 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Nov 1 00:49:18.206059 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Nov 1 00:49:18.206075 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Nov 1 00:49:18.206092 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Nov 1 00:49:18.206109 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Nov 1 00:49:18.206125 kernel: iommu: Default domain type: Translated Nov 1 00:49:18.206142 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Nov 1 00:49:18.206159 kernel: vgaarb: loaded Nov 1 00:49:18.206175 kernel: pps_core: LinuxPPS API ver. 1 registered Nov 1 00:49:18.206196 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Nov 1 00:49:18.206214 kernel: PTP clock support registered Nov 1 00:49:18.206230 kernel: Registered efivars operations Nov 1 00:49:18.206247 kernel: PCI: Using ACPI for IRQ routing Nov 1 00:49:18.206264 kernel: PCI: pci_cache_line_size set to 64 bytes Nov 1 00:49:18.206280 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Nov 1 00:49:18.206296 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Nov 1 00:49:18.206312 kernel: e820: reserve RAM buffer [mem 0xbd26b000-0xbfffffff] Nov 1 00:49:18.206333 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Nov 1 00:49:18.206349 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Nov 1 00:49:18.206364 kernel: clocksource: Switched to clocksource kvm-clock Nov 1 00:49:18.206381 kernel: VFS: Disk quotas dquot_6.6.0 Nov 1 00:49:18.206397 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Nov 1 00:49:18.206413 kernel: pnp: PnP ACPI init Nov 1 00:49:18.206430 kernel: pnp: PnP ACPI: found 7 devices Nov 1 00:49:18.206447 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Nov 1 00:49:18.206465 kernel: NET: Registered PF_INET protocol family Nov 1 00:49:18.206487 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Nov 1 00:49:18.206503 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Nov 1 00:49:18.206520 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Nov 1 00:49:18.206537 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Nov 1 00:49:18.206554 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Nov 1 00:49:18.206570 kernel: TCP: Hash tables configured (established 65536 bind 65536) Nov 1 00:49:18.206587 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Nov 1 00:49:18.206604 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Nov 1 00:49:18.206621 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Nov 1 00:49:18.206645 kernel: NET: Registered PF_XDP protocol family Nov 1 00:49:18.206821 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Nov 1 00:49:18.206974 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Nov 1 00:49:18.207125 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Nov 1 00:49:18.207570 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Nov 1 00:49:18.208167 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Nov 1 00:49:18.208196 kernel: PCI: CLS 0 bytes, default 64 Nov 1 00:49:18.208219 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Nov 1 00:49:18.208235 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) Nov 1 00:49:18.208250 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Nov 1 00:49:18.208266 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Nov 1 00:49:18.208282 kernel: clocksource: Switched to clocksource tsc Nov 1 00:49:18.208297 kernel: Initialise system trusted keyrings Nov 1 00:49:18.208312 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Nov 1 00:49:18.208327 kernel: Key type asymmetric registered Nov 1 00:49:18.208342 kernel: Asymmetric key parser 'x509' registered Nov 1 00:49:18.208363 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Nov 1 00:49:18.208380 kernel: io scheduler mq-deadline registered Nov 1 00:49:18.208397 kernel: io scheduler kyber registered Nov 1 00:49:18.208414 kernel: io scheduler bfq registered Nov 1 00:49:18.208430 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Nov 1 00:49:18.208448 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Nov 1 00:49:18.214984 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Nov 1 00:49:18.215027 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Nov 1 00:49:18.215220 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Nov 1 00:49:18.215255 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Nov 1 00:49:18.216644 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Nov 1 00:49:18.216677 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Nov 1 00:49:18.216696 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Nov 1 00:49:18.216714 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Nov 1 00:49:18.216731 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Nov 1 00:49:18.216748 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Nov 1 00:49:18.217002 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Nov 1 00:49:18.217038 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Nov 1 00:49:18.217057 kernel: i8042: Warning: Keylock active Nov 1 00:49:18.217076 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Nov 1 00:49:18.217093 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Nov 1 00:49:18.217268 kernel: rtc_cmos 00:00: RTC can wake from S4 Nov 1 00:49:18.217433 kernel: rtc_cmos 00:00: registered as rtc0 Nov 1 00:49:18.217610 kernel: rtc_cmos 00:00: setting system clock to 2025-11-01T00:49:17 UTC (1761958157) Nov 1 00:49:18.217770 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Nov 1 00:49:18.217813 kernel: intel_pstate: CPU model not supported Nov 1 00:49:18.217833 kernel: pstore: Registered efi as persistent store backend Nov 1 00:49:18.217852 kernel: NET: Registered PF_INET6 protocol family Nov 1 00:49:18.217877 kernel: Segment Routing with IPv6 Nov 1 00:49:18.217895 kernel: In-situ OAM (IOAM) with IPv6 Nov 1 00:49:18.217913 kernel: NET: Registered PF_PACKET protocol family Nov 1 00:49:18.217932 kernel: Key type dns_resolver registered Nov 1 00:49:18.217949 kernel: IPI shorthand broadcast: enabled Nov 1 00:49:18.217968 kernel: sched_clock: Marking stable (766706860, 136989711)->(926963411, -23266840) Nov 1 00:49:18.217990 kernel: registered taskstats version 1 Nov 1 00:49:18.218006 kernel: Loading compiled-in X.509 certificates Nov 1 00:49:18.218024 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Nov 1 00:49:18.218043 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: f2055682e6899ad8548fd369019e7b47939b46a0' Nov 1 00:49:18.218061 kernel: Key type .fscrypt registered Nov 1 00:49:18.218079 kernel: Key type fscrypt-provisioning registered Nov 1 00:49:18.218097 kernel: pstore: Using crash dump compression: deflate Nov 1 00:49:18.218116 kernel: ima: Allocated hash algorithm: sha1 Nov 1 00:49:18.218139 kernel: ima: No architecture policies found Nov 1 00:49:18.218157 kernel: clk: Disabling unused clocks Nov 1 00:49:18.218176 kernel: Freeing unused kernel image (initmem) memory: 47496K Nov 1 00:49:18.218194 kernel: Write protecting the kernel read-only data: 28672k Nov 1 00:49:18.218212 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Nov 1 00:49:18.218230 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Nov 1 00:49:18.218248 kernel: Run /init as init process Nov 1 00:49:18.218266 kernel: with arguments: Nov 1 00:49:18.218284 kernel: /init Nov 1 00:49:18.218302 kernel: with environment: Nov 1 00:49:18.218324 kernel: HOME=/ Nov 1 00:49:18.218342 kernel: TERM=linux Nov 1 00:49:18.218361 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Nov 1 00:49:18.218383 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 1 00:49:18.218406 systemd[1]: Detected virtualization kvm. Nov 1 00:49:18.218426 systemd[1]: Detected architecture x86-64. Nov 1 00:49:18.218445 systemd[1]: Running in initrd. Nov 1 00:49:18.218468 systemd[1]: No hostname configured, using default hostname. Nov 1 00:49:18.218494 systemd[1]: Hostname set to . Nov 1 00:49:18.218514 systemd[1]: Initializing machine ID from VM UUID. Nov 1 00:49:18.218533 systemd[1]: Queued start job for default target initrd.target. Nov 1 00:49:18.218552 systemd[1]: Started systemd-ask-password-console.path. Nov 1 00:49:18.218570 systemd[1]: Reached target cryptsetup.target. Nov 1 00:49:18.218588 systemd[1]: Reached target paths.target. Nov 1 00:49:18.218606 systemd[1]: Reached target slices.target. Nov 1 00:49:18.218629 systemd[1]: Reached target swap.target. Nov 1 00:49:18.218649 systemd[1]: Reached target timers.target. Nov 1 00:49:18.218669 systemd[1]: Listening on iscsid.socket. Nov 1 00:49:18.218689 systemd[1]: Listening on iscsiuio.socket. Nov 1 00:49:18.218708 systemd[1]: Listening on systemd-journald-audit.socket. Nov 1 00:49:18.218728 systemd[1]: Listening on systemd-journald-dev-log.socket. Nov 1 00:49:18.218747 systemd[1]: Listening on systemd-journald.socket. Nov 1 00:49:18.218766 systemd[1]: Listening on systemd-networkd.socket. Nov 1 00:49:18.218790 systemd[1]: Listening on systemd-udevd-control.socket. Nov 1 00:49:18.221940 systemd[1]: Listening on systemd-udevd-kernel.socket. Nov 1 00:49:18.221991 systemd[1]: Reached target sockets.target. Nov 1 00:49:18.222016 systemd[1]: Starting kmod-static-nodes.service... Nov 1 00:49:18.222036 systemd[1]: Finished network-cleanup.service. Nov 1 00:49:18.222057 systemd[1]: Starting systemd-fsck-usr.service... Nov 1 00:49:18.222081 systemd[1]: Starting systemd-journald.service... Nov 1 00:49:18.222101 systemd[1]: Starting systemd-modules-load.service... Nov 1 00:49:18.222121 systemd[1]: Starting systemd-resolved.service... Nov 1 00:49:18.222141 systemd[1]: Starting systemd-vconsole-setup.service... Nov 1 00:49:18.222161 systemd[1]: Finished kmod-static-nodes.service. Nov 1 00:49:18.222181 systemd[1]: Finished systemd-fsck-usr.service. Nov 1 00:49:18.222201 kernel: audit: type=1130 audit(1761958158.200:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:18.222222 kernel: audit: type=1130 audit(1761958158.206:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:18.222241 systemd[1]: Finished systemd-vconsole-setup.service. Nov 1 00:49:18.222267 systemd[1]: Starting dracut-cmdline-ask.service... Nov 1 00:49:18.222295 systemd-journald[189]: Journal started Nov 1 00:49:18.222397 systemd-journald[189]: Runtime Journal (/run/log/journal/9ac03de8d0c707290358b9e8ef4e37f5) is 8.0M, max 148.8M, 140.8M free. Nov 1 00:49:18.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:18.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:18.232331 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Nov 1 00:49:18.232425 kernel: audit: type=1130 audit(1761958158.217:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:18.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:18.232771 systemd-modules-load[190]: Inserted module 'overlay' Nov 1 00:49:18.251836 systemd[1]: Started systemd-journald.service. Nov 1 00:49:18.253085 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Nov 1 00:49:18.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:18.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:18.261639 kernel: audit: type=1130 audit(1761958158.250:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:18.261694 kernel: audit: type=1130 audit(1761958158.251:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:18.274014 systemd[1]: Finished dracut-cmdline-ask.service. Nov 1 00:49:18.285982 kernel: audit: type=1130 audit(1761958158.276:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:18.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:18.279705 systemd[1]: Starting dracut-cmdline.service... Nov 1 00:49:18.290585 systemd-resolved[191]: Positive Trust Anchors: Nov 1 00:49:18.291103 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Nov 1 00:49:18.291172 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Nov 1 00:49:18.297441 systemd-resolved[191]: Defaulting to hostname 'linux'. Nov 1 00:49:18.299710 systemd[1]: Started systemd-resolved.service. Nov 1 00:49:18.316948 dracut-cmdline[206]: dracut-dracut-053 Nov 1 00:49:18.316948 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 Nov 1 00:49:18.333827 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Nov 1 00:49:18.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:18.334206 systemd[1]: Reached target nss-lookup.target. Nov 1 00:49:18.348968 kernel: audit: type=1130 audit(1761958158.332:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:18.349018 kernel: Bridge firewalling registered Nov 1 00:49:18.348411 systemd-modules-load[190]: Inserted module 'br_netfilter' Nov 1 00:49:18.380833 kernel: SCSI subsystem initialized Nov 1 00:49:18.404836 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Nov 1 00:49:18.404937 kernel: device-mapper: uevent: version 1.0.3 Nov 1 00:49:18.413612 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Nov 1 00:49:18.418988 systemd-modules-load[190]: Inserted module 'dm_multipath' Nov 1 00:49:18.432970 kernel: Loading iSCSI transport class v2.0-870. Nov 1 00:49:18.420323 systemd[1]: Finished systemd-modules-load.service. Nov 1 00:49:18.475823 kernel: iscsi: registered transport (tcp) Nov 1 00:49:18.475938 kernel: audit: type=1130 audit(1761958158.449:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:18.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:18.452503 systemd[1]: Starting systemd-sysctl.service... Nov 1 00:49:18.489952 systemd[1]: Finished systemd-sysctl.service. Nov 1 00:49:18.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:18.529837 kernel: audit: type=1130 audit(1761958158.507:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:18.538702 kernel: iscsi: registered transport (qla4xxx) Nov 1 00:49:18.538791 kernel: QLogic iSCSI HBA Driver Nov 1 00:49:18.586864 systemd[1]: Finished dracut-cmdline.service. Nov 1 00:49:18.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:18.596757 systemd[1]: Starting dracut-pre-udev.service... Nov 1 00:49:18.661895 kernel: raid6: avx2x4 gen() 22054 MB/s Nov 1 00:49:18.682845 kernel: raid6: avx2x4 xor() 6377 MB/s Nov 1 00:49:18.703851 kernel: raid6: avx2x2 gen() 22894 MB/s Nov 1 00:49:18.724865 kernel: raid6: avx2x2 xor() 18033 MB/s Nov 1 00:49:18.745848 kernel: raid6: avx2x1 gen() 20598 MB/s Nov 1 00:49:18.766855 kernel: raid6: avx2x1 xor() 15983 MB/s Nov 1 00:49:18.787840 kernel: raid6: sse2x4 gen() 10155 MB/s Nov 1 00:49:18.808839 kernel: raid6: sse2x4 xor() 6262 MB/s Nov 1 00:49:18.829841 kernel: raid6: sse2x2 gen() 10823 MB/s Nov 1 00:49:18.850864 kernel: raid6: sse2x2 xor() 7185 MB/s Nov 1 00:49:18.871836 kernel: raid6: sse2x1 gen() 9621 MB/s Nov 1 00:49:18.897818 kernel: raid6: sse2x1 xor() 5155 MB/s Nov 1 00:49:18.897879 kernel: raid6: using algorithm avx2x2 gen() 22894 MB/s Nov 1 00:49:18.897901 kernel: raid6: .... xor() 18033 MB/s, rmw enabled Nov 1 00:49:18.909851 kernel: raid6: using avx2x2 recovery algorithm Nov 1 00:49:18.928848 kernel: xor: automatically using best checksumming function avx Nov 1 00:49:19.046851 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Nov 1 00:49:19.059866 systemd[1]: Finished dracut-pre-udev.service. Nov 1 00:49:19.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:19.058000 audit: BPF prog-id=7 op=LOAD Nov 1 00:49:19.058000 audit: BPF prog-id=8 op=LOAD Nov 1 00:49:19.061460 systemd[1]: Starting systemd-udevd.service... Nov 1 00:49:19.080019 systemd-udevd[389]: Using default interface naming scheme 'v252'. Nov 1 00:49:19.098221 systemd[1]: Started systemd-udevd.service. Nov 1 00:49:19.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:19.108582 systemd[1]: Starting dracut-pre-trigger.service... Nov 1 00:49:19.124539 dracut-pre-trigger[403]: rd.md=0: removing MD RAID activation Nov 1 00:49:19.169808 systemd[1]: Finished dracut-pre-trigger.service. Nov 1 00:49:19.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:19.171222 systemd[1]: Starting systemd-udev-trigger.service... Nov 1 00:49:19.245921 systemd[1]: Finished systemd-udev-trigger.service. Nov 1 00:49:19.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:19.337832 kernel: cryptd: max_cpu_qlen set to 1000 Nov 1 00:49:19.360829 kernel: scsi host0: Virtio SCSI HBA Nov 1 00:49:19.382838 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Nov 1 00:49:19.417831 kernel: AVX2 version of gcm_enc/dec engaged. Nov 1 00:49:19.417950 kernel: AES CTR mode by8 optimization enabled Nov 1 00:49:19.504965 kernel: sd 0:0:1:0: [sda] 33554432 512-byte logical blocks: (17.2 GB/16.0 GiB) Nov 1 00:49:19.565041 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Nov 1 00:49:19.565353 kernel: sd 0:0:1:0: [sda] Write Protect is off Nov 1 00:49:19.565529 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Nov 1 00:49:19.565706 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Nov 1 00:49:19.565957 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Nov 1 00:49:19.566005 kernel: GPT:17805311 != 33554431 Nov 1 00:49:19.566027 kernel: GPT:Alternate GPT header not at the end of the disk. Nov 1 00:49:19.566049 kernel: GPT:17805311 != 33554431 Nov 1 00:49:19.566071 kernel: GPT: Use GNU Parted to correct GPT errors. Nov 1 00:49:19.566095 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Nov 1 00:49:19.566120 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Nov 1 00:49:19.623833 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/sda6 scanned by (udev-worker) (439) Nov 1 00:49:19.635401 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Nov 1 00:49:19.655737 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Nov 1 00:49:19.660053 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Nov 1 00:49:19.680979 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Nov 1 00:49:19.711425 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Nov 1 00:49:19.721384 systemd[1]: Starting disk-uuid.service... Nov 1 00:49:19.749977 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Nov 1 00:49:19.750224 disk-uuid[516]: Primary Header is updated. Nov 1 00:49:19.750224 disk-uuid[516]: Secondary Entries is updated. Nov 1 00:49:19.750224 disk-uuid[516]: Secondary Header is updated. Nov 1 00:49:19.775935 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Nov 1 00:49:19.787828 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Nov 1 00:49:20.784890 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Nov 1 00:49:20.785219 disk-uuid[517]: The operation has completed successfully. Nov 1 00:49:20.863886 systemd[1]: disk-uuid.service: Deactivated successfully. Nov 1 00:49:20.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:20.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:20.864039 systemd[1]: Finished disk-uuid.service. Nov 1 00:49:20.877319 systemd[1]: Starting verity-setup.service... Nov 1 00:49:20.910004 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Nov 1 00:49:20.986770 systemd[1]: Found device dev-mapper-usr.device. Nov 1 00:49:20.990306 systemd[1]: Mounting sysusr-usr.mount... Nov 1 00:49:21.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:21.010656 systemd[1]: Finished verity-setup.service. Nov 1 00:49:21.101184 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Nov 1 00:49:21.101069 systemd[1]: Mounted sysusr-usr.mount. Nov 1 00:49:21.108401 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Nov 1 00:49:21.109761 systemd[1]: Starting ignition-setup.service... Nov 1 00:49:21.167855 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Nov 1 00:49:21.167902 kernel: BTRFS info (device sda6): using free space tree Nov 1 00:49:21.167929 kernel: BTRFS info (device sda6): has skinny extents Nov 1 00:49:21.167952 kernel: BTRFS info (device sda6): enabling ssd optimizations Nov 1 00:49:21.156692 systemd[1]: Starting parse-ip-for-networkd.service... Nov 1 00:49:21.185981 systemd[1]: mnt-oem.mount: Deactivated successfully. Nov 1 00:49:21.202695 systemd[1]: Finished ignition-setup.service. Nov 1 00:49:21.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:21.204440 systemd[1]: Starting ignition-fetch-offline.service... Nov 1 00:49:21.286128 systemd[1]: Finished parse-ip-for-networkd.service. Nov 1 00:49:21.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:21.286000 audit: BPF prog-id=9 op=LOAD Nov 1 00:49:21.288924 systemd[1]: Starting systemd-networkd.service... Nov 1 00:49:21.327680 systemd-networkd[691]: lo: Link UP Nov 1 00:49:21.327695 systemd-networkd[691]: lo: Gained carrier Nov 1 00:49:21.328628 systemd-networkd[691]: Enumeration completed Nov 1 00:49:21.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:21.328814 systemd[1]: Started systemd-networkd.service. Nov 1 00:49:21.329260 systemd-networkd[691]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Nov 1 00:49:21.332128 systemd-networkd[691]: eth0: Link UP Nov 1 00:49:21.332135 systemd-networkd[691]: eth0: Gained carrier Nov 1 00:49:21.341939 systemd-networkd[691]: eth0: Overlong DHCP hostname received, shortened from 'ci-3510-3-8-nightly-20251031-2100-eaee09087602307722bd.c.flatcar-212911.internal' to 'ci-3510-3-8-nightly-20251031-2100-eaee09087602307722bd' Nov 1 00:49:21.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:21.341967 systemd-networkd[691]: eth0: DHCPv4 address 10.128.0.106/32, gateway 10.128.0.1 acquired from 169.254.169.254 Nov 1 00:49:21.448114 iscsid[701]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Nov 1 00:49:21.448114 iscsid[701]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Nov 1 00:49:21.448114 iscsid[701]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Nov 1 00:49:21.448114 iscsid[701]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Nov 1 00:49:21.448114 iscsid[701]: If using hardware iscsi like qla4xxx this message can be ignored. Nov 1 00:49:21.448114 iscsid[701]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Nov 1 00:49:21.448114 iscsid[701]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Nov 1 00:49:21.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:21.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:21.348322 systemd[1]: Reached target network.target. Nov 1 00:49:21.498408 ignition[613]: Ignition 2.14.0 Nov 1 00:49:21.365548 systemd[1]: Starting iscsiuio.service... Nov 1 00:49:21.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:21.498421 ignition[613]: Stage: fetch-offline Nov 1 00:49:21.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:21.393317 systemd[1]: Started iscsiuio.service. Nov 1 00:49:21.498511 ignition[613]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:49:21.402027 systemd[1]: Starting iscsid.service... Nov 1 00:49:21.498562 ignition[613]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Nov 1 00:49:21.435182 systemd[1]: Started iscsid.service. Nov 1 00:49:21.522049 ignition[613]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Nov 1 00:49:21.457853 systemd[1]: Starting dracut-initqueue.service... Nov 1 00:49:21.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:21.522449 ignition[613]: parsed url from cmdline: "" Nov 1 00:49:21.502448 systemd[1]: Finished dracut-initqueue.service. Nov 1 00:49:21.522456 ignition[613]: no config URL provided Nov 1 00:49:21.511229 systemd[1]: Reached target remote-fs-pre.target. Nov 1 00:49:21.522465 ignition[613]: reading system config file "/usr/lib/ignition/user.ign" Nov 1 00:49:21.532210 systemd[1]: Reached target remote-cryptsetup.target. Nov 1 00:49:21.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:21.522478 ignition[613]: no config at "/usr/lib/ignition/user.ign" Nov 1 00:49:21.547198 systemd[1]: Reached target remote-fs.target. Nov 1 00:49:21.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:21.522489 ignition[613]: failed to fetch config: resource requires networking Nov 1 00:49:21.583669 systemd[1]: Starting dracut-pre-mount.service... Nov 1 00:49:21.522955 ignition[613]: Ignition finished successfully Nov 1 00:49:21.607438 systemd[1]: Finished ignition-fetch-offline.service. Nov 1 00:49:21.652418 ignition[716]: Ignition 2.14.0 Nov 1 00:49:21.621625 systemd[1]: Finished dracut-pre-mount.service. Nov 1 00:49:21.652430 ignition[716]: Stage: fetch Nov 1 00:49:21.637824 systemd[1]: Starting ignition-fetch.service... Nov 1 00:49:21.652571 ignition[716]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:49:21.670444 unknown[716]: fetched base config from "system" Nov 1 00:49:21.652603 ignition[716]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Nov 1 00:49:21.670459 unknown[716]: fetched base config from "system" Nov 1 00:49:21.661323 ignition[716]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Nov 1 00:49:21.670488 unknown[716]: fetched user config from "gcp" Nov 1 00:49:21.661525 ignition[716]: parsed url from cmdline: "" Nov 1 00:49:21.681462 systemd[1]: Finished ignition-fetch.service. Nov 1 00:49:21.661530 ignition[716]: no config URL provided Nov 1 00:49:21.700613 systemd[1]: Starting ignition-kargs.service... Nov 1 00:49:21.661538 ignition[716]: reading system config file "/usr/lib/ignition/user.ign" Nov 1 00:49:21.737538 systemd[1]: Finished ignition-kargs.service. Nov 1 00:49:21.661549 ignition[716]: no config at "/usr/lib/ignition/user.ign" Nov 1 00:49:21.748850 systemd[1]: Starting ignition-disks.service... Nov 1 00:49:21.661588 ignition[716]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Nov 1 00:49:21.772830 systemd[1]: Finished ignition-disks.service. Nov 1 00:49:21.667327 ignition[716]: GET result: OK Nov 1 00:49:21.777380 systemd[1]: Reached target initrd-root-device.target. Nov 1 00:49:21.667402 ignition[716]: parsing config with SHA512: a943ad69b950236ce30c6c1f21c372d15d5b154c1f7d8f96bdd65bfeda669b1a763fb09ba62d0b227aee9aa2a9517c311bd85ab5d130484080ff9d25c6149fa6 Nov 1 00:49:21.798074 systemd[1]: Reached target local-fs-pre.target. Nov 1 00:49:21.671052 ignition[716]: fetch: fetch complete Nov 1 00:49:21.814024 systemd[1]: Reached target local-fs.target. Nov 1 00:49:21.671060 ignition[716]: fetch: fetch passed Nov 1 00:49:21.814117 systemd[1]: Reached target sysinit.target. Nov 1 00:49:21.671115 ignition[716]: Ignition finished successfully Nov 1 00:49:21.836018 systemd[1]: Reached target basic.target. Nov 1 00:49:21.717356 ignition[722]: Ignition 2.14.0 Nov 1 00:49:21.850698 systemd[1]: Starting systemd-fsck-root.service... Nov 1 00:49:21.717366 ignition[722]: Stage: kargs Nov 1 00:49:21.717507 ignition[722]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:49:21.717534 ignition[722]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Nov 1 00:49:21.724740 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Nov 1 00:49:21.725940 ignition[722]: kargs: kargs passed Nov 1 00:49:21.726001 ignition[722]: Ignition finished successfully Nov 1 00:49:21.762304 ignition[728]: Ignition 2.14.0 Nov 1 00:49:21.762313 ignition[728]: Stage: disks Nov 1 00:49:21.762579 ignition[728]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:49:21.762612 ignition[728]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Nov 1 00:49:21.770384 ignition[728]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Nov 1 00:49:21.771605 ignition[728]: disks: disks passed Nov 1 00:49:21.771660 ignition[728]: Ignition finished successfully Nov 1 00:49:21.880420 systemd-fsck[736]: ROOT: clean, 637/1628000 files, 124069/1617920 blocks Nov 1 00:49:22.097023 systemd[1]: Finished systemd-fsck-root.service. Nov 1 00:49:22.139221 kernel: kauditd_printk_skb: 22 callbacks suppressed Nov 1 00:49:22.139269 kernel: audit: type=1130 audit(1761958162.104:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:22.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:22.134584 systemd[1]: Mounting sysroot.mount... Nov 1 00:49:22.160924 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Nov 1 00:49:22.161688 systemd[1]: Mounted sysroot.mount. Nov 1 00:49:22.162099 systemd[1]: Reached target initrd-root-fs.target. Nov 1 00:49:22.183374 systemd[1]: Mounting sysroot-usr.mount... Nov 1 00:49:22.189653 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Nov 1 00:49:22.189709 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Nov 1 00:49:22.189748 systemd[1]: Reached target ignition-diskful.target. Nov 1 00:49:22.209677 systemd[1]: Mounted sysroot-usr.mount. Nov 1 00:49:22.273714 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by mount (742) Nov 1 00:49:22.273778 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Nov 1 00:49:22.273815 kernel: BTRFS info (device sda6): using free space tree Nov 1 00:49:22.235319 systemd[1]: Mounting sysroot-usr-share-oem.mount... Nov 1 00:49:22.285008 kernel: BTRFS info (device sda6): has skinny extents Nov 1 00:49:22.294851 kernel: BTRFS info (device sda6): enabling ssd optimizations Nov 1 00:49:22.306264 systemd[1]: Starting initrd-setup-root.service... Nov 1 00:49:22.318426 systemd[1]: Mounted sysroot-usr-share-oem.mount. Nov 1 00:49:22.336240 initrd-setup-root[765]: cut: /sysroot/etc/passwd: No such file or directory Nov 1 00:49:22.345961 initrd-setup-root[773]: cut: /sysroot/etc/group: No such file or directory Nov 1 00:49:22.356948 initrd-setup-root[781]: cut: /sysroot/etc/shadow: No such file or directory Nov 1 00:49:22.366969 initrd-setup-root[789]: cut: /sysroot/etc/gshadow: No such file or directory Nov 1 00:49:22.417775 systemd[1]: Finished initrd-setup-root.service. Nov 1 00:49:22.452162 kernel: audit: type=1130 audit(1761958162.416:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:22.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:22.419614 systemd[1]: Starting ignition-mount.service... Nov 1 00:49:22.460275 systemd[1]: Starting sysroot-boot.service... Nov 1 00:49:22.474584 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Nov 1 00:49:22.474752 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Nov 1 00:49:22.501142 ignition[808]: INFO : Ignition 2.14.0 Nov 1 00:49:22.501142 ignition[808]: INFO : Stage: mount Nov 1 00:49:22.501142 ignition[808]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:49:22.501142 ignition[808]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Nov 1 00:49:22.642021 kernel: audit: type=1130 audit(1761958162.507:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:22.642085 kernel: audit: type=1130 audit(1761958162.543:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:22.642112 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by mount (817) Nov 1 00:49:22.642135 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Nov 1 00:49:22.642156 kernel: BTRFS info (device sda6): using free space tree Nov 1 00:49:22.642171 kernel: BTRFS info (device sda6): has skinny extents Nov 1 00:49:22.642186 kernel: BTRFS info (device sda6): enabling ssd optimizations Nov 1 00:49:22.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:22.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:22.500652 systemd[1]: Finished sysroot-boot.service. Nov 1 00:49:22.656023 ignition[808]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Nov 1 00:49:22.656023 ignition[808]: INFO : mount: mount passed Nov 1 00:49:22.656023 ignition[808]: INFO : Ignition finished successfully Nov 1 00:49:22.509513 systemd[1]: Finished ignition-mount.service. Nov 1 00:49:22.546775 systemd[1]: Starting ignition-files.service... Nov 1 00:49:22.576731 systemd[1]: Mounting sysroot-usr-share-oem.mount... Nov 1 00:49:22.713021 ignition[836]: INFO : Ignition 2.14.0 Nov 1 00:49:22.713021 ignition[836]: INFO : Stage: files Nov 1 00:49:22.713021 ignition[836]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:49:22.713021 ignition[836]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Nov 1 00:49:22.713021 ignition[836]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Nov 1 00:49:22.713021 ignition[836]: DEBUG : files: compiled without relabeling support, skipping Nov 1 00:49:22.713021 ignition[836]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Nov 1 00:49:22.713021 ignition[836]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Nov 1 00:49:22.713021 ignition[836]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Nov 1 00:49:22.713021 ignition[836]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Nov 1 00:49:22.713021 ignition[836]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Nov 1 00:49:22.652541 systemd[1]: Mounted sysroot-usr-share-oem.mount. Nov 1 00:49:22.853011 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Nov 1 00:49:22.853011 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:49:22.853011 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem388423877" Nov 1 00:49:22.853011 ignition[836]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem388423877": device or resource busy Nov 1 00:49:22.853011 ignition[836]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem388423877", trying btrfs: device or resource busy Nov 1 00:49:22.853011 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem388423877" Nov 1 00:49:22.853011 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem388423877" Nov 1 00:49:22.853011 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem388423877" Nov 1 00:49:22.853011 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem388423877" Nov 1 00:49:22.853011 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Nov 1 00:49:22.853011 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Nov 1 00:49:22.853011 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:49:22.853011 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3399717820" Nov 1 00:49:22.853011 ignition[836]: CRITICAL : files: createFilesystemsFiles: createFiles: op(7): op(8): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3399717820": device or resource busy Nov 1 00:49:22.853011 ignition[836]: ERROR : files: createFilesystemsFiles: createFiles: op(7): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3399717820", trying btrfs: device or resource busy Nov 1 00:49:22.711959 unknown[836]: wrote ssh authorized keys file for user: core Nov 1 00:49:23.114996 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3399717820" Nov 1 00:49:23.114996 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3399717820" Nov 1 00:49:23.114996 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [started] unmounting "/mnt/oem3399717820" Nov 1 00:49:23.114996 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [finished] unmounting "/mnt/oem3399717820" Nov 1 00:49:23.114996 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Nov 1 00:49:23.114996 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Nov 1 00:49:23.114996 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Nov 1 00:49:23.114996 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/flatcar/update.conf" Nov 1 00:49:23.114996 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/flatcar/update.conf" Nov 1 00:49:23.114996 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Nov 1 00:49:23.114996 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Nov 1 00:49:23.114996 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Nov 1 00:49:23.114996 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:49:23.114996 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem473534182" Nov 1 00:49:23.114996 ignition[836]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem473534182": device or resource busy Nov 1 00:49:22.755031 systemd-networkd[691]: eth0: Gained IPv6LL Nov 1 00:49:23.372958 ignition[836]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem473534182", trying btrfs: device or resource busy Nov 1 00:49:23.372958 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem473534182" Nov 1 00:49:23.372958 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem473534182" Nov 1 00:49:23.372958 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem473534182" Nov 1 00:49:23.372958 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem473534182" Nov 1 00:49:23.372958 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Nov 1 00:49:23.372958 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Nov 1 00:49:23.372958 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:49:23.372958 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3039856229" Nov 1 00:49:23.372958 ignition[836]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3039856229": device or resource busy Nov 1 00:49:23.372958 ignition[836]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3039856229", trying btrfs: device or resource busy Nov 1 00:49:23.372958 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3039856229" Nov 1 00:49:23.372958 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3039856229" Nov 1 00:49:23.372958 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem3039856229" Nov 1 00:49:23.619056 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem3039856229" Nov 1 00:49:23.619056 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Nov 1 00:49:23.619056 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Nov 1 00:49:23.619056 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Nov 1 00:49:23.619056 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET result: OK Nov 1 00:49:24.302657 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Nov 1 00:49:24.302657 ignition[836]: INFO : files: op(17): [started] processing unit "oem-gce.service" Nov 1 00:49:24.302657 ignition[836]: INFO : files: op(17): [finished] processing unit "oem-gce.service" Nov 1 00:49:24.302657 ignition[836]: INFO : files: op(18): [started] processing unit "oem-gce-enable-oslogin.service" Nov 1 00:49:24.395055 kernel: audit: type=1130 audit(1761958164.320:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.395236 ignition[836]: INFO : files: op(18): [finished] processing unit "oem-gce-enable-oslogin.service" Nov 1 00:49:24.395236 ignition[836]: INFO : files: op(19): [started] processing unit "coreos-metadata-sshkeys@.service" Nov 1 00:49:24.395236 ignition[836]: INFO : files: op(19): [finished] processing unit "coreos-metadata-sshkeys@.service" Nov 1 00:49:24.395236 ignition[836]: INFO : files: op(1a): [started] setting preset to enabled for "oem-gce.service" Nov 1 00:49:24.395236 ignition[836]: INFO : files: op(1a): [finished] setting preset to enabled for "oem-gce.service" Nov 1 00:49:24.395236 ignition[836]: INFO : files: op(1b): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Nov 1 00:49:24.395236 ignition[836]: INFO : files: op(1b): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Nov 1 00:49:24.395236 ignition[836]: INFO : files: op(1c): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Nov 1 00:49:24.395236 ignition[836]: INFO : files: op(1c): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Nov 1 00:49:24.395236 ignition[836]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Nov 1 00:49:24.395236 ignition[836]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Nov 1 00:49:24.395236 ignition[836]: INFO : files: files passed Nov 1 00:49:24.395236 ignition[836]: INFO : Ignition finished successfully Nov 1 00:49:24.713088 kernel: audit: type=1130 audit(1761958164.403:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.713169 kernel: audit: type=1130 audit(1761958164.455:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.713195 kernel: audit: type=1131 audit(1761958164.455:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.713222 kernel: audit: type=1130 audit(1761958164.579:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.713237 kernel: audit: type=1131 audit(1761958164.579:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.312659 systemd[1]: Finished ignition-files.service. Nov 1 00:49:24.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.332960 systemd[1]: Starting initrd-setup-root-after-ignition.service... Nov 1 00:49:24.738133 initrd-setup-root-after-ignition[859]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Nov 1 00:49:24.367018 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Nov 1 00:49:24.368457 systemd[1]: Starting ignition-quench.service... Nov 1 00:49:24.378598 systemd[1]: Finished initrd-setup-root-after-ignition.service. Nov 1 00:49:24.405713 systemd[1]: ignition-quench.service: Deactivated successfully. Nov 1 00:49:24.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.405912 systemd[1]: Finished ignition-quench.service. Nov 1 00:49:24.457453 systemd[1]: Reached target ignition-complete.target. Nov 1 00:49:24.511706 systemd[1]: Starting initrd-parse-etc.service... Nov 1 00:49:24.551414 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Nov 1 00:49:24.551548 systemd[1]: Finished initrd-parse-etc.service. Nov 1 00:49:24.581541 systemd[1]: Reached target initrd-fs.target. Nov 1 00:49:24.655109 systemd[1]: Reached target initrd.target. Nov 1 00:49:24.676201 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Nov 1 00:49:24.677709 systemd[1]: Starting dracut-pre-pivot.service... Nov 1 00:49:24.699489 systemd[1]: Finished dracut-pre-pivot.service. Nov 1 00:49:24.722777 systemd[1]: Starting initrd-cleanup.service... Nov 1 00:49:24.753751 systemd[1]: Stopped target nss-lookup.target. Nov 1 00:49:25.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.767232 systemd[1]: Stopped target remote-cryptsetup.target. Nov 1 00:49:24.792318 systemd[1]: Stopped target timers.target. Nov 1 00:49:25.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.806351 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Nov 1 00:49:25.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.806592 systemd[1]: Stopped dracut-pre-pivot.service. Nov 1 00:49:25.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.822748 systemd[1]: Stopped target initrd.target. Nov 1 00:49:25.090997 ignition[874]: INFO : Ignition 2.14.0 Nov 1 00:49:25.090997 ignition[874]: INFO : Stage: umount Nov 1 00:49:24.837327 systemd[1]: Stopped target basic.target. Nov 1 00:49:25.122020 ignition[874]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:49:25.122020 ignition[874]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Nov 1 00:49:25.122020 ignition[874]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Nov 1 00:49:25.122020 ignition[874]: INFO : umount: umount passed Nov 1 00:49:25.122020 ignition[874]: INFO : Ignition finished successfully Nov 1 00:49:25.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.851310 systemd[1]: Stopped target ignition-complete.target. Nov 1 00:49:25.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.867315 systemd[1]: Stopped target ignition-diskful.target. Nov 1 00:49:25.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.883310 systemd[1]: Stopped target initrd-root-device.target. Nov 1 00:49:25.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.900323 systemd[1]: Stopped target remote-fs.target. Nov 1 00:49:25.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.915296 systemd[1]: Stopped target remote-fs-pre.target. Nov 1 00:49:25.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.930354 systemd[1]: Stopped target sysinit.target. Nov 1 00:49:24.946343 systemd[1]: Stopped target local-fs.target. Nov 1 00:49:25.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:24.965325 systemd[1]: Stopped target local-fs-pre.target. Nov 1 00:49:24.981293 systemd[1]: Stopped target swap.target. Nov 1 00:49:24.995220 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Nov 1 00:49:24.995535 systemd[1]: Stopped dracut-pre-mount.service. Nov 1 00:49:25.010467 systemd[1]: Stopped target cryptsetup.target. Nov 1 00:49:25.026310 systemd[1]: dracut-initqueue.service: Deactivated successfully. Nov 1 00:49:25.026543 systemd[1]: Stopped dracut-initqueue.service. Nov 1 00:49:25.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.043503 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Nov 1 00:49:25.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.043716 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Nov 1 00:49:25.060435 systemd[1]: ignition-files.service: Deactivated successfully. Nov 1 00:49:25.060641 systemd[1]: Stopped ignition-files.service. Nov 1 00:49:25.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.078218 systemd[1]: Stopping ignition-mount.service... Nov 1 00:49:25.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.114424 systemd[1]: Stopping iscsiuio.service... Nov 1 00:49:25.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.501000 audit: BPF prog-id=6 op=UNLOAD Nov 1 00:49:25.130789 systemd[1]: Stopping sysroot-boot.service... Nov 1 00:49:25.140182 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Nov 1 00:49:25.140631 systemd[1]: Stopped systemd-udev-trigger.service. Nov 1 00:49:25.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.164531 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Nov 1 00:49:25.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.164744 systemd[1]: Stopped dracut-pre-trigger.service. Nov 1 00:49:25.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.185540 systemd[1]: sysroot-boot.mount: Deactivated successfully. Nov 1 00:49:25.186828 systemd[1]: iscsiuio.service: Deactivated successfully. Nov 1 00:49:25.186970 systemd[1]: Stopped iscsiuio.service. Nov 1 00:49:25.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.195918 systemd[1]: ignition-mount.service: Deactivated successfully. Nov 1 00:49:25.196040 systemd[1]: Stopped ignition-mount.service. Nov 1 00:49:25.217666 systemd[1]: sysroot-boot.service: Deactivated successfully. Nov 1 00:49:25.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.217794 systemd[1]: Stopped sysroot-boot.service. Nov 1 00:49:25.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.233776 systemd[1]: ignition-disks.service: Deactivated successfully. Nov 1 00:49:25.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.233966 systemd[1]: Stopped ignition-disks.service. Nov 1 00:49:25.249053 systemd[1]: ignition-kargs.service: Deactivated successfully. Nov 1 00:49:25.249139 systemd[1]: Stopped ignition-kargs.service. Nov 1 00:49:25.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.265094 systemd[1]: ignition-fetch.service: Deactivated successfully. Nov 1 00:49:25.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.265196 systemd[1]: Stopped ignition-fetch.service. Nov 1 00:49:25.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.280049 systemd[1]: Stopped target network.target. Nov 1 00:49:25.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.294174 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Nov 1 00:49:25.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:25.294298 systemd[1]: Stopped ignition-fetch-offline.service. Nov 1 00:49:25.309227 systemd[1]: Stopped target paths.target. Nov 1 00:49:25.323085 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Nov 1 00:49:25.327930 systemd[1]: Stopped systemd-ask-password-console.path. Nov 1 00:49:25.337992 systemd[1]: Stopped target slices.target. Nov 1 00:49:25.350980 systemd[1]: Stopped target sockets.target. Nov 1 00:49:25.887611 systemd-journald[189]: Received SIGTERM from PID 1 (n/a). Nov 1 00:49:25.366037 systemd[1]: iscsid.socket: Deactivated successfully. Nov 1 00:49:25.896020 iscsid[701]: iscsid shutting down. Nov 1 00:49:25.366118 systemd[1]: Closed iscsid.socket. Nov 1 00:49:25.380105 systemd[1]: iscsiuio.socket: Deactivated successfully. Nov 1 00:49:25.380189 systemd[1]: Closed iscsiuio.socket. Nov 1 00:49:25.394043 systemd[1]: ignition-setup.service: Deactivated successfully. Nov 1 00:49:25.394173 systemd[1]: Stopped ignition-setup.service. Nov 1 00:49:25.410124 systemd[1]: initrd-setup-root.service: Deactivated successfully. Nov 1 00:49:25.410212 systemd[1]: Stopped initrd-setup-root.service. Nov 1 00:49:25.425360 systemd[1]: Stopping systemd-networkd.service... Nov 1 00:49:25.428887 systemd-networkd[691]: eth0: DHCPv6 lease lost Nov 1 00:49:25.901000 audit: BPF prog-id=9 op=UNLOAD Nov 1 00:49:25.442293 systemd[1]: Stopping systemd-resolved.service... Nov 1 00:49:25.450687 systemd[1]: systemd-resolved.service: Deactivated successfully. Nov 1 00:49:25.450852 systemd[1]: Stopped systemd-resolved.service. Nov 1 00:49:25.473915 systemd[1]: systemd-networkd.service: Deactivated successfully. Nov 1 00:49:25.474058 systemd[1]: Stopped systemd-networkd.service. Nov 1 00:49:25.488965 systemd[1]: initrd-cleanup.service: Deactivated successfully. Nov 1 00:49:25.489102 systemd[1]: Finished initrd-cleanup.service. Nov 1 00:49:25.504542 systemd[1]: systemd-networkd.socket: Deactivated successfully. Nov 1 00:49:25.504611 systemd[1]: Closed systemd-networkd.socket. Nov 1 00:49:25.519402 systemd[1]: Stopping network-cleanup.service... Nov 1 00:49:25.525363 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Nov 1 00:49:25.525469 systemd[1]: Stopped parse-ip-for-networkd.service. Nov 1 00:49:25.547309 systemd[1]: systemd-sysctl.service: Deactivated successfully. Nov 1 00:49:25.547406 systemd[1]: Stopped systemd-sysctl.service. Nov 1 00:49:25.564331 systemd[1]: systemd-modules-load.service: Deactivated successfully. Nov 1 00:49:25.564411 systemd[1]: Stopped systemd-modules-load.service. Nov 1 00:49:25.582451 systemd[1]: Stopping systemd-udevd.service... Nov 1 00:49:25.600184 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Nov 1 00:49:25.601103 systemd[1]: systemd-udevd.service: Deactivated successfully. Nov 1 00:49:25.601288 systemd[1]: Stopped systemd-udevd.service. Nov 1 00:49:25.622426 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Nov 1 00:49:25.622545 systemd[1]: Closed systemd-udevd-control.socket. Nov 1 00:49:25.636116 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Nov 1 00:49:25.636186 systemd[1]: Closed systemd-udevd-kernel.socket. Nov 1 00:49:25.652074 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Nov 1 00:49:25.652180 systemd[1]: Stopped dracut-pre-udev.service. Nov 1 00:49:25.667191 systemd[1]: dracut-cmdline.service: Deactivated successfully. Nov 1 00:49:25.667279 systemd[1]: Stopped dracut-cmdline.service. Nov 1 00:49:25.684301 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Nov 1 00:49:25.684406 systemd[1]: Stopped dracut-cmdline-ask.service. Nov 1 00:49:25.701150 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Nov 1 00:49:25.724032 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Nov 1 00:49:25.724200 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Nov 1 00:49:25.742336 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Nov 1 00:49:25.742421 systemd[1]: Stopped kmod-static-nodes.service. Nov 1 00:49:25.758150 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Nov 1 00:49:25.758246 systemd[1]: Stopped systemd-vconsole-setup.service. Nov 1 00:49:25.775757 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Nov 1 00:49:25.776540 systemd[1]: network-cleanup.service: Deactivated successfully. Nov 1 00:49:25.776672 systemd[1]: Stopped network-cleanup.service. Nov 1 00:49:25.789447 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Nov 1 00:49:25.789574 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Nov 1 00:49:25.804457 systemd[1]: Reached target initrd-switch-root.target. Nov 1 00:49:25.824499 systemd[1]: Starting initrd-switch-root.service... Nov 1 00:49:25.853999 systemd[1]: Switching root. Nov 1 00:49:25.905735 systemd-journald[189]: Journal stopped Nov 1 00:49:30.720770 kernel: SELinux: Class mctp_socket not defined in policy. Nov 1 00:49:30.728884 kernel: SELinux: Class anon_inode not defined in policy. Nov 1 00:49:30.729054 kernel: SELinux: the above unknown classes and permissions will be allowed Nov 1 00:49:30.729075 kernel: SELinux: policy capability network_peer_controls=1 Nov 1 00:49:30.729099 kernel: SELinux: policy capability open_perms=1 Nov 1 00:49:30.729114 kernel: SELinux: policy capability extended_socket_class=1 Nov 1 00:49:30.729129 kernel: SELinux: policy capability always_check_network=0 Nov 1 00:49:30.729143 kernel: SELinux: policy capability cgroup_seclabel=1 Nov 1 00:49:30.729164 kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 1 00:49:30.729195 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Nov 1 00:49:30.729209 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Nov 1 00:49:30.729229 systemd[1]: Successfully loaded SELinux policy in 114.419ms. Nov 1 00:49:30.729263 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 13.097ms. Nov 1 00:49:30.729281 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 1 00:49:30.729297 systemd[1]: Detected virtualization kvm. Nov 1 00:49:30.729313 systemd[1]: Detected architecture x86-64. Nov 1 00:49:30.729332 systemd[1]: Detected first boot. Nov 1 00:49:30.729349 systemd[1]: Initializing machine ID from VM UUID. Nov 1 00:49:30.729368 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Nov 1 00:49:30.729383 systemd[1]: Populated /etc with preset unit settings. Nov 1 00:49:30.729406 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:49:30.729429 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:49:30.729446 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:49:30.729463 kernel: kauditd_printk_skb: 52 callbacks suppressed Nov 1 00:49:30.729481 kernel: audit: type=1334 audit(1761958169.801:88): prog-id=12 op=LOAD Nov 1 00:49:30.729496 kernel: audit: type=1334 audit(1761958169.801:89): prog-id=3 op=UNLOAD Nov 1 00:49:30.729511 kernel: audit: type=1334 audit(1761958169.807:90): prog-id=13 op=LOAD Nov 1 00:49:30.729525 kernel: audit: type=1334 audit(1761958169.814:91): prog-id=14 op=LOAD Nov 1 00:49:30.729540 kernel: audit: type=1334 audit(1761958169.814:92): prog-id=4 op=UNLOAD Nov 1 00:49:30.729560 kernel: audit: type=1334 audit(1761958169.814:93): prog-id=5 op=UNLOAD Nov 1 00:49:30.729575 kernel: audit: type=1334 audit(1761958169.821:94): prog-id=15 op=LOAD Nov 1 00:49:30.729589 kernel: audit: type=1334 audit(1761958169.821:95): prog-id=12 op=UNLOAD Nov 1 00:49:30.729615 kernel: audit: type=1334 audit(1761958169.828:96): prog-id=16 op=LOAD Nov 1 00:49:30.729634 kernel: audit: type=1334 audit(1761958169.835:97): prog-id=17 op=LOAD Nov 1 00:49:30.729649 systemd[1]: iscsid.service: Deactivated successfully. Nov 1 00:49:30.729664 systemd[1]: Stopped iscsid.service. Nov 1 00:49:30.729680 systemd[1]: initrd-switch-root.service: Deactivated successfully. Nov 1 00:49:30.729696 systemd[1]: Stopped initrd-switch-root.service. Nov 1 00:49:30.729711 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Nov 1 00:49:30.729727 systemd[1]: Created slice system-addon\x2dconfig.slice. Nov 1 00:49:30.729743 systemd[1]: Created slice system-addon\x2drun.slice. Nov 1 00:49:30.729762 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Nov 1 00:49:30.729777 systemd[1]: Created slice system-getty.slice. Nov 1 00:49:30.729793 systemd[1]: Created slice system-modprobe.slice. Nov 1 00:49:30.729839 systemd[1]: Created slice system-serial\x2dgetty.slice. Nov 1 00:49:30.729874 systemd[1]: Created slice system-system\x2dcloudinit.slice. Nov 1 00:49:30.729897 systemd[1]: Created slice system-systemd\x2dfsck.slice. Nov 1 00:49:30.729919 systemd[1]: Created slice user.slice. Nov 1 00:49:30.729941 systemd[1]: Started systemd-ask-password-console.path. Nov 1 00:49:30.729971 systemd[1]: Started systemd-ask-password-wall.path. Nov 1 00:49:30.729998 systemd[1]: Set up automount boot.automount. Nov 1 00:49:30.730022 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Nov 1 00:49:30.730051 systemd[1]: Stopped target initrd-switch-root.target. Nov 1 00:49:30.730085 systemd[1]: Stopped target initrd-fs.target. Nov 1 00:49:30.730109 systemd[1]: Stopped target initrd-root-fs.target. Nov 1 00:49:30.730134 systemd[1]: Reached target integritysetup.target. Nov 1 00:49:30.730160 systemd[1]: Reached target remote-cryptsetup.target. Nov 1 00:49:30.730188 systemd[1]: Reached target remote-fs.target. Nov 1 00:49:30.730219 systemd[1]: Reached target slices.target. Nov 1 00:49:30.730244 systemd[1]: Reached target swap.target. Nov 1 00:49:30.730267 systemd[1]: Reached target torcx.target. Nov 1 00:49:30.730292 systemd[1]: Reached target veritysetup.target. Nov 1 00:49:30.730315 systemd[1]: Listening on systemd-coredump.socket. Nov 1 00:49:30.730340 systemd[1]: Listening on systemd-initctl.socket. Nov 1 00:49:30.730504 systemd[1]: Listening on systemd-networkd.socket. Nov 1 00:49:30.730530 systemd[1]: Listening on systemd-udevd-control.socket. Nov 1 00:49:30.730554 systemd[1]: Listening on systemd-udevd-kernel.socket. Nov 1 00:49:30.730578 systemd[1]: Listening on systemd-userdbd.socket. Nov 1 00:49:30.730616 systemd[1]: Mounting dev-hugepages.mount... Nov 1 00:49:30.730642 systemd[1]: Mounting dev-mqueue.mount... Nov 1 00:49:30.730667 systemd[1]: Mounting media.mount... Nov 1 00:49:30.730691 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:49:30.730715 systemd[1]: Mounting sys-kernel-debug.mount... Nov 1 00:49:30.730739 systemd[1]: Mounting sys-kernel-tracing.mount... Nov 1 00:49:30.730766 systemd[1]: Mounting tmp.mount... Nov 1 00:49:30.730796 systemd[1]: Starting flatcar-tmpfiles.service... Nov 1 00:49:30.730893 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:49:30.730923 systemd[1]: Starting kmod-static-nodes.service... Nov 1 00:49:30.730949 systemd[1]: Starting modprobe@configfs.service... Nov 1 00:49:30.730974 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:49:30.730999 systemd[1]: Starting modprobe@drm.service... Nov 1 00:49:30.731023 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:49:30.731048 systemd[1]: Starting modprobe@fuse.service... Nov 1 00:49:30.731073 systemd[1]: Starting modprobe@loop.service... Nov 1 00:49:30.731097 kernel: fuse: init (API version 7.34) Nov 1 00:49:30.731124 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Nov 1 00:49:30.731151 kernel: loop: module loaded Nov 1 00:49:30.731174 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Nov 1 00:49:30.731197 systemd[1]: Stopped systemd-fsck-root.service. Nov 1 00:49:30.731222 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Nov 1 00:49:30.731247 systemd[1]: Stopped systemd-fsck-usr.service. Nov 1 00:49:30.731268 systemd[1]: Stopped systemd-journald.service. Nov 1 00:49:30.731292 systemd[1]: Starting systemd-journald.service... Nov 1 00:49:30.731315 systemd[1]: Starting systemd-modules-load.service... Nov 1 00:49:30.731340 systemd[1]: Starting systemd-network-generator.service... Nov 1 00:49:30.731370 systemd[1]: Starting systemd-remount-fs.service... Nov 1 00:49:30.731404 systemd-journald[999]: Journal started Nov 1 00:49:30.731506 systemd-journald[999]: Runtime Journal (/run/log/journal/9ac03de8d0c707290358b9e8ef4e37f5) is 8.0M, max 148.8M, 140.8M free. Nov 1 00:49:26.244000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Nov 1 00:49:26.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 00:49:26.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 00:49:26.398000 audit: BPF prog-id=10 op=LOAD Nov 1 00:49:26.398000 audit: BPF prog-id=10 op=UNLOAD Nov 1 00:49:26.398000 audit: BPF prog-id=11 op=LOAD Nov 1 00:49:26.398000 audit: BPF prog-id=11 op=UNLOAD Nov 1 00:49:26.576000 audit[907]: AVC avc: denied { associate } for pid=907 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Nov 1 00:49:26.576000 audit[907]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=890 pid=907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:26.576000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:49:26.587000 audit[907]: AVC avc: denied { associate } for pid=907 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Nov 1 00:49:26.587000 audit[907]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179a9 a2=1ed a3=0 items=2 ppid=890 pid=907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:26.587000 audit: CWD cwd="/" Nov 1 00:49:26.587000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:26.587000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:26.587000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:49:29.801000 audit: BPF prog-id=12 op=LOAD Nov 1 00:49:29.801000 audit: BPF prog-id=3 op=UNLOAD Nov 1 00:49:29.807000 audit: BPF prog-id=13 op=LOAD Nov 1 00:49:29.814000 audit: BPF prog-id=14 op=LOAD Nov 1 00:49:29.814000 audit: BPF prog-id=4 op=UNLOAD Nov 1 00:49:29.814000 audit: BPF prog-id=5 op=UNLOAD Nov 1 00:49:29.821000 audit: BPF prog-id=15 op=LOAD Nov 1 00:49:29.821000 audit: BPF prog-id=12 op=UNLOAD Nov 1 00:49:29.828000 audit: BPF prog-id=16 op=LOAD Nov 1 00:49:29.835000 audit: BPF prog-id=17 op=LOAD Nov 1 00:49:29.835000 audit: BPF prog-id=13 op=UNLOAD Nov 1 00:49:29.835000 audit: BPF prog-id=14 op=UNLOAD Nov 1 00:49:29.842000 audit: BPF prog-id=18 op=LOAD Nov 1 00:49:29.842000 audit: BPF prog-id=15 op=UNLOAD Nov 1 00:49:29.863000 audit: BPF prog-id=19 op=LOAD Nov 1 00:49:29.877000 audit: BPF prog-id=20 op=LOAD Nov 1 00:49:29.877000 audit: BPF prog-id=16 op=UNLOAD Nov 1 00:49:29.877000 audit: BPF prog-id=17 op=UNLOAD Nov 1 00:49:29.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:29.892000 audit: BPF prog-id=18 op=UNLOAD Nov 1 00:49:29.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:29.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:29.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.670000 audit: BPF prog-id=21 op=LOAD Nov 1 00:49:30.670000 audit: BPF prog-id=22 op=LOAD Nov 1 00:49:30.670000 audit: BPF prog-id=23 op=LOAD Nov 1 00:49:30.671000 audit: BPF prog-id=19 op=UNLOAD Nov 1 00:49:30.671000 audit: BPF prog-id=20 op=UNLOAD Nov 1 00:49:30.715000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Nov 1 00:49:30.715000 audit[999]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffcf7fb3c10 a2=4000 a3=7ffcf7fb3cac items=0 ppid=1 pid=999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:30.715000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Nov 1 00:49:29.801390 systemd[1]: Queued start job for default target multi-user.target. Nov 1 00:49:26.571461 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:49:29.801408 systemd[1]: Unnecessary job was removed for dev-sda6.device. Nov 1 00:49:26.572506 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:26Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Nov 1 00:49:29.879772 systemd[1]: systemd-journald.service: Deactivated successfully. Nov 1 00:49:26.572533 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:26Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Nov 1 00:49:26.572580 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:26Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Nov 1 00:49:26.572594 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:26Z" level=debug msg="skipped missing lower profile" missing profile=oem Nov 1 00:49:26.572643 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:26Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Nov 1 00:49:26.572660 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:26Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Nov 1 00:49:26.573004 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:26Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Nov 1 00:49:26.573057 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:26Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Nov 1 00:49:26.573074 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:26Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Nov 1 00:49:26.575988 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:26Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Nov 1 00:49:26.576038 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:26Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Nov 1 00:49:26.576064 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:26Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Nov 1 00:49:26.576084 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:26Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Nov 1 00:49:26.576109 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:26Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Nov 1 00:49:26.576127 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:26Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Nov 1 00:49:29.165200 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:29Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:49:29.165589 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:29Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:49:29.165761 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:29Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:49:29.166129 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:29Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:49:29.166208 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:29Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Nov 1 00:49:29.167151 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-11-01T00:49:29Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Nov 1 00:49:30.744858 systemd[1]: Starting systemd-udev-trigger.service... Nov 1 00:49:30.758830 systemd[1]: verity-setup.service: Deactivated successfully. Nov 1 00:49:30.764844 systemd[1]: Stopped verity-setup.service. Nov 1 00:49:30.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.785020 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:49:30.793922 systemd[1]: Started systemd-journald.service. Nov 1 00:49:30.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.803407 systemd[1]: Mounted dev-hugepages.mount. Nov 1 00:49:30.811206 systemd[1]: Mounted dev-mqueue.mount. Nov 1 00:49:30.818177 systemd[1]: Mounted media.mount. Nov 1 00:49:30.825178 systemd[1]: Mounted sys-kernel-debug.mount. Nov 1 00:49:30.834166 systemd[1]: Mounted sys-kernel-tracing.mount. Nov 1 00:49:30.843204 systemd[1]: Mounted tmp.mount. Nov 1 00:49:30.850401 systemd[1]: Finished flatcar-tmpfiles.service. Nov 1 00:49:30.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.859405 systemd[1]: Finished kmod-static-nodes.service. Nov 1 00:49:30.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.868339 systemd[1]: modprobe@configfs.service: Deactivated successfully. Nov 1 00:49:30.868574 systemd[1]: Finished modprobe@configfs.service. Nov 1 00:49:30.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.877496 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:49:30.877767 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:49:30.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.886450 systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 1 00:49:30.886711 systemd[1]: Finished modprobe@drm.service. Nov 1 00:49:30.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.895389 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:49:30.895633 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:49:30.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.904354 systemd[1]: modprobe@fuse.service: Deactivated successfully. Nov 1 00:49:30.904584 systemd[1]: Finished modprobe@fuse.service. Nov 1 00:49:30.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.913410 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:49:30.913644 systemd[1]: Finished modprobe@loop.service. Nov 1 00:49:30.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.922397 systemd[1]: Finished systemd-modules-load.service. Nov 1 00:49:30.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.931372 systemd[1]: Finished systemd-network-generator.service. Nov 1 00:49:30.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.940361 systemd[1]: Finished systemd-remount-fs.service. Nov 1 00:49:30.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.949313 systemd[1]: Finished systemd-udev-trigger.service. Nov 1 00:49:30.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:30.958825 systemd[1]: Reached target network-pre.target. Nov 1 00:49:30.968714 systemd[1]: Mounting sys-fs-fuse-connections.mount... Nov 1 00:49:30.979401 systemd[1]: Mounting sys-kernel-config.mount... Nov 1 00:49:30.986924 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Nov 1 00:49:30.989814 systemd[1]: Starting systemd-hwdb-update.service... Nov 1 00:49:30.999125 systemd[1]: Starting systemd-journal-flush.service... Nov 1 00:49:31.009694 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:49:31.011869 systemd[1]: Starting systemd-random-seed.service... Nov 1 00:49:31.012435 systemd-journald[999]: Time spent on flushing to /var/log/journal/9ac03de8d0c707290358b9e8ef4e37f5 is 86.287ms for 1148 entries. Nov 1 00:49:31.012435 systemd-journald[999]: System Journal (/var/log/journal/9ac03de8d0c707290358b9e8ef4e37f5) is 8.0M, max 584.8M, 576.8M free. Nov 1 00:49:31.135266 systemd-journald[999]: Received client request to flush runtime journal. Nov 1 00:49:31.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:31.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:31.027049 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:49:31.029232 systemd[1]: Starting systemd-sysctl.service... Nov 1 00:49:31.038233 systemd[1]: Starting systemd-sysusers.service... Nov 1 00:49:31.046898 systemd[1]: Starting systemd-udev-settle.service... Nov 1 00:49:31.058487 systemd[1]: Mounted sys-fs-fuse-connections.mount. Nov 1 00:49:31.137845 udevadm[1013]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Nov 1 00:49:31.067127 systemd[1]: Mounted sys-kernel-config.mount. Nov 1 00:49:31.082024 systemd[1]: Finished systemd-random-seed.service. Nov 1 00:49:31.091649 systemd[1]: Reached target first-boot-complete.target. Nov 1 00:49:31.103086 systemd[1]: Finished systemd-sysctl.service. Nov 1 00:49:31.136894 systemd[1]: Finished systemd-journal-flush.service. Nov 1 00:49:31.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:31.145685 systemd[1]: Finished systemd-sysusers.service. Nov 1 00:49:31.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:31.156437 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Nov 1 00:49:31.221533 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Nov 1 00:49:31.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:31.755014 systemd[1]: Finished systemd-hwdb-update.service. Nov 1 00:49:31.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:31.763000 audit: BPF prog-id=24 op=LOAD Nov 1 00:49:31.763000 audit: BPF prog-id=25 op=LOAD Nov 1 00:49:31.763000 audit: BPF prog-id=7 op=UNLOAD Nov 1 00:49:31.763000 audit: BPF prog-id=8 op=UNLOAD Nov 1 00:49:31.766393 systemd[1]: Starting systemd-udevd.service... Nov 1 00:49:31.792122 systemd-udevd[1018]: Using default interface naming scheme 'v252'. Nov 1 00:49:31.852083 systemd[1]: Started systemd-udevd.service. Nov 1 00:49:31.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:31.862000 audit: BPF prog-id=26 op=LOAD Nov 1 00:49:31.865929 systemd[1]: Starting systemd-networkd.service... Nov 1 00:49:31.879000 audit: BPF prog-id=27 op=LOAD Nov 1 00:49:31.879000 audit: BPF prog-id=28 op=LOAD Nov 1 00:49:31.879000 audit: BPF prog-id=29 op=LOAD Nov 1 00:49:31.882506 systemd[1]: Starting systemd-userdbd.service... Nov 1 00:49:31.938081 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Nov 1 00:49:31.961515 systemd[1]: Started systemd-userdbd.service. Nov 1 00:49:31.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:32.045190 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Nov 1 00:49:32.114162 systemd-networkd[1031]: lo: Link UP Nov 1 00:49:32.114180 systemd-networkd[1031]: lo: Gained carrier Nov 1 00:49:32.115047 systemd-networkd[1031]: Enumeration completed Nov 1 00:49:32.115233 systemd[1]: Started systemd-networkd.service. Nov 1 00:49:32.116981 systemd-networkd[1031]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Nov 1 00:49:32.119500 systemd-networkd[1031]: eth0: Link UP Nov 1 00:49:32.119669 systemd-networkd[1031]: eth0: Gained carrier Nov 1 00:49:32.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:32.133061 systemd-networkd[1031]: eth0: Overlong DHCP hostname received, shortened from 'ci-3510-3-8-nightly-20251031-2100-eaee09087602307722bd.c.flatcar-212911.internal' to 'ci-3510-3-8-nightly-20251031-2100-eaee09087602307722bd' Nov 1 00:49:32.133086 systemd-networkd[1031]: eth0: DHCPv4 address 10.128.0.106/32, gateway 10.128.0.1 acquired from 169.254.169.254 Nov 1 00:49:32.143850 kernel: ACPI: button: Power Button [PWRF] Nov 1 00:49:32.124000 audit[1021]: AVC avc: denied { confidentiality } for pid=1021 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Nov 1 00:49:32.124000 audit[1021]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55eb48833480 a1=338ec a2=7fb1cf996bc5 a3=5 items=110 ppid=1018 pid=1021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:32.124000 audit: CWD cwd="/" Nov 1 00:49:32.124000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=1 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=2 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=3 name=(null) inode=14625 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=4 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=5 name=(null) inode=14626 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=6 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=7 name=(null) inode=14627 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=8 name=(null) inode=14627 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=9 name=(null) inode=14628 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=10 name=(null) inode=14627 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=11 name=(null) inode=14629 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=12 name=(null) inode=14627 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=13 name=(null) inode=14630 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=14 name=(null) inode=14627 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=15 name=(null) inode=14631 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=16 name=(null) inode=14627 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=17 name=(null) inode=14632 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=18 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=19 name=(null) inode=14633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=20 name=(null) inode=14633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=21 name=(null) inode=14634 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=22 name=(null) inode=14633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=23 name=(null) inode=14635 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=24 name=(null) inode=14633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=25 name=(null) inode=14636 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=26 name=(null) inode=14633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=27 name=(null) inode=14637 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=28 name=(null) inode=14633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=29 name=(null) inode=14638 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=30 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=31 name=(null) inode=14639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=32 name=(null) inode=14639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=33 name=(null) inode=14640 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=34 name=(null) inode=14639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=35 name=(null) inode=14641 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=36 name=(null) inode=14639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=37 name=(null) inode=14642 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=38 name=(null) inode=14639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=39 name=(null) inode=14643 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.154996 kernel: EDAC MC: Ver: 3.0.0 Nov 1 00:49:32.124000 audit: PATH item=40 name=(null) inode=14639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=41 name=(null) inode=14644 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=42 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=43 name=(null) inode=14645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=44 name=(null) inode=14645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=45 name=(null) inode=14646 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=46 name=(null) inode=14645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=47 name=(null) inode=14647 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=48 name=(null) inode=14645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=49 name=(null) inode=14648 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=50 name=(null) inode=14645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=51 name=(null) inode=14649 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=52 name=(null) inode=14645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=53 name=(null) inode=14650 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=55 name=(null) inode=14651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=56 name=(null) inode=14651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=57 name=(null) inode=14652 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=58 name=(null) inode=14651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=59 name=(null) inode=14653 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=60 name=(null) inode=14651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=61 name=(null) inode=14654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=62 name=(null) inode=14654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=63 name=(null) inode=14655 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=64 name=(null) inode=14654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=65 name=(null) inode=14656 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=66 name=(null) inode=14654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=67 name=(null) inode=14657 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=68 name=(null) inode=14654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=69 name=(null) inode=14658 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=70 name=(null) inode=14654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=71 name=(null) inode=14659 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=72 name=(null) inode=14651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=73 name=(null) inode=14660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=74 name=(null) inode=14660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=75 name=(null) inode=14661 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=76 name=(null) inode=14660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=77 name=(null) inode=14662 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=78 name=(null) inode=14660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=79 name=(null) inode=14663 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=80 name=(null) inode=14660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=81 name=(null) inode=14664 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=82 name=(null) inode=14660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=83 name=(null) inode=14665 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=84 name=(null) inode=14651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=85 name=(null) inode=14666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=86 name=(null) inode=14666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=87 name=(null) inode=14667 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=88 name=(null) inode=14666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=89 name=(null) inode=14668 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=90 name=(null) inode=14666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=91 name=(null) inode=14669 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=92 name=(null) inode=14666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=93 name=(null) inode=14670 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=94 name=(null) inode=14666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=95 name=(null) inode=14671 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=96 name=(null) inode=14651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=97 name=(null) inode=14672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=98 name=(null) inode=14672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=99 name=(null) inode=14673 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=100 name=(null) inode=14672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=101 name=(null) inode=14674 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=102 name=(null) inode=14672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=103 name=(null) inode=14675 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=104 name=(null) inode=14672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=105 name=(null) inode=14676 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=106 name=(null) inode=14672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=107 name=(null) inode=14677 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PATH item=109 name=(null) inode=14678 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:49:32.124000 audit: PROCTITLE proctitle="(udev-worker)" Nov 1 00:49:32.174900 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Nov 1 00:49:32.208255 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Nov 1 00:49:32.236859 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Nov 1 00:49:32.273870 kernel: mousedev: PS/2 mouse device common for all mice Nov 1 00:49:32.274042 kernel: ACPI: button: Sleep Button [SLPF] Nov 1 00:49:32.286212 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Nov 1 00:49:32.308404 systemd[1]: Finished systemd-udev-settle.service. Nov 1 00:49:32.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:32.318924 systemd[1]: Starting lvm2-activation-early.service... Nov 1 00:49:32.349404 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Nov 1 00:49:32.384654 systemd[1]: Finished lvm2-activation-early.service. Nov 1 00:49:32.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:32.394266 systemd[1]: Reached target cryptsetup.target. Nov 1 00:49:32.405051 systemd[1]: Starting lvm2-activation.service... Nov 1 00:49:32.412252 lvm[1056]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Nov 1 00:49:32.441753 systemd[1]: Finished lvm2-activation.service. Nov 1 00:49:32.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:32.450189 systemd[1]: Reached target local-fs-pre.target. Nov 1 00:49:32.458977 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Nov 1 00:49:32.459039 systemd[1]: Reached target local-fs.target. Nov 1 00:49:32.466964 systemd[1]: Reached target machines.target. Nov 1 00:49:32.476819 systemd[1]: Starting ldconfig.service... Nov 1 00:49:32.484934 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:49:32.485043 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:49:32.487494 systemd[1]: Starting systemd-boot-update.service... Nov 1 00:49:32.496907 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Nov 1 00:49:32.506461 systemd[1]: Starting systemd-machine-id-commit.service... Nov 1 00:49:32.518039 systemd[1]: Starting systemd-sysext.service... Nov 1 00:49:32.525707 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1058 (bootctl) Nov 1 00:49:32.528108 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Nov 1 00:49:32.546349 systemd[1]: Unmounting usr-share-oem.mount... Nov 1 00:49:32.557008 systemd[1]: usr-share-oem.mount: Deactivated successfully. Nov 1 00:49:32.557350 systemd[1]: Unmounted usr-share-oem.mount. Nov 1 00:49:32.586614 kernel: loop0: detected capacity change from 0 to 224512 Nov 1 00:49:32.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:32.588212 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Nov 1 00:49:32.697775 systemd-fsck[1069]: fsck.fat 4.2 (2021-01-31) Nov 1 00:49:32.697775 systemd-fsck[1069]: /dev/sda1: 790 files, 120773/258078 clusters Nov 1 00:49:32.704888 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Nov 1 00:49:32.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:32.716663 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Nov 1 00:49:32.717624 systemd[1]: Finished systemd-machine-id-commit.service. Nov 1 00:49:32.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:32.733767 systemd[1]: Mounting boot.mount... Nov 1 00:49:32.742054 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Nov 1 00:49:32.763451 systemd[1]: Mounted boot.mount. Nov 1 00:49:32.773843 kernel: loop1: detected capacity change from 0 to 224512 Nov 1 00:49:32.792224 systemd[1]: Finished systemd-boot-update.service. Nov 1 00:49:32.800259 (sd-sysext)[1073]: Using extensions 'kubernetes'. Nov 1 00:49:32.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:32.801483 (sd-sysext)[1073]: Merged extensions into '/usr'. Nov 1 00:49:32.829723 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:49:32.832945 systemd[1]: Mounting usr-share-oem.mount... Nov 1 00:49:32.841346 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:49:32.844463 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:49:32.854249 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:49:32.862878 systemd[1]: Starting modprobe@loop.service... Nov 1 00:49:32.871078 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:49:32.871353 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:49:32.871571 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:49:32.876112 systemd[1]: Mounted usr-share-oem.mount. Nov 1 00:49:32.884537 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:49:32.884789 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:49:32.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:32.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:32.893751 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:49:32.894020 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:49:32.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:32.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:32.903705 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:49:32.903956 systemd[1]: Finished modprobe@loop.service. Nov 1 00:49:32.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:32.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:32.912752 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:49:32.912981 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:49:32.915233 systemd[1]: Finished systemd-sysext.service. Nov 1 00:49:32.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:32.926040 systemd[1]: Starting ensure-sysext.service... Nov 1 00:49:32.935588 systemd[1]: Starting systemd-tmpfiles-setup.service... Nov 1 00:49:32.948531 systemd[1]: Reloading. Nov 1 00:49:32.965389 systemd-tmpfiles[1080]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Nov 1 00:49:32.971678 systemd-tmpfiles[1080]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Nov 1 00:49:32.978528 systemd-tmpfiles[1080]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Nov 1 00:49:33.170893 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-11-01T00:49:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:49:33.173583 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-11-01T00:49:33Z" level=info msg="torcx already run" Nov 1 00:49:33.200455 ldconfig[1057]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Nov 1 00:49:33.321593 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:49:33.321622 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:49:33.345705 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:49:33.423000 audit: BPF prog-id=30 op=LOAD Nov 1 00:49:33.423000 audit: BPF prog-id=21 op=UNLOAD Nov 1 00:49:33.424000 audit: BPF prog-id=31 op=LOAD Nov 1 00:49:33.424000 audit: BPF prog-id=32 op=LOAD Nov 1 00:49:33.424000 audit: BPF prog-id=22 op=UNLOAD Nov 1 00:49:33.424000 audit: BPF prog-id=23 op=UNLOAD Nov 1 00:49:33.425000 audit: BPF prog-id=33 op=LOAD Nov 1 00:49:33.425000 audit: BPF prog-id=26 op=UNLOAD Nov 1 00:49:33.429000 audit: BPF prog-id=34 op=LOAD Nov 1 00:49:33.429000 audit: BPF prog-id=35 op=LOAD Nov 1 00:49:33.429000 audit: BPF prog-id=24 op=UNLOAD Nov 1 00:49:33.429000 audit: BPF prog-id=25 op=UNLOAD Nov 1 00:49:33.430000 audit: BPF prog-id=36 op=LOAD Nov 1 00:49:33.430000 audit: BPF prog-id=27 op=UNLOAD Nov 1 00:49:33.430000 audit: BPF prog-id=37 op=LOAD Nov 1 00:49:33.430000 audit: BPF prog-id=38 op=LOAD Nov 1 00:49:33.430000 audit: BPF prog-id=28 op=UNLOAD Nov 1 00:49:33.430000 audit: BPF prog-id=29 op=UNLOAD Nov 1 00:49:33.436378 systemd[1]: Finished ldconfig.service. Nov 1 00:49:33.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:33.445978 systemd[1]: Finished systemd-tmpfiles-setup.service. Nov 1 00:49:33.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:33.461883 systemd[1]: Starting audit-rules.service... Nov 1 00:49:33.471087 systemd[1]: Starting clean-ca-certificates.service... Nov 1 00:49:33.482437 systemd[1]: Starting oem-gce-enable-oslogin.service... Nov 1 00:49:33.493508 systemd[1]: Starting systemd-journal-catalog-update.service... Nov 1 00:49:33.502000 audit: BPF prog-id=39 op=LOAD Nov 1 00:49:33.506901 systemd[1]: Starting systemd-resolved.service... Nov 1 00:49:33.513000 audit: BPF prog-id=40 op=LOAD Nov 1 00:49:33.517484 systemd[1]: Starting systemd-timesyncd.service... Nov 1 00:49:33.528120 systemd[1]: Starting systemd-update-utmp.service... Nov 1 00:49:33.538448 systemd[1]: Finished clean-ca-certificates.service. Nov 1 00:49:33.539000 audit[1170]: SYSTEM_BOOT pid=1170 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Nov 1 00:49:33.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:33.547645 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Nov 1 00:49:33.547907 systemd[1]: Finished oem-gce-enable-oslogin.service. Nov 1 00:49:33.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:33.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:33.562120 systemd[1]: Finished systemd-journal-catalog-update.service. Nov 1 00:49:33.561000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Nov 1 00:49:33.561000 audit[1174]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffef6fff830 a2=420 a3=0 items=0 ppid=1144 pid=1174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:33.561000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Nov 1 00:49:33.563982 augenrules[1174]: No rules Nov 1 00:49:33.572737 systemd[1]: Finished audit-rules.service. Nov 1 00:49:33.590609 systemd[1]: Finished systemd-update-utmp.service. Nov 1 00:49:33.600888 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:49:33.601322 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:49:33.606071 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:49:33.618318 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:49:33.628909 systemd[1]: Starting modprobe@loop.service... Nov 1 00:49:33.639221 systemd[1]: Starting oem-gce-enable-oslogin.service... Nov 1 00:49:33.645982 enable-oslogin[1182]: /etc/pam.d/sshd already exists. Not enabling OS Login Nov 1 00:49:33.648073 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:49:33.649295 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:49:33.652350 systemd[1]: Starting systemd-update-done.service... Nov 1 00:49:33.659934 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:49:33.660166 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:49:33.663351 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:49:33.663608 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:49:33.672843 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:49:33.673084 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:49:33.682653 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:49:33.682887 systemd[1]: Finished modprobe@loop.service. Nov 1 00:49:33.692894 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Nov 1 00:49:33.693192 systemd[1]: Finished oem-gce-enable-oslogin.service. Nov 1 00:49:33.702782 systemd[1]: Finished systemd-update-done.service. Nov 1 00:49:33.714293 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:49:33.714756 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:49:33.717952 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:49:33.720540 systemd-resolved[1160]: Positive Trust Anchors: Nov 1 00:49:33.720567 systemd-resolved[1160]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Nov 1 00:49:33.720631 systemd-resolved[1160]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Nov 1 00:49:33.727227 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:49:33.735410 systemd-resolved[1160]: Defaulting to hostname 'linux'. Nov 1 00:49:33.736335 systemd[1]: Starting modprobe@loop.service... Nov 1 00:49:33.746336 systemd[1]: Starting oem-gce-enable-oslogin.service... Nov 1 00:49:33.752693 enable-oslogin[1187]: /etc/pam.d/sshd already exists. Not enabling OS Login Nov 1 00:49:33.755069 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:49:33.755359 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:49:33.755567 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:49:33.755728 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:49:33.757927 systemd[1]: Started systemd-resolved.service. Nov 1 00:49:33.766752 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:49:33.767040 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:49:33.775759 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:49:33.776059 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:49:33.784484 systemd-timesyncd[1167]: Contacted time server 169.254.169.254:123 (169.254.169.254). Nov 1 00:49:33.784588 systemd-timesyncd[1167]: Initial clock synchronization to Sat 2025-11-01 00:49:33.482085 UTC. Nov 1 00:49:33.785322 systemd[1]: Started systemd-timesyncd.service. Nov 1 00:49:33.795288 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:49:33.795595 systemd[1]: Finished modprobe@loop.service. Nov 1 00:49:33.804533 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Nov 1 00:49:33.804733 systemd[1]: Finished oem-gce-enable-oslogin.service. Nov 1 00:49:33.817773 systemd[1]: Reached target network.target. Nov 1 00:49:33.827162 systemd[1]: Reached target nss-lookup.target. Nov 1 00:49:33.836187 systemd[1]: Reached target time-set.target. Nov 1 00:49:33.845187 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:49:33.845714 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:49:33.848459 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:49:33.858315 systemd[1]: Starting modprobe@drm.service... Nov 1 00:49:33.868420 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:49:33.878329 systemd[1]: Starting modprobe@loop.service... Nov 1 00:49:33.888307 systemd[1]: Starting oem-gce-enable-oslogin.service... Nov 1 00:49:33.892746 enable-oslogin[1193]: /etc/pam.d/sshd already exists. Not enabling OS Login Nov 1 00:49:33.897052 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:49:33.897394 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:49:33.899674 systemd[1]: Starting systemd-networkd-wait-online.service... Nov 1 00:49:33.908049 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:49:33.908549 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:49:33.911589 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:49:33.911859 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:49:33.920708 systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 1 00:49:33.920979 systemd[1]: Finished modprobe@drm.service. Nov 1 00:49:33.929617 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:49:33.929883 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:49:33.938647 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:49:33.938904 systemd[1]: Finished modprobe@loop.service. Nov 1 00:49:33.947590 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Nov 1 00:49:33.947883 systemd[1]: Finished oem-gce-enable-oslogin.service. Nov 1 00:49:33.956996 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:49:33.957247 systemd[1]: Reached target sysinit.target. Nov 1 00:49:33.966080 systemd[1]: Started motdgen.path. Nov 1 00:49:33.972999 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Nov 1 00:49:33.983254 systemd[1]: Started logrotate.timer. Nov 1 00:49:33.990105 systemd[1]: Started mdadm.timer. Nov 1 00:49:33.996970 systemd[1]: Started systemd-tmpfiles-clean.timer. Nov 1 00:49:34.004977 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Nov 1 00:49:34.005038 systemd[1]: Reached target paths.target. Nov 1 00:49:34.011922 systemd[1]: Reached target timers.target. Nov 1 00:49:34.019785 systemd[1]: Listening on dbus.socket. Nov 1 00:49:34.028602 systemd[1]: Starting docker.socket... Nov 1 00:49:34.040138 systemd[1]: Listening on sshd.socket. Nov 1 00:49:34.047074 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:49:34.047169 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:49:34.048235 systemd[1]: Finished ensure-sysext.service. Nov 1 00:49:34.056200 systemd[1]: Listening on docker.socket. Nov 1 00:49:34.064132 systemd[1]: Reached target sockets.target. Nov 1 00:49:34.071911 systemd[1]: Reached target basic.target. Nov 1 00:49:34.078990 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Nov 1 00:49:34.079039 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Nov 1 00:49:34.080937 systemd[1]: Starting containerd.service... Nov 1 00:49:34.089774 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Nov 1 00:49:34.099682 systemd[1]: Starting dbus.service... Nov 1 00:49:34.108876 systemd[1]: Starting enable-oem-cloudinit.service... Nov 1 00:49:34.118410 systemd[1]: Starting extend-filesystems.service... Nov 1 00:49:34.140521 jq[1200]: false Nov 1 00:49:34.124998 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Nov 1 00:49:34.127498 systemd[1]: Starting motdgen.service... Nov 1 00:49:34.136258 systemd[1]: Starting ssh-key-proc-cmdline.service... Nov 1 00:49:34.145243 systemd[1]: Starting sshd-keygen.service... Nov 1 00:49:34.147710 systemd-networkd[1031]: eth0: Gained IPv6LL Nov 1 00:49:34.156189 systemd[1]: Starting systemd-logind.service... Nov 1 00:49:34.162985 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:49:34.163139 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Nov 1 00:49:34.163989 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Nov 1 00:49:34.165517 systemd[1]: Starting update-engine.service... Nov 1 00:49:34.173931 systemd[1]: Starting update-ssh-keys-after-ignition.service... Nov 1 00:49:34.181139 jq[1215]: true Nov 1 00:49:34.184907 systemd[1]: Finished systemd-networkd-wait-online.service. Nov 1 00:49:34.197207 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Nov 1 00:49:34.197545 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Nov 1 00:49:34.198179 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Nov 1 00:49:34.198447 systemd[1]: Finished ssh-key-proc-cmdline.service. Nov 1 00:49:34.211322 systemd[1]: Reached target network-online.target. Nov 1 00:49:34.222392 systemd[1]: Starting kubelet.service... Nov 1 00:49:34.226020 jq[1223]: true Nov 1 00:49:34.231071 systemd[1]: Starting oem-gce.service... Nov 1 00:49:34.238838 systemd[1]: motdgen.service: Deactivated successfully. Nov 1 00:49:34.239130 systemd[1]: Finished motdgen.service. Nov 1 00:49:34.259460 extend-filesystems[1201]: Found loop1 Nov 1 00:49:34.269524 extend-filesystems[1201]: Found sda Nov 1 00:49:34.269524 extend-filesystems[1201]: Found sda1 Nov 1 00:49:34.269524 extend-filesystems[1201]: Found sda2 Nov 1 00:49:34.269524 extend-filesystems[1201]: Found sda3 Nov 1 00:49:34.269524 extend-filesystems[1201]: Found usr Nov 1 00:49:34.269524 extend-filesystems[1201]: Found sda4 Nov 1 00:49:34.269524 extend-filesystems[1201]: Found sda6 Nov 1 00:49:34.269524 extend-filesystems[1201]: Found sda7 Nov 1 00:49:34.269524 extend-filesystems[1201]: Found sda9 Nov 1 00:49:34.269524 extend-filesystems[1201]: Checking size of /dev/sda9 Nov 1 00:49:34.341918 mkfs.ext4[1230]: mke2fs 1.46.5 (30-Dec-2021) Nov 1 00:49:34.341918 mkfs.ext4[1230]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Nov 1 00:49:34.341918 mkfs.ext4[1230]: Creating filesystem with 262144 4k blocks and 65536 inodes Nov 1 00:49:34.341918 mkfs.ext4[1230]: Filesystem UUID: 7b92becd-a5a5-44bc-83df-22488912b7d7 Nov 1 00:49:34.341918 mkfs.ext4[1230]: Superblock backups stored on blocks: Nov 1 00:49:34.341918 mkfs.ext4[1230]: 32768, 98304, 163840, 229376 Nov 1 00:49:34.341918 mkfs.ext4[1230]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Nov 1 00:49:34.341918 mkfs.ext4[1230]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Nov 1 00:49:34.341918 mkfs.ext4[1230]: Creating journal (8192 blocks): done Nov 1 00:49:34.341918 mkfs.ext4[1230]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Nov 1 00:49:34.368704 dbus-daemon[1199]: [system] SELinux support is enabled Nov 1 00:49:34.372820 update_engine[1214]: I1101 00:49:34.372738 1214 main.cc:92] Flatcar Update Engine starting Nov 1 00:49:34.378158 systemd[1]: Started dbus.service. Nov 1 00:49:34.389885 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Nov 1 00:49:34.389957 systemd[1]: Reached target system-config.target. Nov 1 00:49:34.393398 dbus-daemon[1199]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1031 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Nov 1 00:49:34.399013 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Nov 1 00:49:34.399068 systemd[1]: Reached target user-config.target. Nov 1 00:49:34.410440 extend-filesystems[1201]: Resized partition /dev/sda9 Nov 1 00:49:34.419147 extend-filesystems[1256]: resize2fs 1.46.5 (30-Dec-2021) Nov 1 00:49:34.459317 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 3587067 blocks Nov 1 00:49:34.459373 kernel: loop2: detected capacity change from 0 to 2097152 Nov 1 00:49:34.417034 dbus-daemon[1199]: [system] Successfully activated service 'org.freedesktop.systemd1' Nov 1 00:49:34.416460 systemd[1]: Started update-engine.service. Nov 1 00:49:34.459601 update_engine[1214]: I1101 00:49:34.417053 1214 update_check_scheduler.cc:74] Next update check in 2m57s Nov 1 00:49:34.459707 umount[1249]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Nov 1 00:49:34.447511 systemd[1]: Started locksmithd.service. Nov 1 00:49:34.465863 bash[1257]: Updated "/home/core/.ssh/authorized_keys" Nov 1 00:49:34.470780 systemd[1]: Starting systemd-hostnamed.service... Nov 1 00:49:34.478817 systemd[1]: Finished update-ssh-keys-after-ignition.service. Nov 1 00:49:34.502833 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Nov 1 00:49:34.510365 systemd-logind[1208]: Watching system buttons on /dev/input/event1 (Power Button) Nov 1 00:49:34.511733 systemd-logind[1208]: Watching system buttons on /dev/input/event3 (Sleep Button) Nov 1 00:49:34.512320 systemd-logind[1208]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Nov 1 00:49:34.513319 systemd-logind[1208]: New seat seat0. Nov 1 00:49:34.540028 systemd[1]: Started systemd-logind.service. Nov 1 00:49:34.543613 env[1224]: time="2025-11-01T00:49:34.543537032Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Nov 1 00:49:34.576256 coreos-metadata[1198]: Nov 01 00:49:34.576 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Nov 1 00:49:34.581155 coreos-metadata[1198]: Nov 01 00:49:34.580 INFO Fetch failed with 404: resource not found Nov 1 00:49:34.581479 coreos-metadata[1198]: Nov 01 00:49:34.581 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Nov 1 00:49:34.584671 coreos-metadata[1198]: Nov 01 00:49:34.584 INFO Fetch successful Nov 1 00:49:34.585116 coreos-metadata[1198]: Nov 01 00:49:34.584 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Nov 1 00:49:34.587377 coreos-metadata[1198]: Nov 01 00:49:34.587 INFO Fetch failed with 404: resource not found Nov 1 00:49:34.587894 coreos-metadata[1198]: Nov 01 00:49:34.587 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Nov 1 00:49:34.588676 coreos-metadata[1198]: Nov 01 00:49:34.588 INFO Fetch failed with 404: resource not found Nov 1 00:49:34.589059 coreos-metadata[1198]: Nov 01 00:49:34.588 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Nov 1 00:49:34.595818 kernel: EXT4-fs (sda9): resized filesystem to 3587067 Nov 1 00:49:34.627211 coreos-metadata[1198]: Nov 01 00:49:34.589 INFO Fetch successful Nov 1 00:49:34.627356 env[1224]: time="2025-11-01T00:49:34.619292087Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Nov 1 00:49:34.627915 extend-filesystems[1256]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Nov 1 00:49:34.627915 extend-filesystems[1256]: old_desc_blocks = 1, new_desc_blocks = 2 Nov 1 00:49:34.627915 extend-filesystems[1256]: The filesystem on /dev/sda9 is now 3587067 (4k) blocks long. Nov 1 00:49:34.678007 extend-filesystems[1201]: Resized filesystem in /dev/sda9 Nov 1 00:49:34.629170 unknown[1198]: wrote ssh authorized keys file for user: core Nov 1 00:49:34.686271 env[1224]: time="2025-11-01T00:49:34.647858341Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:49:34.686271 env[1224]: time="2025-11-01T00:49:34.652270582Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:49:34.686271 env[1224]: time="2025-11-01T00:49:34.652358804Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:49:34.629901 systemd[1]: extend-filesystems.service: Deactivated successfully. Nov 1 00:49:34.630232 systemd[1]: Finished extend-filesystems.service. Nov 1 00:49:34.699226 env[1224]: time="2025-11-01T00:49:34.652793674Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:49:34.699923 env[1224]: time="2025-11-01T00:49:34.699538782Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Nov 1 00:49:34.700099 update-ssh-keys[1272]: Updated "/home/core/.ssh/authorized_keys" Nov 1 00:49:34.701516 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Nov 1 00:49:34.703390 env[1224]: time="2025-11-01T00:49:34.703344862Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Nov 1 00:49:34.703531 env[1224]: time="2025-11-01T00:49:34.703505037Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Nov 1 00:49:34.703866 env[1224]: time="2025-11-01T00:49:34.703774550Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:49:34.705434 env[1224]: time="2025-11-01T00:49:34.705400565Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:49:34.708940 env[1224]: time="2025-11-01T00:49:34.708897267Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:49:34.714681 env[1224]: time="2025-11-01T00:49:34.714644184Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Nov 1 00:49:34.719434 env[1224]: time="2025-11-01T00:49:34.719397619Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Nov 1 00:49:34.719921 env[1224]: time="2025-11-01T00:49:34.719892983Z" level=info msg="metadata content store policy set" policy=shared Nov 1 00:49:34.732978 env[1224]: time="2025-11-01T00:49:34.732870529Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Nov 1 00:49:34.733192 env[1224]: time="2025-11-01T00:49:34.733154676Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Nov 1 00:49:34.733331 env[1224]: time="2025-11-01T00:49:34.733307767Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Nov 1 00:49:34.733643 env[1224]: time="2025-11-01T00:49:34.733617530Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Nov 1 00:49:34.733833 env[1224]: time="2025-11-01T00:49:34.733770883Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Nov 1 00:49:34.733968 env[1224]: time="2025-11-01T00:49:34.733943855Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Nov 1 00:49:34.734108 env[1224]: time="2025-11-01T00:49:34.734084598Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Nov 1 00:49:34.734264 env[1224]: time="2025-11-01T00:49:34.734240935Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Nov 1 00:49:34.734406 env[1224]: time="2025-11-01T00:49:34.734376437Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Nov 1 00:49:34.734545 env[1224]: time="2025-11-01T00:49:34.734521649Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Nov 1 00:49:34.734688 env[1224]: time="2025-11-01T00:49:34.734665222Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Nov 1 00:49:34.734852 env[1224]: time="2025-11-01T00:49:34.734828547Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Nov 1 00:49:34.735159 env[1224]: time="2025-11-01T00:49:34.735137206Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Nov 1 00:49:34.735454 env[1224]: time="2025-11-01T00:49:34.735432661Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Nov 1 00:49:34.736220 env[1224]: time="2025-11-01T00:49:34.736193719Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Nov 1 00:49:34.736382 env[1224]: time="2025-11-01T00:49:34.736359156Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Nov 1 00:49:34.736626 env[1224]: time="2025-11-01T00:49:34.736601879Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Nov 1 00:49:34.737017 env[1224]: time="2025-11-01T00:49:34.736981141Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Nov 1 00:49:34.737246 env[1224]: time="2025-11-01T00:49:34.737219247Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Nov 1 00:49:34.742107 env[1224]: time="2025-11-01T00:49:34.742064591Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Nov 1 00:49:34.742396 env[1224]: time="2025-11-01T00:49:34.742370417Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Nov 1 00:49:34.742986 env[1224]: time="2025-11-01T00:49:34.742956341Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Nov 1 00:49:34.743265 env[1224]: time="2025-11-01T00:49:34.743240740Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Nov 1 00:49:34.743538 env[1224]: time="2025-11-01T00:49:34.743514267Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Nov 1 00:49:34.743814 env[1224]: time="2025-11-01T00:49:34.743763659Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Nov 1 00:49:34.744222 env[1224]: time="2025-11-01T00:49:34.744161712Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Nov 1 00:49:34.744983 env[1224]: time="2025-11-01T00:49:34.744938829Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Nov 1 00:49:34.745332 env[1224]: time="2025-11-01T00:49:34.745304302Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Nov 1 00:49:34.745599 env[1224]: time="2025-11-01T00:49:34.745572424Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Nov 1 00:49:34.745888 env[1224]: time="2025-11-01T00:49:34.745862913Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Nov 1 00:49:34.746314 env[1224]: time="2025-11-01T00:49:34.746284680Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Nov 1 00:49:34.746450 env[1224]: time="2025-11-01T00:49:34.746428313Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Nov 1 00:49:34.746587 env[1224]: time="2025-11-01T00:49:34.746564542Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Nov 1 00:49:34.746749 env[1224]: time="2025-11-01T00:49:34.746727414Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Nov 1 00:49:34.747482 env[1224]: time="2025-11-01T00:49:34.747387414Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Nov 1 00:49:34.751213 env[1224]: time="2025-11-01T00:49:34.750063267Z" level=info msg="Connect containerd service" Nov 1 00:49:34.751213 env[1224]: time="2025-11-01T00:49:34.750144956Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Nov 1 00:49:34.752277 env[1224]: time="2025-11-01T00:49:34.752241393Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Nov 1 00:49:34.764734 env[1224]: time="2025-11-01T00:49:34.764686977Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Nov 1 00:49:34.765818 env[1224]: time="2025-11-01T00:49:34.765772826Z" level=info msg=serving... address=/run/containerd/containerd.sock Nov 1 00:49:34.767619 env[1224]: time="2025-11-01T00:49:34.767593477Z" level=info msg="containerd successfully booted in 0.239641s" Nov 1 00:49:34.767696 systemd[1]: Started containerd.service. Nov 1 00:49:34.777477 dbus-daemon[1199]: [system] Successfully activated service 'org.freedesktop.hostname1' Nov 1 00:49:34.778127 systemd[1]: Started systemd-hostnamed.service. Nov 1 00:49:34.780758 dbus-daemon[1199]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1261 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Nov 1 00:49:34.791564 env[1224]: time="2025-11-01T00:49:34.789239134Z" level=info msg="Start subscribing containerd event" Nov 1 00:49:34.791329 systemd[1]: Starting polkit.service... Nov 1 00:49:34.805828 env[1224]: time="2025-11-01T00:49:34.804426299Z" level=info msg="Start recovering state" Nov 1 00:49:34.805828 env[1224]: time="2025-11-01T00:49:34.804648216Z" level=info msg="Start event monitor" Nov 1 00:49:34.805828 env[1224]: time="2025-11-01T00:49:34.804675003Z" level=info msg="Start snapshots syncer" Nov 1 00:49:34.805828 env[1224]: time="2025-11-01T00:49:34.804719453Z" level=info msg="Start cni network conf syncer for default" Nov 1 00:49:34.805828 env[1224]: time="2025-11-01T00:49:34.804743024Z" level=info msg="Start streaming server" Nov 1 00:49:34.881166 polkitd[1274]: Started polkitd version 121 Nov 1 00:49:34.913433 polkitd[1274]: Loading rules from directory /etc/polkit-1/rules.d Nov 1 00:49:34.913774 polkitd[1274]: Loading rules from directory /usr/share/polkit-1/rules.d Nov 1 00:49:34.917014 polkitd[1274]: Finished loading, compiling and executing 2 rules Nov 1 00:49:34.917715 dbus-daemon[1199]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Nov 1 00:49:34.918058 systemd[1]: Started polkit.service. Nov 1 00:49:34.918270 polkitd[1274]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Nov 1 00:49:34.972090 systemd-hostnamed[1261]: Hostname set to (transient) Nov 1 00:49:34.975842 systemd-resolved[1160]: System hostname changed to 'ci-3510-3-8-nightly-20251031-2100-eaee09087602307722bd'. Nov 1 00:49:36.683069 systemd[1]: Started kubelet.service. Nov 1 00:49:37.873145 locksmithd[1259]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Nov 1 00:49:38.167342 kubelet[1286]: E1101 00:49:38.167205 1286 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 00:49:38.173999 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 00:49:38.174233 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 00:49:38.174643 systemd[1]: kubelet.service: Consumed 1.638s CPU time. Nov 1 00:49:38.192934 sshd_keygen[1222]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Nov 1 00:49:38.238145 systemd[1]: Finished sshd-keygen.service. Nov 1 00:49:38.248169 systemd[1]: Starting issuegen.service... Nov 1 00:49:38.260002 systemd[1]: issuegen.service: Deactivated successfully. Nov 1 00:49:38.260286 systemd[1]: Finished issuegen.service. Nov 1 00:49:38.269926 systemd[1]: Starting systemd-user-sessions.service... Nov 1 00:49:38.283605 systemd[1]: Finished systemd-user-sessions.service. Nov 1 00:49:38.294678 systemd[1]: Started getty@tty1.service. Nov 1 00:49:38.304725 systemd[1]: Started serial-getty@ttyS0.service. Nov 1 00:49:38.314205 systemd[1]: Reached target getty.target. Nov 1 00:49:40.316964 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Nov 1 00:49:42.375833 kernel: loop2: detected capacity change from 0 to 2097152 Nov 1 00:49:42.391979 systemd-nspawn[1309]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Nov 1 00:49:42.391979 systemd-nspawn[1309]: Press ^] three times within 1s to kill container. Nov 1 00:49:42.404844 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Nov 1 00:49:42.485283 systemd[1]: Started oem-gce.service. Nov 1 00:49:42.494527 systemd[1]: Reached target multi-user.target. Nov 1 00:49:42.505537 systemd[1]: Starting systemd-update-utmp-runlevel.service... Nov 1 00:49:42.519764 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Nov 1 00:49:42.520042 systemd[1]: Finished systemd-update-utmp-runlevel.service. Nov 1 00:49:42.531147 systemd[1]: Startup finished in 1.136s (kernel) + 8.223s (initrd) + 16.421s (userspace) = 25.781s. Nov 1 00:49:42.538902 systemd-nspawn[1309]: + '[' -e /etc/default/instance_configs.cfg.template ']' Nov 1 00:49:42.538902 systemd-nspawn[1309]: + echo -e '[InstanceSetup]\nset_host_keys = false' Nov 1 00:49:42.538902 systemd-nspawn[1309]: + /usr/bin/google_instance_setup Nov 1 00:49:43.205268 instance-setup[1315]: INFO Running google_set_multiqueue. Nov 1 00:49:43.223268 instance-setup[1315]: INFO Set channels for eth0 to 2. Nov 1 00:49:43.225055 systemd[1]: Created slice system-sshd.slice. Nov 1 00:49:43.230233 systemd[1]: Started sshd@0-10.128.0.106:22-139.178.68.195:40662.service. Nov 1 00:49:43.230930 instance-setup[1315]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Nov 1 00:49:43.234662 instance-setup[1315]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Nov 1 00:49:43.235528 instance-setup[1315]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Nov 1 00:49:43.240287 instance-setup[1315]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Nov 1 00:49:43.240688 instance-setup[1315]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Nov 1 00:49:43.242536 instance-setup[1315]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Nov 1 00:49:43.242918 instance-setup[1315]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Nov 1 00:49:43.245014 instance-setup[1315]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Nov 1 00:49:43.260961 instance-setup[1315]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Nov 1 00:49:43.261138 instance-setup[1315]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Nov 1 00:49:43.315603 systemd-nspawn[1309]: + /usr/bin/google_metadata_script_runner --script-type startup Nov 1 00:49:43.571587 sshd[1334]: Accepted publickey for core from 139.178.68.195 port 40662 ssh2: RSA SHA256:GSqF/4F3rRKdKeqeDHvdnEOSnHTK3+r0cz3SPwoprYw Nov 1 00:49:43.575811 sshd[1334]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:49:43.596724 systemd[1]: Created slice user-500.slice. Nov 1 00:49:43.599037 systemd[1]: Starting user-runtime-dir@500.service... Nov 1 00:49:43.615953 systemd-logind[1208]: New session 1 of user core. Nov 1 00:49:43.626089 systemd[1]: Finished user-runtime-dir@500.service. Nov 1 00:49:43.630284 systemd[1]: Starting user@500.service... Nov 1 00:49:43.650844 (systemd)[1353]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:49:43.740877 startup-script[1349]: INFO Starting startup scripts. Nov 1 00:49:43.757310 startup-script[1349]: INFO No startup scripts found in metadata. Nov 1 00:49:43.757487 startup-script[1349]: INFO Finished running startup scripts. Nov 1 00:49:43.804445 systemd-nspawn[1309]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Nov 1 00:49:43.805195 systemd-nspawn[1309]: + daemon_pids=() Nov 1 00:49:43.805195 systemd-nspawn[1309]: + for d in accounts clock_skew network Nov 1 00:49:43.805195 systemd-nspawn[1309]: + daemon_pids+=($!) Nov 1 00:49:43.805395 systemd-nspawn[1309]: + for d in accounts clock_skew network Nov 1 00:49:43.805649 systemd-nspawn[1309]: + daemon_pids+=($!) Nov 1 00:49:43.805907 systemd-nspawn[1309]: + for d in accounts clock_skew network Nov 1 00:49:43.806256 systemd-nspawn[1309]: + daemon_pids+=($!) Nov 1 00:49:43.806426 systemd-nspawn[1309]: + NOTIFY_SOCKET=/run/systemd/notify Nov 1 00:49:43.806505 systemd-nspawn[1309]: + /usr/bin/systemd-notify --ready Nov 1 00:49:43.807182 systemd-nspawn[1309]: + /usr/bin/google_network_daemon Nov 1 00:49:43.810037 systemd-nspawn[1309]: + /usr/bin/google_clock_skew_daemon Nov 1 00:49:43.811436 systemd-nspawn[1309]: + /usr/bin/google_accounts_daemon Nov 1 00:49:43.817553 systemd[1353]: Queued start job for default target default.target. Nov 1 00:49:43.818572 systemd[1353]: Reached target paths.target. Nov 1 00:49:43.818609 systemd[1353]: Reached target sockets.target. Nov 1 00:49:43.818634 systemd[1353]: Reached target timers.target. Nov 1 00:49:43.818656 systemd[1353]: Reached target basic.target. Nov 1 00:49:43.818739 systemd[1353]: Reached target default.target. Nov 1 00:49:43.818859 systemd[1353]: Startup finished in 153ms. Nov 1 00:49:43.819030 systemd[1]: Started user@500.service. Nov 1 00:49:43.821020 systemd[1]: Started session-1.scope. Nov 1 00:49:43.867326 systemd-nspawn[1309]: + wait -n 36 37 38 Nov 1 00:49:44.053021 systemd[1]: Started sshd@1-10.128.0.106:22-139.178.68.195:40676.service. Nov 1 00:49:44.381592 sshd[1366]: Accepted publickey for core from 139.178.68.195 port 40676 ssh2: RSA SHA256:GSqF/4F3rRKdKeqeDHvdnEOSnHTK3+r0cz3SPwoprYw Nov 1 00:49:44.383615 sshd[1366]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:49:44.394367 systemd[1]: Started session-2.scope. Nov 1 00:49:44.397218 systemd-logind[1208]: New session 2 of user core. Nov 1 00:49:44.597395 google-clock-skew[1360]: INFO Starting Google Clock Skew daemon. Nov 1 00:49:44.609070 sshd[1366]: pam_unix(sshd:session): session closed for user core Nov 1 00:49:44.616552 systemd[1]: sshd@1-10.128.0.106:22-139.178.68.195:40676.service: Deactivated successfully. Nov 1 00:49:44.617984 systemd[1]: session-2.scope: Deactivated successfully. Nov 1 00:49:44.620159 systemd-logind[1208]: Session 2 logged out. Waiting for processes to exit. Nov 1 00:49:44.622170 systemd-logind[1208]: Removed session 2. Nov 1 00:49:44.625164 google-clock-skew[1360]: INFO Clock drift token has changed: 0. Nov 1 00:49:44.641232 systemd-nspawn[1309]: hwclock: Cannot access the Hardware Clock via any known method. Nov 1 00:49:44.641872 systemd-nspawn[1309]: hwclock: Use the --verbose option to see the details of our search for an access method. Nov 1 00:49:44.643166 google-clock-skew[1360]: WARNING Failed to sync system time with hardware clock. Nov 1 00:49:44.658578 systemd[1]: Started sshd@2-10.128.0.106:22-139.178.68.195:40690.service. Nov 1 00:49:44.777759 groupadd[1381]: group added to /etc/group: name=google-sudoers, GID=1000 Nov 1 00:49:44.782390 groupadd[1381]: group added to /etc/gshadow: name=google-sudoers Nov 1 00:49:44.789606 groupadd[1381]: new group: name=google-sudoers, GID=1000 Nov 1 00:49:44.795890 google-networking[1361]: INFO Starting Google Networking daemon. Nov 1 00:49:44.809307 google-accounts[1359]: INFO Starting Google Accounts daemon. Nov 1 00:49:44.840501 google-accounts[1359]: WARNING OS Login not installed. Nov 1 00:49:44.841718 google-accounts[1359]: INFO Creating a new user account for 0. Nov 1 00:49:44.849400 systemd-nspawn[1309]: useradd: invalid user name '0': use --badname to ignore Nov 1 00:49:44.850325 google-accounts[1359]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Nov 1 00:49:44.965956 sshd[1379]: Accepted publickey for core from 139.178.68.195 port 40690 ssh2: RSA SHA256:GSqF/4F3rRKdKeqeDHvdnEOSnHTK3+r0cz3SPwoprYw Nov 1 00:49:44.967902 sshd[1379]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:49:44.975938 systemd[1]: Started session-3.scope. Nov 1 00:49:44.976967 systemd-logind[1208]: New session 3 of user core. Nov 1 00:49:45.178240 sshd[1379]: pam_unix(sshd:session): session closed for user core Nov 1 00:49:45.183585 systemd[1]: sshd@2-10.128.0.106:22-139.178.68.195:40690.service: Deactivated successfully. Nov 1 00:49:45.184883 systemd[1]: session-3.scope: Deactivated successfully. Nov 1 00:49:45.185944 systemd-logind[1208]: Session 3 logged out. Waiting for processes to exit. Nov 1 00:49:45.187526 systemd-logind[1208]: Removed session 3. Nov 1 00:49:45.224755 systemd[1]: Started sshd@3-10.128.0.106:22-139.178.68.195:40702.service. Nov 1 00:49:45.515865 sshd[1396]: Accepted publickey for core from 139.178.68.195 port 40702 ssh2: RSA SHA256:GSqF/4F3rRKdKeqeDHvdnEOSnHTK3+r0cz3SPwoprYw Nov 1 00:49:45.518226 sshd[1396]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:49:45.525887 systemd[1]: Started session-4.scope. Nov 1 00:49:45.526753 systemd-logind[1208]: New session 4 of user core. Nov 1 00:49:45.734259 sshd[1396]: pam_unix(sshd:session): session closed for user core Nov 1 00:49:45.739367 systemd-logind[1208]: Session 4 logged out. Waiting for processes to exit. Nov 1 00:49:45.739709 systemd[1]: sshd@3-10.128.0.106:22-139.178.68.195:40702.service: Deactivated successfully. Nov 1 00:49:45.741034 systemd[1]: session-4.scope: Deactivated successfully. Nov 1 00:49:45.742314 systemd-logind[1208]: Removed session 4. Nov 1 00:49:45.783608 systemd[1]: Started sshd@4-10.128.0.106:22-139.178.68.195:40708.service. Nov 1 00:49:46.081878 sshd[1402]: Accepted publickey for core from 139.178.68.195 port 40708 ssh2: RSA SHA256:GSqF/4F3rRKdKeqeDHvdnEOSnHTK3+r0cz3SPwoprYw Nov 1 00:49:46.083956 sshd[1402]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:49:46.091449 systemd[1]: Started session-5.scope. Nov 1 00:49:46.092351 systemd-logind[1208]: New session 5 of user core. Nov 1 00:49:46.290369 sudo[1405]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Nov 1 00:49:46.290912 sudo[1405]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:49:46.300129 dbus-daemon[1199]: \xd0}\x86\xd5YU: received setenforce notice (enforcing=629413696) Nov 1 00:49:46.302849 sudo[1405]: pam_unix(sudo:session): session closed for user root Nov 1 00:49:46.349472 sshd[1402]: pam_unix(sshd:session): session closed for user core Nov 1 00:49:46.355642 systemd[1]: sshd@4-10.128.0.106:22-139.178.68.195:40708.service: Deactivated successfully. Nov 1 00:49:46.357019 systemd[1]: session-5.scope: Deactivated successfully. Nov 1 00:49:46.357963 systemd-logind[1208]: Session 5 logged out. Waiting for processes to exit. Nov 1 00:49:46.359378 systemd-logind[1208]: Removed session 5. Nov 1 00:49:46.395346 systemd[1]: Started sshd@5-10.128.0.106:22-139.178.68.195:40722.service. Nov 1 00:49:46.685963 sshd[1409]: Accepted publickey for core from 139.178.68.195 port 40722 ssh2: RSA SHA256:GSqF/4F3rRKdKeqeDHvdnEOSnHTK3+r0cz3SPwoprYw Nov 1 00:49:46.687890 sshd[1409]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:49:46.693960 systemd-logind[1208]: New session 6 of user core. Nov 1 00:49:46.695738 systemd[1]: Started session-6.scope. Nov 1 00:49:46.866155 sudo[1413]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Nov 1 00:49:46.866649 sudo[1413]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:49:46.872124 sudo[1413]: pam_unix(sudo:session): session closed for user root Nov 1 00:49:46.887015 sudo[1412]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Nov 1 00:49:46.887536 sudo[1412]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:49:46.903490 systemd[1]: Stopping audit-rules.service... Nov 1 00:49:46.905000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Nov 1 00:49:46.906604 auditctl[1416]: No rules Nov 1 00:49:46.913835 kernel: kauditd_printk_skb: 219 callbacks suppressed Nov 1 00:49:46.913970 kernel: audit: type=1305 audit(1761958186.905:200): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Nov 1 00:49:46.907452 systemd[1]: audit-rules.service: Deactivated successfully. Nov 1 00:49:46.907723 systemd[1]: Stopped audit-rules.service. Nov 1 00:49:46.910550 systemd[1]: Starting audit-rules.service... Nov 1 00:49:46.905000 audit[1416]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcd40036e0 a2=420 a3=0 items=0 ppid=1 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:46.905000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Nov 1 00:49:46.968458 kernel: audit: type=1300 audit(1761958186.905:200): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcd40036e0 a2=420 a3=0 items=0 ppid=1 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:46.968655 kernel: audit: type=1327 audit(1761958186.905:200): proctitle=2F7362696E2F617564697463746C002D44 Nov 1 00:49:46.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:46.979267 augenrules[1433]: No rules Nov 1 00:49:46.980739 systemd[1]: Finished audit-rules.service. Nov 1 00:49:46.982693 sudo[1412]: pam_unix(sudo:session): session closed for user root Nov 1 00:49:46.990331 kernel: audit: type=1131 audit(1761958186.905:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:46.990450 kernel: audit: type=1130 audit(1761958186.978:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:46.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:46.978000 audit[1412]: USER_END pid=1412 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:49:47.037064 kernel: audit: type=1106 audit(1761958186.978:203): pid=1412 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:49:47.037304 kernel: audit: type=1104 audit(1761958186.978:204): pid=1412 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:49:46.978000 audit[1412]: CRED_DISP pid=1412 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:49:47.041429 sshd[1409]: pam_unix(sshd:session): session closed for user core Nov 1 00:49:47.047110 systemd-logind[1208]: Session 6 logged out. Waiting for processes to exit. Nov 1 00:49:47.049917 systemd[1]: sshd@5-10.128.0.106:22-139.178.68.195:40722.service: Deactivated successfully. Nov 1 00:49:47.051191 systemd[1]: session-6.scope: Deactivated successfully. Nov 1 00:49:47.053476 systemd-logind[1208]: Removed session 6. Nov 1 00:49:47.059828 kernel: audit: type=1106 audit(1761958187.042:205): pid=1409 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Nov 1 00:49:47.042000 audit[1409]: USER_END pid=1409 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Nov 1 00:49:47.079714 systemd[1]: Started sshd@6-10.128.0.106:22-139.178.68.195:40738.service. Nov 1 00:49:47.115922 kernel: audit: type=1104 audit(1761958187.042:206): pid=1409 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Nov 1 00:49:47.042000 audit[1409]: CRED_DISP pid=1409 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Nov 1 00:49:47.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.106:22-139.178.68.195:40722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:47.116847 kernel: audit: type=1131 audit(1761958187.047:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.106:22-139.178.68.195:40722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:47.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.106:22-139.178.68.195:40738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:47.377000 audit[1439]: USER_ACCT pid=1439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Nov 1 00:49:47.379884 sshd[1439]: Accepted publickey for core from 139.178.68.195 port 40738 ssh2: RSA SHA256:GSqF/4F3rRKdKeqeDHvdnEOSnHTK3+r0cz3SPwoprYw Nov 1 00:49:47.379000 audit[1439]: CRED_ACQ pid=1439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Nov 1 00:49:47.379000 audit[1439]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd167d11d0 a2=3 a3=0 items=0 ppid=1 pid=1439 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:47.379000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:49:47.381156 sshd[1439]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:49:47.388768 systemd[1]: Started session-7.scope. Nov 1 00:49:47.389679 systemd-logind[1208]: New session 7 of user core. Nov 1 00:49:47.398000 audit[1439]: USER_START pid=1439 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Nov 1 00:49:47.401000 audit[1441]: CRED_ACQ pid=1441 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Nov 1 00:49:47.558000 audit[1442]: USER_ACCT pid=1442 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:49:47.559130 sudo[1442]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Nov 1 00:49:47.558000 audit[1442]: CRED_REFR pid=1442 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:49:47.559603 sudo[1442]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:49:47.561000 audit[1442]: USER_START pid=1442 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:49:47.581009 systemd[1]: Starting coreos-metadata.service... Nov 1 00:49:47.634191 coreos-metadata[1446]: Nov 01 00:49:47.633 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/hostname: Attempt #1 Nov 1 00:49:47.636012 coreos-metadata[1446]: Nov 01 00:49:47.635 INFO Fetch successful Nov 1 00:49:47.636163 coreos-metadata[1446]: Nov 01 00:49:47.636 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip: Attempt #1 Nov 1 00:49:47.636491 coreos-metadata[1446]: Nov 01 00:49:47.636 INFO Fetch successful Nov 1 00:49:47.636491 coreos-metadata[1446]: Nov 01 00:49:47.636 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/ip: Attempt #1 Nov 1 00:49:47.637214 coreos-metadata[1446]: Nov 01 00:49:47.637 INFO Fetch successful Nov 1 00:49:47.637429 coreos-metadata[1446]: Nov 01 00:49:47.637 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/machine-type: Attempt #1 Nov 1 00:49:47.638091 coreos-metadata[1446]: Nov 01 00:49:47.637 INFO Fetch successful Nov 1 00:49:47.650328 systemd[1]: Finished coreos-metadata.service. Nov 1 00:49:47.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:48.385240 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Nov 1 00:49:48.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:48.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:48.386277 systemd[1]: Stopped kubelet.service. Nov 1 00:49:48.386391 systemd[1]: kubelet.service: Consumed 1.638s CPU time. Nov 1 00:49:48.388837 systemd[1]: Starting kubelet.service... Nov 1 00:49:48.547233 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Nov 1 00:49:48.547367 systemd[1]: kubelet.service: Failed with result 'signal'. Nov 1 00:49:48.547732 systemd[1]: Stopped kubelet.service. Nov 1 00:49:48.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Nov 1 00:49:48.551308 systemd[1]: Starting kubelet.service... Nov 1 00:49:48.602951 systemd[1]: Reloading. Nov 1 00:49:48.749844 /usr/lib/systemd/system-generators/torcx-generator[1500]: time="2025-11-01T00:49:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:49:48.749902 /usr/lib/systemd/system-generators/torcx-generator[1500]: time="2025-11-01T00:49:48Z" level=info msg="torcx already run" Nov 1 00:49:48.878330 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:49:48.878361 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:49:48.903314 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:49:49.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.002000 audit: BPF prog-id=49 op=LOAD Nov 1 00:49:49.002000 audit: BPF prog-id=39 op=UNLOAD Nov 1 00:49:49.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.004000 audit: BPF prog-id=50 op=LOAD Nov 1 00:49:49.004000 audit: BPF prog-id=40 op=UNLOAD Nov 1 00:49:49.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit: BPF prog-id=51 op=LOAD Nov 1 00:49:49.006000 audit: BPF prog-id=30 op=UNLOAD Nov 1 00:49:49.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit: BPF prog-id=52 op=LOAD Nov 1 00:49:49.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.006000 audit: BPF prog-id=53 op=LOAD Nov 1 00:49:49.006000 audit: BPF prog-id=31 op=UNLOAD Nov 1 00:49:49.006000 audit: BPF prog-id=32 op=UNLOAD Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit: BPF prog-id=54 op=LOAD Nov 1 00:49:49.008000 audit: BPF prog-id=41 op=UNLOAD Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit: BPF prog-id=55 op=LOAD Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.009000 audit: BPF prog-id=56 op=LOAD Nov 1 00:49:49.009000 audit: BPF prog-id=42 op=UNLOAD Nov 1 00:49:49.009000 audit: BPF prog-id=43 op=UNLOAD Nov 1 00:49:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.011000 audit: BPF prog-id=57 op=LOAD Nov 1 00:49:49.011000 audit: BPF prog-id=33 op=UNLOAD Nov 1 00:49:49.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.011000 audit: BPF prog-id=58 op=LOAD Nov 1 00:49:49.011000 audit: BPF prog-id=45 op=UNLOAD Nov 1 00:49:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.012000 audit: BPF prog-id=59 op=LOAD Nov 1 00:49:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.012000 audit: BPF prog-id=60 op=LOAD Nov 1 00:49:49.012000 audit: BPF prog-id=46 op=UNLOAD Nov 1 00:49:49.012000 audit: BPF prog-id=47 op=UNLOAD Nov 1 00:49:49.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.045000 audit: BPF prog-id=61 op=LOAD Nov 1 00:49:49.045000 audit: BPF prog-id=44 op=UNLOAD Nov 1 00:49:49.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.047000 audit: BPF prog-id=62 op=LOAD Nov 1 00:49:49.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.047000 audit: BPF prog-id=63 op=LOAD Nov 1 00:49:49.047000 audit: BPF prog-id=34 op=UNLOAD Nov 1 00:49:49.047000 audit: BPF prog-id=35 op=UNLOAD Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit: BPF prog-id=64 op=LOAD Nov 1 00:49:49.048000 audit: BPF prog-id=36 op=UNLOAD Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit: BPF prog-id=65 op=LOAD Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:49.048000 audit: BPF prog-id=66 op=LOAD Nov 1 00:49:49.049000 audit: BPF prog-id=37 op=UNLOAD Nov 1 00:49:49.049000 audit: BPF prog-id=38 op=UNLOAD Nov 1 00:49:49.076072 systemd[1]: Started kubelet.service. Nov 1 00:49:49.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:49.080109 systemd[1]: Stopping kubelet.service... Nov 1 00:49:49.081044 systemd[1]: kubelet.service: Deactivated successfully. Nov 1 00:49:49.081566 systemd[1]: Stopped kubelet.service. Nov 1 00:49:49.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:49.084186 systemd[1]: Starting kubelet.service... Nov 1 00:49:49.322157 systemd[1]: Started kubelet.service. Nov 1 00:49:49.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:49.395103 kubelet[1551]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Nov 1 00:49:49.395103 kubelet[1551]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Nov 1 00:49:49.395103 kubelet[1551]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Nov 1 00:49:49.395777 kubelet[1551]: I1101 00:49:49.395298 1551 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Nov 1 00:49:50.289847 kubelet[1551]: I1101 00:49:50.289759 1551 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Nov 1 00:49:50.289847 kubelet[1551]: I1101 00:49:50.289824 1551 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Nov 1 00:49:50.290388 kubelet[1551]: I1101 00:49:50.290337 1551 server.go:954] "Client rotation is on, will bootstrap in background" Nov 1 00:49:50.364539 kubelet[1551]: I1101 00:49:50.364442 1551 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Nov 1 00:49:50.393050 kubelet[1551]: E1101 00:49:50.392498 1551 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Nov 1 00:49:50.393050 kubelet[1551]: I1101 00:49:50.392566 1551 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Nov 1 00:49:50.396494 kubelet[1551]: I1101 00:49:50.396435 1551 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Nov 1 00:49:50.397110 kubelet[1551]: I1101 00:49:50.396853 1551 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Nov 1 00:49:50.397546 kubelet[1551]: I1101 00:49:50.396906 1551 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.128.0.106","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Nov 1 00:49:50.397546 kubelet[1551]: I1101 00:49:50.397234 1551 topology_manager.go:138] "Creating topology manager with none policy" Nov 1 00:49:50.397546 kubelet[1551]: I1101 00:49:50.397253 1551 container_manager_linux.go:304] "Creating device plugin manager" Nov 1 00:49:50.397546 kubelet[1551]: I1101 00:49:50.397467 1551 state_mem.go:36] "Initialized new in-memory state store" Nov 1 00:49:50.411599 kubelet[1551]: I1101 00:49:50.411555 1551 kubelet.go:446] "Attempting to sync node with API server" Nov 1 00:49:50.411599 kubelet[1551]: I1101 00:49:50.411611 1551 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Nov 1 00:49:50.411874 kubelet[1551]: I1101 00:49:50.411648 1551 kubelet.go:352] "Adding apiserver pod source" Nov 1 00:49:50.411874 kubelet[1551]: I1101 00:49:50.411665 1551 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Nov 1 00:49:50.418529 kubelet[1551]: E1101 00:49:50.418487 1551 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:49:50.418810 kubelet[1551]: E1101 00:49:50.418730 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:49:50.420416 kubelet[1551]: I1101 00:49:50.420388 1551 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Nov 1 00:49:50.421236 kubelet[1551]: I1101 00:49:50.421186 1551 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Nov 1 00:49:50.422548 kubelet[1551]: W1101 00:49:50.422498 1551 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Nov 1 00:49:50.426347 kubelet[1551]: I1101 00:49:50.426300 1551 watchdog_linux.go:99] "Systemd watchdog is not enabled" Nov 1 00:49:50.426457 kubelet[1551]: I1101 00:49:50.426365 1551 server.go:1287] "Started kubelet" Nov 1 00:49:50.448991 kubelet[1551]: I1101 00:49:50.448892 1551 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Nov 1 00:49:50.449572 kubelet[1551]: I1101 00:49:50.449543 1551 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Nov 1 00:49:50.448000 audit[1551]: AVC avc: denied { mac_admin } for pid=1551 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:50.448000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:49:50.448000 audit[1551]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008ea450 a1=c000916420 a2=c0008ea420 a3=25 items=0 ppid=1 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:50.448000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:49:50.449000 audit[1551]: AVC avc: denied { mac_admin } for pid=1551 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:50.449000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:49:50.449000 audit[1551]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000890320 a1=c000916438 a2=c0008ea4e0 a3=25 items=0 ppid=1 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:50.449000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:49:50.450484 kubelet[1551]: I1101 00:49:50.449787 1551 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Nov 1 00:49:50.450484 kubelet[1551]: I1101 00:49:50.449871 1551 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Nov 1 00:49:50.450484 kubelet[1551]: I1101 00:49:50.449979 1551 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Nov 1 00:49:50.450755 kubelet[1551]: I1101 00:49:50.450684 1551 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Nov 1 00:49:50.452113 kubelet[1551]: I1101 00:49:50.452068 1551 server.go:479] "Adding debug handlers to kubelet server" Nov 1 00:49:50.454922 kubelet[1551]: E1101 00:49:50.454726 1551 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Nov 1 00:49:50.455233 kubelet[1551]: I1101 00:49:50.455207 1551 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Nov 1 00:49:50.459062 kubelet[1551]: E1101 00:49:50.458991 1551 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.128.0.106\" not found" Nov 1 00:49:50.459163 kubelet[1551]: I1101 00:49:50.459082 1551 volume_manager.go:297] "Starting Kubelet Volume Manager" Nov 1 00:49:50.459404 kubelet[1551]: I1101 00:49:50.459359 1551 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Nov 1 00:49:50.459503 kubelet[1551]: I1101 00:49:50.459438 1551 reconciler.go:26] "Reconciler: start to sync state" Nov 1 00:49:50.460410 kubelet[1551]: I1101 00:49:50.460382 1551 factory.go:221] Registration of the systemd container factory successfully Nov 1 00:49:50.460538 kubelet[1551]: I1101 00:49:50.460507 1551 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Nov 1 00:49:50.463936 kubelet[1551]: I1101 00:49:50.463910 1551 factory.go:221] Registration of the containerd container factory successfully Nov 1 00:49:50.483283 kubelet[1551]: E1101 00:49:50.483217 1551 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.128.0.106\" not found" node="10.128.0.106" Nov 1 00:49:50.489131 kubelet[1551]: I1101 00:49:50.489086 1551 cpu_manager.go:221] "Starting CPU manager" policy="none" Nov 1 00:49:50.489131 kubelet[1551]: I1101 00:49:50.489108 1551 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Nov 1 00:49:50.489131 kubelet[1551]: I1101 00:49:50.489137 1551 state_mem.go:36] "Initialized new in-memory state store" Nov 1 00:49:50.491698 kubelet[1551]: I1101 00:49:50.491657 1551 policy_none.go:49] "None policy: Start" Nov 1 00:49:50.491698 kubelet[1551]: I1101 00:49:50.491689 1551 memory_manager.go:186] "Starting memorymanager" policy="None" Nov 1 00:49:50.491894 kubelet[1551]: I1101 00:49:50.491719 1551 state_mem.go:35] "Initializing new in-memory state store" Nov 1 00:49:50.505520 systemd[1]: Created slice kubepods.slice. Nov 1 00:49:50.515339 systemd[1]: Created slice kubepods-burstable.slice. Nov 1 00:49:50.524350 systemd[1]: Created slice kubepods-besteffort.slice. Nov 1 00:49:50.535000 audit[1568]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1568 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:50.535000 audit[1568]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff9f7c2300 a2=0 a3=7fff9f7c22ec items=0 ppid=1551 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:50.535000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Nov 1 00:49:50.537000 audit[1572]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1572 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:50.537000 audit[1572]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffeda5598d0 a2=0 a3=7ffeda5598bc items=0 ppid=1551 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:50.537000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Nov 1 00:49:50.540176 kubelet[1551]: I1101 00:49:50.539649 1551 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Nov 1 00:49:50.540448 kubelet[1551]: I1101 00:49:50.540416 1551 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Nov 1 00:49:50.540775 kubelet[1551]: I1101 00:49:50.540751 1551 eviction_manager.go:189] "Eviction manager: starting control loop" Nov 1 00:49:50.541041 kubelet[1551]: I1101 00:49:50.540970 1551 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Nov 1 00:49:50.538000 audit[1551]: AVC avc: denied { mac_admin } for pid=1551 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:50.538000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:49:50.538000 audit[1551]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c58720 a1=c000e6b4a0 a2=c000c586f0 a3=25 items=0 ppid=1 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:50.538000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:49:50.544777 kubelet[1551]: I1101 00:49:50.544754 1551 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Nov 1 00:49:50.545853 kubelet[1551]: E1101 00:49:50.545815 1551 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Nov 1 00:49:50.546026 kubelet[1551]: E1101 00:49:50.545900 1551 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.128.0.106\" not found" Nov 1 00:49:50.552000 audit[1574]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1574 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:50.552000 audit[1574]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcee2ab560 a2=0 a3=7ffcee2ab54c items=0 ppid=1551 pid=1574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:50.552000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:49:50.576000 audit[1579]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1579 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:50.576000 audit[1579]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc59faef00 a2=0 a3=7ffc59faeeec items=0 ppid=1551 pid=1579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:50.576000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:49:50.640000 audit[1584]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1584 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:50.640000 audit[1584]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffec0a20550 a2=0 a3=7ffec0a2053c items=0 ppid=1551 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:50.640000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Nov 1 00:49:50.642553 kubelet[1551]: I1101 00:49:50.642486 1551 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Nov 1 00:49:50.643763 kubelet[1551]: I1101 00:49:50.643731 1551 kubelet_node_status.go:75] "Attempting to register node" node="10.128.0.106" Nov 1 00:49:50.643000 audit[1585]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1585 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:50.643000 audit[1585]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffee4f69850 a2=0 a3=7ffee4f6983c items=0 ppid=1551 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:50.643000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Nov 1 00:49:50.645741 kubelet[1551]: I1101 00:49:50.645699 1551 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Nov 1 00:49:50.645741 kubelet[1551]: I1101 00:49:50.645730 1551 status_manager.go:227] "Starting to sync pod status with apiserver" Nov 1 00:49:50.645935 kubelet[1551]: I1101 00:49:50.645766 1551 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Nov 1 00:49:50.645935 kubelet[1551]: I1101 00:49:50.645779 1551 kubelet.go:2382] "Starting kubelet main sync loop" Nov 1 00:49:50.645935 kubelet[1551]: E1101 00:49:50.645883 1551 kubelet.go:2406] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Nov 1 00:49:50.646000 audit[1586]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1586 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:50.646000 audit[1586]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe96f14f50 a2=0 a3=7ffe96f14f3c items=0 ppid=1551 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:50.646000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Nov 1 00:49:50.648000 audit[1587]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1587 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:50.648000 audit[1587]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3ebf5660 a2=0 a3=7fff3ebf564c items=0 ppid=1551 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:50.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Nov 1 00:49:50.650000 audit[1588]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1588 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:50.650000 audit[1588]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff928f7e20 a2=0 a3=7fff928f7e0c items=0 ppid=1551 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:50.650000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Nov 1 00:49:50.652595 kubelet[1551]: I1101 00:49:50.652567 1551 kubelet_node_status.go:78] "Successfully registered node" node="10.128.0.106" Nov 1 00:49:50.653000 audit[1590]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1590 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:50.653000 audit[1590]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef1c92a80 a2=0 a3=7ffef1c92a6c items=0 ppid=1551 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:50.653000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Nov 1 00:49:50.654000 audit[1589]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1589 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:50.654000 audit[1589]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd24ed7060 a2=0 a3=7ffd24ed704c items=0 ppid=1551 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:50.654000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Nov 1 00:49:50.657000 audit[1591]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1591 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:50.657000 audit[1591]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff6bfb8710 a2=0 a3=7fff6bfb86fc items=0 ppid=1551 pid=1591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:50.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Nov 1 00:49:50.675264 kubelet[1551]: I1101 00:49:50.675226 1551 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Nov 1 00:49:50.675839 env[1224]: time="2025-11-01T00:49:50.675739683Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Nov 1 00:49:50.676417 kubelet[1551]: I1101 00:49:50.676108 1551 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Nov 1 00:49:50.880000 audit[1442]: USER_END pid=1442 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:49:50.881581 sudo[1442]: pam_unix(sudo:session): session closed for user root Nov 1 00:49:50.883000 audit[1442]: CRED_DISP pid=1442 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:49:50.928137 sshd[1439]: pam_unix(sshd:session): session closed for user core Nov 1 00:49:50.929000 audit[1439]: USER_END pid=1439 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Nov 1 00:49:50.930000 audit[1439]: CRED_DISP pid=1439 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Nov 1 00:49:50.933882 systemd[1]: sshd@6-10.128.0.106:22-139.178.68.195:40738.service: Deactivated successfully. Nov 1 00:49:50.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.106:22-139.178.68.195:40738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:49:50.935382 systemd[1]: session-7.scope: Deactivated successfully. Nov 1 00:49:50.936487 systemd-logind[1208]: Session 7 logged out. Waiting for processes to exit. Nov 1 00:49:50.938058 systemd-logind[1208]: Removed session 7. Nov 1 00:49:51.296559 kubelet[1551]: I1101 00:49:51.295578 1551 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Nov 1 00:49:51.296559 kubelet[1551]: W1101 00:49:51.296194 1551 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Nov 1 00:49:51.296559 kubelet[1551]: W1101 00:49:51.296251 1551 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Nov 1 00:49:51.296559 kubelet[1551]: W1101 00:49:51.296286 1551 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Nov 1 00:49:51.419832 kubelet[1551]: I1101 00:49:51.419752 1551 apiserver.go:52] "Watching apiserver" Nov 1 00:49:51.420579 kubelet[1551]: E1101 00:49:51.419752 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:49:51.444424 kubelet[1551]: E1101 00:49:51.444363 1551 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wp5pf" podUID="139d6e0b-76aa-43ef-aa51-d6466b32bf78" Nov 1 00:49:51.452052 systemd[1]: Created slice kubepods-besteffort-poda20f154f_096a_4cec_b5c7_75f231521d5c.slice. Nov 1 00:49:51.460273 kubelet[1551]: I1101 00:49:51.460239 1551 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Nov 1 00:49:51.463499 kubelet[1551]: I1101 00:49:51.462784 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/e51d5a70-98ea-4933-af7e-ba150e78639c-policysync\") pod \"calico-node-nlnqb\" (UID: \"e51d5a70-98ea-4933-af7e-ba150e78639c\") " pod="calico-system/calico-node-nlnqb" Nov 1 00:49:51.463499 kubelet[1551]: I1101 00:49:51.462855 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/e51d5a70-98ea-4933-af7e-ba150e78639c-var-run-calico\") pod \"calico-node-nlnqb\" (UID: \"e51d5a70-98ea-4933-af7e-ba150e78639c\") " pod="calico-system/calico-node-nlnqb" Nov 1 00:49:51.463499 kubelet[1551]: I1101 00:49:51.462906 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/139d6e0b-76aa-43ef-aa51-d6466b32bf78-kubelet-dir\") pod \"csi-node-driver-wp5pf\" (UID: \"139d6e0b-76aa-43ef-aa51-d6466b32bf78\") " pod="calico-system/csi-node-driver-wp5pf" Nov 1 00:49:51.463499 kubelet[1551]: I1101 00:49:51.462938 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mhvgf\" (UniqueName: \"kubernetes.io/projected/139d6e0b-76aa-43ef-aa51-d6466b32bf78-kube-api-access-mhvgf\") pod \"csi-node-driver-wp5pf\" (UID: \"139d6e0b-76aa-43ef-aa51-d6466b32bf78\") " pod="calico-system/csi-node-driver-wp5pf" Nov 1 00:49:51.463499 kubelet[1551]: I1101 00:49:51.462991 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/a20f154f-096a-4cec-b5c7-75f231521d5c-kube-proxy\") pod \"kube-proxy-cjskm\" (UID: \"a20f154f-096a-4cec-b5c7-75f231521d5c\") " pod="kube-system/kube-proxy-cjskm" Nov 1 00:49:51.464073 kubelet[1551]: I1101 00:49:51.463022 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e51d5a70-98ea-4933-af7e-ba150e78639c-lib-modules\") pod \"calico-node-nlnqb\" (UID: \"e51d5a70-98ea-4933-af7e-ba150e78639c\") " pod="calico-system/calico-node-nlnqb" Nov 1 00:49:51.464073 kubelet[1551]: I1101 00:49:51.463066 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/e51d5a70-98ea-4933-af7e-ba150e78639c-node-certs\") pod \"calico-node-nlnqb\" (UID: \"e51d5a70-98ea-4933-af7e-ba150e78639c\") " pod="calico-system/calico-node-nlnqb" Nov 1 00:49:51.464073 kubelet[1551]: I1101 00:49:51.463098 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e51d5a70-98ea-4933-af7e-ba150e78639c-var-lib-calico\") pod \"calico-node-nlnqb\" (UID: \"e51d5a70-98ea-4933-af7e-ba150e78639c\") " pod="calico-system/calico-node-nlnqb" Nov 1 00:49:51.464073 kubelet[1551]: I1101 00:49:51.463148 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/139d6e0b-76aa-43ef-aa51-d6466b32bf78-registration-dir\") pod \"csi-node-driver-wp5pf\" (UID: \"139d6e0b-76aa-43ef-aa51-d6466b32bf78\") " pod="calico-system/csi-node-driver-wp5pf" Nov 1 00:49:51.464073 kubelet[1551]: I1101 00:49:51.463179 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a20f154f-096a-4cec-b5c7-75f231521d5c-xtables-lock\") pod \"kube-proxy-cjskm\" (UID: \"a20f154f-096a-4cec-b5c7-75f231521d5c\") " pod="kube-system/kube-proxy-cjskm" Nov 1 00:49:51.464409 kubelet[1551]: I1101 00:49:51.463206 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e51d5a70-98ea-4933-af7e-ba150e78639c-xtables-lock\") pod \"calico-node-nlnqb\" (UID: \"e51d5a70-98ea-4933-af7e-ba150e78639c\") " pod="calico-system/calico-node-nlnqb" Nov 1 00:49:51.464409 kubelet[1551]: I1101 00:49:51.463255 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fh42x\" (UniqueName: \"kubernetes.io/projected/e51d5a70-98ea-4933-af7e-ba150e78639c-kube-api-access-fh42x\") pod \"calico-node-nlnqb\" (UID: \"e51d5a70-98ea-4933-af7e-ba150e78639c\") " pod="calico-system/calico-node-nlnqb" Nov 1 00:49:51.464409 kubelet[1551]: I1101 00:49:51.463286 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a20f154f-096a-4cec-b5c7-75f231521d5c-lib-modules\") pod \"kube-proxy-cjskm\" (UID: \"a20f154f-096a-4cec-b5c7-75f231521d5c\") " pod="kube-system/kube-proxy-cjskm" Nov 1 00:49:51.464409 kubelet[1551]: I1101 00:49:51.463334 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/e51d5a70-98ea-4933-af7e-ba150e78639c-cni-bin-dir\") pod \"calico-node-nlnqb\" (UID: \"e51d5a70-98ea-4933-af7e-ba150e78639c\") " pod="calico-system/calico-node-nlnqb" Nov 1 00:49:51.464409 kubelet[1551]: I1101 00:49:51.463361 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/e51d5a70-98ea-4933-af7e-ba150e78639c-cni-log-dir\") pod \"calico-node-nlnqb\" (UID: \"e51d5a70-98ea-4933-af7e-ba150e78639c\") " pod="calico-system/calico-node-nlnqb" Nov 1 00:49:51.466377 kubelet[1551]: I1101 00:49:51.463431 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/e51d5a70-98ea-4933-af7e-ba150e78639c-cni-net-dir\") pod \"calico-node-nlnqb\" (UID: \"e51d5a70-98ea-4933-af7e-ba150e78639c\") " pod="calico-system/calico-node-nlnqb" Nov 1 00:49:51.466377 kubelet[1551]: I1101 00:49:51.463493 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/e51d5a70-98ea-4933-af7e-ba150e78639c-flexvol-driver-host\") pod \"calico-node-nlnqb\" (UID: \"e51d5a70-98ea-4933-af7e-ba150e78639c\") " pod="calico-system/calico-node-nlnqb" Nov 1 00:49:51.466377 kubelet[1551]: I1101 00:49:51.463526 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e51d5a70-98ea-4933-af7e-ba150e78639c-tigera-ca-bundle\") pod \"calico-node-nlnqb\" (UID: \"e51d5a70-98ea-4933-af7e-ba150e78639c\") " pod="calico-system/calico-node-nlnqb" Nov 1 00:49:51.466377 kubelet[1551]: I1101 00:49:51.463586 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/139d6e0b-76aa-43ef-aa51-d6466b32bf78-socket-dir\") pod \"csi-node-driver-wp5pf\" (UID: \"139d6e0b-76aa-43ef-aa51-d6466b32bf78\") " pod="calico-system/csi-node-driver-wp5pf" Nov 1 00:49:51.466377 kubelet[1551]: I1101 00:49:51.463612 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/139d6e0b-76aa-43ef-aa51-d6466b32bf78-varrun\") pod \"csi-node-driver-wp5pf\" (UID: \"139d6e0b-76aa-43ef-aa51-d6466b32bf78\") " pod="calico-system/csi-node-driver-wp5pf" Nov 1 00:49:51.466694 kubelet[1551]: I1101 00:49:51.463657 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-drvt9\" (UniqueName: \"kubernetes.io/projected/a20f154f-096a-4cec-b5c7-75f231521d5c-kube-api-access-drvt9\") pod \"kube-proxy-cjskm\" (UID: \"a20f154f-096a-4cec-b5c7-75f231521d5c\") " pod="kube-system/kube-proxy-cjskm" Nov 1 00:49:51.467515 systemd[1]: Created slice kubepods-besteffort-pode51d5a70_98ea_4933_af7e_ba150e78639c.slice. Nov 1 00:49:51.568003 kubelet[1551]: I1101 00:49:51.565560 1551 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Nov 1 00:49:51.570439 kubelet[1551]: E1101 00:49:51.570224 1551 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:49:51.570439 kubelet[1551]: W1101 00:49:51.570252 1551 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:49:51.570439 kubelet[1551]: E1101 00:49:51.570301 1551 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:49:51.570718 kubelet[1551]: E1101 00:49:51.570685 1551 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:49:51.570718 kubelet[1551]: W1101 00:49:51.570701 1551 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:49:51.570843 kubelet[1551]: E1101 00:49:51.570720 1551 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:49:51.579165 kubelet[1551]: E1101 00:49:51.575344 1551 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:49:51.579165 kubelet[1551]: W1101 00:49:51.575379 1551 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:49:51.579165 kubelet[1551]: E1101 00:49:51.575400 1551 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:49:51.601849 kubelet[1551]: E1101 00:49:51.598899 1551 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:49:51.601849 kubelet[1551]: W1101 00:49:51.598923 1551 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:49:51.601849 kubelet[1551]: E1101 00:49:51.598955 1551 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:49:51.601849 kubelet[1551]: E1101 00:49:51.599292 1551 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:49:51.601849 kubelet[1551]: W1101 00:49:51.599306 1551 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:49:51.601849 kubelet[1551]: E1101 00:49:51.599322 1551 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:49:51.608641 kubelet[1551]: E1101 00:49:51.608598 1551 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:49:51.608641 kubelet[1551]: W1101 00:49:51.608623 1551 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:49:51.608905 kubelet[1551]: E1101 00:49:51.608652 1551 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:49:51.763782 env[1224]: time="2025-11-01T00:49:51.763715128Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-cjskm,Uid:a20f154f-096a-4cec-b5c7-75f231521d5c,Namespace:kube-system,Attempt:0,}" Nov 1 00:49:51.773091 env[1224]: time="2025-11-01T00:49:51.771787402Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nlnqb,Uid:e51d5a70-98ea-4933-af7e-ba150e78639c,Namespace:calico-system,Attempt:0,}" Nov 1 00:49:52.301333 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount537238353.mount: Deactivated successfully. Nov 1 00:49:52.310658 env[1224]: time="2025-11-01T00:49:52.310594542Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:52.312612 env[1224]: time="2025-11-01T00:49:52.312548019Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:52.316733 env[1224]: time="2025-11-01T00:49:52.316690192Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:52.320061 env[1224]: time="2025-11-01T00:49:52.320004448Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:52.327882 env[1224]: time="2025-11-01T00:49:52.327785862Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:52.329158 env[1224]: time="2025-11-01T00:49:52.329099072Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:52.330649 env[1224]: time="2025-11-01T00:49:52.330604728Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:52.333612 env[1224]: time="2025-11-01T00:49:52.333553448Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:52.366961 env[1224]: time="2025-11-01T00:49:52.365877317Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:49:52.366961 env[1224]: time="2025-11-01T00:49:52.365968702Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:49:52.366961 env[1224]: time="2025-11-01T00:49:52.365996890Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:49:52.366961 env[1224]: time="2025-11-01T00:49:52.366262589Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3e636e2c1c9178960820b850e2c16d83e55a2877984cd7cf5e561bb9a0340e81 pid=1620 runtime=io.containerd.runc.v2 Nov 1 00:49:52.371753 env[1224]: time="2025-11-01T00:49:52.371644239Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:49:52.371753 env[1224]: time="2025-11-01T00:49:52.371702429Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:49:52.372071 env[1224]: time="2025-11-01T00:49:52.371722928Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:49:52.372071 env[1224]: time="2025-11-01T00:49:52.371959911Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2a9a5fb0ac101dac8b76a2a609681a129126d3a8e897977fdc6fc120ccf13bd4 pid=1621 runtime=io.containerd.runc.v2 Nov 1 00:49:52.395176 systemd[1]: Started cri-containerd-3e636e2c1c9178960820b850e2c16d83e55a2877984cd7cf5e561bb9a0340e81.scope. Nov 1 00:49:52.400234 systemd[1]: Started cri-containerd-2a9a5fb0ac101dac8b76a2a609681a129126d3a8e897977fdc6fc120ccf13bd4.scope. Nov 1 00:49:52.421039 kubelet[1551]: E1101 00:49:52.420909 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:49:52.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.445823 kernel: kauditd_printk_skb: 277 callbacks suppressed Nov 1 00:49:52.445880 kernel: audit: type=1400 audit(1761958192.439:450): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.494332 env[1224]: time="2025-11-01T00:49:52.492744145Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nlnqb,Uid:e51d5a70-98ea-4933-af7e-ba150e78639c,Namespace:calico-system,Attempt:0,} returns sandbox id \"3e636e2c1c9178960820b850e2c16d83e55a2877984cd7cf5e561bb9a0340e81\"" Nov 1 00:49:52.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.577885 kernel: audit: type=1400 audit(1761958192.439:451): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.578083 kernel: audit: type=1400 audit(1761958192.439:452): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.578137 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Nov 1 00:49:52.578173 kernel: audit: type=1400 audit(1761958192.439:453): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.578206 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Nov 1 00:49:52.578244 kernel: audit: type=1400 audit(1761958192.439:454): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.578279 kernel: audit: backlog limit exceeded Nov 1 00:49:52.578321 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Nov 1 00:49:52.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.465000 audit: BPF prog-id=67 op=LOAD Nov 1 00:49:52.466000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.466000 audit[1639]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1620 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:52.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365363336653263316339313738393630383230623835306532633136 Nov 1 00:49:52.466000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.466000 audit[1639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1620 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:52.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365363336653263316339313738393630383230623835306532633136 Nov 1 00:49:52.466000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.466000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.466000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.466000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.466000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.466000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.466000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.466000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.466000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.466000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.466000 audit: BPF prog-id=68 op=LOAD Nov 1 00:49:52.466000 audit[1639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000292f10 items=0 ppid=1620 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:52.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365363336653263316339313738393630383230623835306532633136 Nov 1 00:49:52.467000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.467000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.467000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.467000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.467000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.467000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.467000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.467000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.467000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.467000 audit: BPF prog-id=69 op=LOAD Nov 1 00:49:52.467000 audit[1639]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000292f58 items=0 ppid=1620 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:52.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365363336653263316339313738393630383230623835306532633136 Nov 1 00:49:52.467000 audit: BPF prog-id=69 op=UNLOAD Nov 1 00:49:52.467000 audit: BPF prog-id=68 op=UNLOAD Nov 1 00:49:52.467000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.467000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.467000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.467000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.467000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.467000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.467000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.467000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.467000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.467000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.467000 audit: BPF prog-id=70 op=LOAD Nov 1 00:49:52.467000 audit[1639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000293368 items=0 ppid=1620 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:52.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365363336653263316339313738393630383230623835306532633136 Nov 1 00:49:52.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.586385 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Nov 1 00:49:52.603000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.603000 audit[1640]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1621 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:52.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261396135666230616331303164616338623736613261363039363831 Nov 1 00:49:52.604000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.604000 audit[1640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1621 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:52.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261396135666230616331303164616338623736613261363039363831 Nov 1 00:49:52.604000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.604000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.604000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.604000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.604000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.604000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.604000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.604000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.604000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.604000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.604000 audit: BPF prog-id=72 op=LOAD Nov 1 00:49:52.604000 audit[1640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000255ce0 items=0 ppid=1621 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:52.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261396135666230616331303164616338623736613261363039363831 Nov 1 00:49:52.606000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.606000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.606000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.606000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.606000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.606000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.606000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.606000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.607466 env[1224]: time="2025-11-01T00:49:52.607246628Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Nov 1 00:49:52.606000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.606000 audit: BPF prog-id=73 op=LOAD Nov 1 00:49:52.606000 audit[1640]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000255d28 items=0 ppid=1621 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:52.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261396135666230616331303164616338623736613261363039363831 Nov 1 00:49:52.607000 audit: BPF prog-id=73 op=UNLOAD Nov 1 00:49:52.607000 audit: BPF prog-id=72 op=UNLOAD Nov 1 00:49:52.607000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.607000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.607000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.607000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.607000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.607000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.607000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.607000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.607000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.607000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:52.607000 audit: BPF prog-id=74 op=LOAD Nov 1 00:49:52.607000 audit[1640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003be138 items=0 ppid=1621 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:52.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261396135666230616331303164616338623736613261363039363831 Nov 1 00:49:52.630035 env[1224]: time="2025-11-01T00:49:52.629957919Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-cjskm,Uid:a20f154f-096a-4cec-b5c7-75f231521d5c,Namespace:kube-system,Attempt:0,} returns sandbox id \"2a9a5fb0ac101dac8b76a2a609681a129126d3a8e897977fdc6fc120ccf13bd4\"" Nov 1 00:49:53.421402 kubelet[1551]: E1101 00:49:53.421333 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:49:53.646902 kubelet[1551]: E1101 00:49:53.646830 1551 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wp5pf" podUID="139d6e0b-76aa-43ef-aa51-d6466b32bf78" Nov 1 00:49:53.695808 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1896663531.mount: Deactivated successfully. Nov 1 00:49:53.839157 env[1224]: time="2025-11-01T00:49:53.839057215Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:53.842153 env[1224]: time="2025-11-01T00:49:53.842093880Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:53.844517 env[1224]: time="2025-11-01T00:49:53.844472279Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:53.846713 env[1224]: time="2025-11-01T00:49:53.846670147Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:53.847451 env[1224]: time="2025-11-01T00:49:53.847368242Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5\"" Nov 1 00:49:53.849609 env[1224]: time="2025-11-01T00:49:53.849571991Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\"" Nov 1 00:49:53.851342 env[1224]: time="2025-11-01T00:49:53.851302144Z" level=info msg="CreateContainer within sandbox \"3e636e2c1c9178960820b850e2c16d83e55a2877984cd7cf5e561bb9a0340e81\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Nov 1 00:49:53.871667 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3588738842.mount: Deactivated successfully. Nov 1 00:49:53.879417 env[1224]: time="2025-11-01T00:49:53.879356061Z" level=info msg="CreateContainer within sandbox \"3e636e2c1c9178960820b850e2c16d83e55a2877984cd7cf5e561bb9a0340e81\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a3da99821e04aa6622d1c6ccfd6b62fb6f14a556f1415948880c0262907fd2d6\"" Nov 1 00:49:53.880718 env[1224]: time="2025-11-01T00:49:53.880661076Z" level=info msg="StartContainer for \"a3da99821e04aa6622d1c6ccfd6b62fb6f14a556f1415948880c0262907fd2d6\"" Nov 1 00:49:53.923768 systemd[1]: Started cri-containerd-a3da99821e04aa6622d1c6ccfd6b62fb6f14a556f1415948880c0262907fd2d6.scope. Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f3d544c2f88 items=0 ppid=1620 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:53.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133646139393832316530346161363632326431633663636664366236 Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit: BPF prog-id=75 op=LOAD Nov 1 00:49:53.952000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c62f8 items=0 ppid=1620 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:53.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133646139393832316530346161363632326431633663636664366236 Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.952000 audit: BPF prog-id=76 op=LOAD Nov 1 00:49:53.952000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003c6348 items=0 ppid=1620 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:53.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133646139393832316530346161363632326431633663636664366236 Nov 1 00:49:53.953000 audit: BPF prog-id=76 op=UNLOAD Nov 1 00:49:53.953000 audit: BPF prog-id=75 op=UNLOAD Nov 1 00:49:53.953000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.953000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.953000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.953000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.953000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.953000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.953000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.953000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.953000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.953000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:53.953000 audit: BPF prog-id=77 op=LOAD Nov 1 00:49:53.953000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003c63d8 items=0 ppid=1620 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:53.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133646139393832316530346161363632326431633663636664366236 Nov 1 00:49:53.982840 env[1224]: time="2025-11-01T00:49:53.979318047Z" level=info msg="StartContainer for \"a3da99821e04aa6622d1c6ccfd6b62fb6f14a556f1415948880c0262907fd2d6\" returns successfully" Nov 1 00:49:53.992675 systemd[1]: cri-containerd-a3da99821e04aa6622d1c6ccfd6b62fb6f14a556f1415948880c0262907fd2d6.scope: Deactivated successfully. Nov 1 00:49:53.995000 audit: BPF prog-id=77 op=UNLOAD Nov 1 00:49:54.067969 env[1224]: time="2025-11-01T00:49:54.067850850Z" level=info msg="shim disconnected" id=a3da99821e04aa6622d1c6ccfd6b62fb6f14a556f1415948880c0262907fd2d6 Nov 1 00:49:54.067969 env[1224]: time="2025-11-01T00:49:54.067969314Z" level=warning msg="cleaning up after shim disconnected" id=a3da99821e04aa6622d1c6ccfd6b62fb6f14a556f1415948880c0262907fd2d6 namespace=k8s.io Nov 1 00:49:54.068626 env[1224]: time="2025-11-01T00:49:54.067985853Z" level=info msg="cleaning up dead shim" Nov 1 00:49:54.085018 env[1224]: time="2025-11-01T00:49:54.084941037Z" level=warning msg="cleanup warnings time=\"2025-11-01T00:49:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1736 runtime=io.containerd.runc.v2\n" Nov 1 00:49:54.422569 kubelet[1551]: E1101 00:49:54.422368 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:49:54.641684 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a3da99821e04aa6622d1c6ccfd6b62fb6f14a556f1415948880c0262907fd2d6-rootfs.mount: Deactivated successfully. Nov 1 00:49:55.035610 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount317465077.mount: Deactivated successfully. Nov 1 00:49:55.423298 kubelet[1551]: E1101 00:49:55.422696 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:49:55.648094 kubelet[1551]: E1101 00:49:55.647342 1551 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wp5pf" podUID="139d6e0b-76aa-43ef-aa51-d6466b32bf78" Nov 1 00:49:55.845282 env[1224]: time="2025-11-01T00:49:55.844508495Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:55.848294 env[1224]: time="2025-11-01T00:49:55.848228659Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:55.850829 env[1224]: time="2025-11-01T00:49:55.850734163Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:55.852889 env[1224]: time="2025-11-01T00:49:55.852839687Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:886af02535dc34886e4618b902f8c140d89af57233a245621d29642224516064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:55.853483 env[1224]: time="2025-11-01T00:49:55.853425342Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\" returns image reference \"sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f\"" Nov 1 00:49:55.857239 env[1224]: time="2025-11-01T00:49:55.857176972Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Nov 1 00:49:55.857783 env[1224]: time="2025-11-01T00:49:55.857694431Z" level=info msg="CreateContainer within sandbox \"2a9a5fb0ac101dac8b76a2a609681a129126d3a8e897977fdc6fc120ccf13bd4\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Nov 1 00:49:55.879869 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3352444706.mount: Deactivated successfully. Nov 1 00:49:55.891968 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3826356202.mount: Deactivated successfully. Nov 1 00:49:55.898727 env[1224]: time="2025-11-01T00:49:55.898644082Z" level=info msg="CreateContainer within sandbox \"2a9a5fb0ac101dac8b76a2a609681a129126d3a8e897977fdc6fc120ccf13bd4\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"41afb7fc50f229a25dae1cc4c71db9c09a0bb366704b4e42e17e152df2f005a2\"" Nov 1 00:49:55.900010 env[1224]: time="2025-11-01T00:49:55.899961659Z" level=info msg="StartContainer for \"41afb7fc50f229a25dae1cc4c71db9c09a0bb366704b4e42e17e152df2f005a2\"" Nov 1 00:49:55.934832 systemd[1]: Started cri-containerd-41afb7fc50f229a25dae1cc4c71db9c09a0bb366704b4e42e17e152df2f005a2.scope. Nov 1 00:49:55.966000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.966000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fc3dc23fa88 items=0 ppid=1621 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:55.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431616662376663353066323239613235646165316363346337316462 Nov 1 00:49:55.966000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.966000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.966000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.966000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.966000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.966000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.966000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.966000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.966000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.966000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.966000 audit: BPF prog-id=78 op=LOAD Nov 1 00:49:55.966000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00022c618 items=0 ppid=1621 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:55.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431616662376663353066323239613235646165316363346337316462 Nov 1 00:49:55.967000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.967000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.967000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.967000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.967000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.967000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.967000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.967000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.967000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.967000 audit: BPF prog-id=79 op=LOAD Nov 1 00:49:55.967000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00022c668 items=0 ppid=1621 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:55.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431616662376663353066323239613235646165316363346337316462 Nov 1 00:49:55.968000 audit: BPF prog-id=79 op=UNLOAD Nov 1 00:49:55.968000 audit: BPF prog-id=78 op=UNLOAD Nov 1 00:49:55.968000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.968000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.968000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.968000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.968000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.968000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.968000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.968000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.968000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.968000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:55.968000 audit: BPF prog-id=80 op=LOAD Nov 1 00:49:55.968000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00022c6f8 items=0 ppid=1621 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:55.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431616662376663353066323239613235646165316363346337316462 Nov 1 00:49:56.000971 env[1224]: time="2025-11-01T00:49:56.000884287Z" level=info msg="StartContainer for \"41afb7fc50f229a25dae1cc4c71db9c09a0bb366704b4e42e17e152df2f005a2\" returns successfully" Nov 1 00:49:56.164000 audit[1821]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1821 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.164000 audit[1821]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc09f18c80 a2=0 a3=7ffc09f18c6c items=0 ppid=1772 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.164000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Nov 1 00:49:56.169000 audit[1822]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1822 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.169000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc90e92a00 a2=0 a3=7ffc90e929ec items=0 ppid=1772 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.169000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Nov 1 00:49:56.169000 audit[1823]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.169000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdca71bc30 a2=0 a3=7ffdca71bc1c items=0 ppid=1772 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.169000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Nov 1 00:49:56.172000 audit[1824]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.172000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd928d28a0 a2=0 a3=7ffd928d288c items=0 ppid=1772 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Nov 1 00:49:56.173000 audit[1825]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.173000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce3004a40 a2=0 a3=7ffce3004a2c items=0 ppid=1772 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.174000 audit[1826]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.174000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd1267650 a2=0 a3=7ffcd126763c items=0 ppid=1772 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.174000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Nov 1 00:49:56.173000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Nov 1 00:49:56.260000 audit[1827]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.260000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcf4627cf0 a2=0 a3=7ffcf4627cdc items=0 ppid=1772 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.260000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Nov 1 00:49:56.265000 audit[1829]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.265000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdcbab89c0 a2=0 a3=7ffdcbab89ac items=0 ppid=1772 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.265000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Nov 1 00:49:56.271000 audit[1832]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.271000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcba362470 a2=0 a3=7ffcba36245c items=0 ppid=1772 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.271000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Nov 1 00:49:56.273000 audit[1833]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1833 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.273000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4b65a390 a2=0 a3=7ffd4b65a37c items=0 ppid=1772 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.273000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Nov 1 00:49:56.277000 audit[1835]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1835 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.277000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc8fd201d0 a2=0 a3=7ffc8fd201bc items=0 ppid=1772 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.277000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Nov 1 00:49:56.279000 audit[1836]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.279000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc010485d0 a2=0 a3=7ffc010485bc items=0 ppid=1772 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.279000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Nov 1 00:49:56.283000 audit[1839]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1839 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.283000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff0bab58c0 a2=0 a3=7fff0bab58ac items=0 ppid=1772 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.283000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Nov 1 00:49:56.289000 audit[1842]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1842 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.289000 audit[1842]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe2de5f9f0 a2=0 a3=7ffe2de5f9dc items=0 ppid=1772 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.289000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Nov 1 00:49:56.291000 audit[1843]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.291000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd44212750 a2=0 a3=7ffd4421273c items=0 ppid=1772 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Nov 1 00:49:56.294000 audit[1845]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.294000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffea1413070 a2=0 a3=7ffea141305c items=0 ppid=1772 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.294000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Nov 1 00:49:56.296000 audit[1846]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1846 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.296000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffddf0d1e0 a2=0 a3=7fffddf0d1cc items=0 ppid=1772 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.296000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Nov 1 00:49:56.301000 audit[1848]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1848 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.301000 audit[1848]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff667a1370 a2=0 a3=7fff667a135c items=0 ppid=1772 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.301000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 00:49:56.308000 audit[1851]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.308000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc84dbe5f0 a2=0 a3=7ffc84dbe5dc items=0 ppid=1772 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.308000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 00:49:56.315000 audit[1854]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1854 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.315000 audit[1854]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd70e3f930 a2=0 a3=7ffd70e3f91c items=0 ppid=1772 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.315000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Nov 1 00:49:56.317000 audit[1855]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1855 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.317000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc2cb15e00 a2=0 a3=7ffc2cb15dec items=0 ppid=1772 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Nov 1 00:49:56.320000 audit[1857]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1857 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.320000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe43799ac0 a2=0 a3=7ffe43799aac items=0 ppid=1772 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.320000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:49:56.354000 audit[1861]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.354000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd75c2b9d0 a2=0 a3=7ffd75c2b9bc items=0 ppid=1772 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.354000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:49:56.356000 audit[1862]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.356000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd41738fc0 a2=0 a3=7ffd41738fac items=0 ppid=1772 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Nov 1 00:49:56.360000 audit[1864]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1864 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:49:56.360000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc8e248ea0 a2=0 a3=7ffc8e248e8c items=0 ppid=1772 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.360000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Nov 1 00:49:56.398000 audit[1870]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:49:56.398000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd200bb840 a2=0 a3=7ffd200bb82c items=0 ppid=1772 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.398000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:49:56.423072 kubelet[1551]: E1101 00:49:56.422880 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:49:56.434000 audit[1870]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:49:56.434000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7ffd200bb840 a2=0 a3=7ffd200bb82c items=0 ppid=1772 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.434000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:49:56.457000 audit[1879]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1879 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.457000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe68b71d30 a2=0 a3=7ffe68b71d1c items=0 ppid=1772 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.457000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Nov 1 00:49:56.462000 audit[1881]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1881 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.462000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff06c783e0 a2=0 a3=7fff06c783cc items=0 ppid=1772 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.462000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Nov 1 00:49:56.468000 audit[1884]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1884 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.468000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff08152010 a2=0 a3=7fff08151ffc items=0 ppid=1772 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.468000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Nov 1 00:49:56.470000 audit[1885]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1885 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.470000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc33052620 a2=0 a3=7ffc3305260c items=0 ppid=1772 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.470000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Nov 1 00:49:56.474000 audit[1887]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1887 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.474000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe0f605470 a2=0 a3=7ffe0f60545c items=0 ppid=1772 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.474000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Nov 1 00:49:56.476000 audit[1888]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1888 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.476000 audit[1888]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff142cb1a0 a2=0 a3=7fff142cb18c items=0 ppid=1772 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.476000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Nov 1 00:49:56.481000 audit[1890]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1890 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.481000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe8bc428b0 a2=0 a3=7ffe8bc4289c items=0 ppid=1772 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.481000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Nov 1 00:49:56.487000 audit[1893]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1893 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.487000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcd8687a00 a2=0 a3=7ffcd86879ec items=0 ppid=1772 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.487000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Nov 1 00:49:56.489000 audit[1894]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1894 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.489000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc94defb50 a2=0 a3=7ffc94defb3c items=0 ppid=1772 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.489000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Nov 1 00:49:56.493000 audit[1896]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1896 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.493000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd6c70baa0 a2=0 a3=7ffd6c70ba8c items=0 ppid=1772 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.493000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Nov 1 00:49:56.495000 audit[1897]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1897 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.495000 audit[1897]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef0556390 a2=0 a3=7ffef055637c items=0 ppid=1772 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.495000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Nov 1 00:49:56.500000 audit[1899]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1899 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.500000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc41b382b0 a2=0 a3=7ffc41b3829c items=0 ppid=1772 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.500000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 00:49:56.507000 audit[1902]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1902 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.507000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc9a207600 a2=0 a3=7ffc9a2075ec items=0 ppid=1772 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.507000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Nov 1 00:49:56.514000 audit[1905]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1905 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.514000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffffe96c530 a2=0 a3=7ffffe96c51c items=0 ppid=1772 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.514000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Nov 1 00:49:56.516000 audit[1906]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1906 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.516000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe35c33510 a2=0 a3=7ffe35c334fc items=0 ppid=1772 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.516000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Nov 1 00:49:56.520000 audit[1908]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1908 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.520000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff4ec7dbe0 a2=0 a3=7fff4ec7dbcc items=0 ppid=1772 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.520000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:49:56.525000 audit[1911]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1911 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.525000 audit[1911]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe59d68ab0 a2=0 a3=7ffe59d68a9c items=0 ppid=1772 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:49:56.527000 audit[1912]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1912 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.527000 audit[1912]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6c312e70 a2=0 a3=7ffd6c312e5c items=0 ppid=1772 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Nov 1 00:49:56.531000 audit[1914]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1914 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.531000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd60bea6e0 a2=0 a3=7ffd60bea6cc items=0 ppid=1772 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.531000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Nov 1 00:49:56.533000 audit[1915]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1915 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.533000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4eeef590 a2=0 a3=7ffe4eeef57c items=0 ppid=1772 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Nov 1 00:49:56.536000 audit[1917]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1917 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.536000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe4c75b700 a2=0 a3=7ffe4c75b6ec items=0 ppid=1772 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.536000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:49:56.541000 audit[1920]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:49:56.541000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff063181a0 a2=0 a3=7fff0631818c items=0 ppid=1772 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:49:56.547000 audit[1922]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Nov 1 00:49:56.547000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffee5af8220 a2=0 a3=7ffee5af820c items=0 ppid=1772 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.547000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:49:56.548000 audit[1922]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Nov 1 00:49:56.548000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffee5af8220 a2=0 a3=7ffee5af820c items=0 ppid=1772 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:56.548000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:49:56.683824 kubelet[1551]: I1101 00:49:56.679732 1551 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-cjskm" podStartSLOduration=3.457149047 podStartE2EDuration="6.679702264s" podCreationTimestamp="2025-11-01 00:49:50 +0000 UTC" firstStartedPulling="2025-11-01 00:49:52.632636462 +0000 UTC m=+3.302702448" lastFinishedPulling="2025-11-01 00:49:55.855189675 +0000 UTC m=+6.525255665" observedRunningTime="2025-11-01 00:49:56.679609456 +0000 UTC m=+7.349675452" watchObservedRunningTime="2025-11-01 00:49:56.679702264 +0000 UTC m=+7.349768269" Nov 1 00:49:57.423791 kubelet[1551]: E1101 00:49:57.423693 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:49:57.647022 kubelet[1551]: E1101 00:49:57.646924 1551 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wp5pf" podUID="139d6e0b-76aa-43ef-aa51-d6466b32bf78" Nov 1 00:49:58.424884 kubelet[1551]: E1101 00:49:58.424755 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:49:59.425977 kubelet[1551]: E1101 00:49:59.425866 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:49:59.577959 env[1224]: time="2025-11-01T00:49:59.577878262Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:59.580624 env[1224]: time="2025-11-01T00:49:59.580566509Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:59.583772 env[1224]: time="2025-11-01T00:49:59.583725833Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:59.585745 env[1224]: time="2025-11-01T00:49:59.585682319Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:49:59.586990 env[1224]: time="2025-11-01T00:49:59.586883293Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd\"" Nov 1 00:49:59.591166 env[1224]: time="2025-11-01T00:49:59.591111574Z" level=info msg="CreateContainer within sandbox \"3e636e2c1c9178960820b850e2c16d83e55a2877984cd7cf5e561bb9a0340e81\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Nov 1 00:49:59.620325 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount838949954.mount: Deactivated successfully. Nov 1 00:49:59.625709 env[1224]: time="2025-11-01T00:49:59.625629108Z" level=info msg="CreateContainer within sandbox \"3e636e2c1c9178960820b850e2c16d83e55a2877984cd7cf5e561bb9a0340e81\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"84e4fd62d665edf6ea9b2c71489073aa89c37489c794c37ab0ef319956f8ffe7\"" Nov 1 00:49:59.627196 env[1224]: time="2025-11-01T00:49:59.627130484Z" level=info msg="StartContainer for \"84e4fd62d665edf6ea9b2c71489073aa89c37489c794c37ab0ef319956f8ffe7\"" Nov 1 00:49:59.648466 kubelet[1551]: E1101 00:49:59.647689 1551 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wp5pf" podUID="139d6e0b-76aa-43ef-aa51-d6466b32bf78" Nov 1 00:49:59.675681 systemd[1]: Started cri-containerd-84e4fd62d665edf6ea9b2c71489073aa89c37489c794c37ab0ef319956f8ffe7.scope. Nov 1 00:49:59.703000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.709580 kernel: kauditd_printk_skb: 348 callbacks suppressed Nov 1 00:49:59.709789 kernel: audit: type=1400 audit(1761958199.703:548): avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.703000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f0c8c1c7768 items=0 ppid=1620 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:59.766883 kernel: audit: type=1300 audit(1761958199.703:548): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f0c8c1c7768 items=0 ppid=1620 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:59.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834653466643632643636356564663665613962326337313438393037 Nov 1 00:49:59.796943 kernel: audit: type=1327 audit(1761958199.703:548): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834653466643632643636356564663665613962326337313438393037 Nov 1 00:49:59.703000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.839413 kernel: audit: type=1400 audit(1761958199.703:549): avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.839618 kernel: audit: type=1400 audit(1761958199.703:549): avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.703000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.703000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.846542 env[1224]: time="2025-11-01T00:49:59.841582066Z" level=info msg="StartContainer for \"84e4fd62d665edf6ea9b2c71489073aa89c37489c794c37ab0ef319956f8ffe7\" returns successfully" Nov 1 00:49:59.881321 kernel: audit: type=1400 audit(1761958199.703:549): avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.881507 kernel: audit: type=1400 audit(1761958199.703:549): avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.703000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.902497 kernel: audit: type=1400 audit(1761958199.703:549): avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.703000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.703000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.923974 kernel: audit: type=1400 audit(1761958199.703:549): avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.703000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.946674 kernel: audit: type=1400 audit(1761958199.703:549): avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.703000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.703000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.703000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.703000 audit: BPF prog-id=81 op=LOAD Nov 1 00:49:59.703000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002e5d68 items=0 ppid=1620 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:59.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834653466643632643636356564663665613962326337313438393037 Nov 1 00:49:59.729000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.729000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.729000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.729000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.729000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.729000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.729000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.729000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.729000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.729000 audit: BPF prog-id=82 op=LOAD Nov 1 00:49:59.729000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002e5db8 items=0 ppid=1620 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:59.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834653466643632643636356564663665613962326337313438393037 Nov 1 00:49:59.729000 audit: BPF prog-id=82 op=UNLOAD Nov 1 00:49:59.729000 audit: BPF prog-id=81 op=UNLOAD Nov 1 00:49:59.729000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.729000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.729000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.729000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.729000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.729000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.729000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.729000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.729000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.729000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:49:59.729000 audit: BPF prog-id=83 op=LOAD Nov 1 00:49:59.729000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002e5e48 items=0 ppid=1620 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:49:59.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834653466643632643636356564663665613962326337313438393037 Nov 1 00:50:00.426295 kubelet[1551]: E1101 00:50:00.426088 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:01.006115 env[1224]: time="2025-11-01T00:50:01.005914668Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Nov 1 00:50:01.009474 systemd[1]: cri-containerd-84e4fd62d665edf6ea9b2c71489073aa89c37489c794c37ab0ef319956f8ffe7.scope: Deactivated successfully. Nov 1 00:50:01.013000 audit: BPF prog-id=83 op=UNLOAD Nov 1 00:50:01.047608 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-84e4fd62d665edf6ea9b2c71489073aa89c37489c794c37ab0ef319956f8ffe7-rootfs.mount: Deactivated successfully. Nov 1 00:50:01.075573 kubelet[1551]: I1101 00:50:01.075249 1551 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Nov 1 00:50:01.427495 kubelet[1551]: E1101 00:50:01.427299 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:01.654686 systemd[1]: Created slice kubepods-besteffort-pod139d6e0b_76aa_43ef_aa51_d6466b32bf78.slice. Nov 1 00:50:01.658623 env[1224]: time="2025-11-01T00:50:01.658543852Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wp5pf,Uid:139d6e0b-76aa-43ef-aa51-d6466b32bf78,Namespace:calico-system,Attempt:0,}" Nov 1 00:50:02.004215 env[1224]: time="2025-11-01T00:50:02.004118699Z" level=info msg="shim disconnected" id=84e4fd62d665edf6ea9b2c71489073aa89c37489c794c37ab0ef319956f8ffe7 Nov 1 00:50:02.004215 env[1224]: time="2025-11-01T00:50:02.004196551Z" level=warning msg="cleaning up after shim disconnected" id=84e4fd62d665edf6ea9b2c71489073aa89c37489c794c37ab0ef319956f8ffe7 namespace=k8s.io Nov 1 00:50:02.004215 env[1224]: time="2025-11-01T00:50:02.004214129Z" level=info msg="cleaning up dead shim" Nov 1 00:50:02.031239 env[1224]: time="2025-11-01T00:50:02.031167466Z" level=warning msg="cleanup warnings time=\"2025-11-01T00:50:02Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1971 runtime=io.containerd.runc.v2\n" Nov 1 00:50:02.104875 env[1224]: time="2025-11-01T00:50:02.104741145Z" level=error msg="Failed to destroy network for sandbox \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:50:02.110186 env[1224]: time="2025-11-01T00:50:02.108363411Z" level=error msg="encountered an error cleaning up failed sandbox \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:50:02.110186 env[1224]: time="2025-11-01T00:50:02.108475359Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wp5pf,Uid:139d6e0b-76aa-43ef-aa51-d6466b32bf78,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:50:02.110425 kubelet[1551]: E1101 00:50:02.108882 1551 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:50:02.110425 kubelet[1551]: E1101 00:50:02.108995 1551 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wp5pf" Nov 1 00:50:02.110425 kubelet[1551]: E1101 00:50:02.109043 1551 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wp5pf" Nov 1 00:50:02.108003 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad-shm.mount: Deactivated successfully. Nov 1 00:50:02.111006 kubelet[1551]: E1101 00:50:02.109141 1551 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-wp5pf_calico-system(139d6e0b-76aa-43ef-aa51-d6466b32bf78)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-wp5pf_calico-system(139d6e0b-76aa-43ef-aa51-d6466b32bf78)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wp5pf" podUID="139d6e0b-76aa-43ef-aa51-d6466b32bf78" Nov 1 00:50:02.427689 kubelet[1551]: E1101 00:50:02.427507 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:02.706200 env[1224]: time="2025-11-01T00:50:02.705853145Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Nov 1 00:50:02.706435 kubelet[1551]: I1101 00:50:02.705888 1551 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Nov 1 00:50:02.707527 env[1224]: time="2025-11-01T00:50:02.707471088Z" level=info msg="StopPodSandbox for \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\"" Nov 1 00:50:02.740921 env[1224]: time="2025-11-01T00:50:02.740832244Z" level=error msg="StopPodSandbox for \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\" failed" error="failed to destroy network for sandbox \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:50:02.741270 kubelet[1551]: E1101 00:50:02.741196 1551 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Nov 1 00:50:02.741404 kubelet[1551]: E1101 00:50:02.741312 1551 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad"} Nov 1 00:50:02.741503 kubelet[1551]: E1101 00:50:02.741469 1551 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"139d6e0b-76aa-43ef-aa51-d6466b32bf78\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 00:50:02.741658 kubelet[1551]: E1101 00:50:02.741544 1551 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"139d6e0b-76aa-43ef-aa51-d6466b32bf78\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wp5pf" podUID="139d6e0b-76aa-43ef-aa51-d6466b32bf78" Nov 1 00:50:03.428175 kubelet[1551]: E1101 00:50:03.428098 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:03.719870 systemd[1]: Created slice kubepods-besteffort-poddc9fd83f_8635_42aa_813d_408bddcc9efa.slice. Nov 1 00:50:03.755057 kubelet[1551]: I1101 00:50:03.755009 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-prdw9\" (UniqueName: \"kubernetes.io/projected/dc9fd83f-8635-42aa-813d-408bddcc9efa-kube-api-access-prdw9\") pod \"nginx-deployment-7fcdb87857-msthq\" (UID: \"dc9fd83f-8635-42aa-813d-408bddcc9efa\") " pod="default/nginx-deployment-7fcdb87857-msthq" Nov 1 00:50:04.031498 env[1224]: time="2025-11-01T00:50:04.031415530Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-msthq,Uid:dc9fd83f-8635-42aa-813d-408bddcc9efa,Namespace:default,Attempt:0,}" Nov 1 00:50:04.170534 env[1224]: time="2025-11-01T00:50:04.170437613Z" level=error msg="Failed to destroy network for sandbox \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:50:04.173396 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468-shm.mount: Deactivated successfully. Nov 1 00:50:04.175190 env[1224]: time="2025-11-01T00:50:04.175077259Z" level=error msg="encountered an error cleaning up failed sandbox \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:50:04.175342 env[1224]: time="2025-11-01T00:50:04.175184231Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-msthq,Uid:dc9fd83f-8635-42aa-813d-408bddcc9efa,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:50:04.175540 kubelet[1551]: E1101 00:50:04.175481 1551 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:50:04.175640 kubelet[1551]: E1101 00:50:04.175584 1551 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-msthq" Nov 1 00:50:04.175640 kubelet[1551]: E1101 00:50:04.175622 1551 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-msthq" Nov 1 00:50:04.175858 kubelet[1551]: E1101 00:50:04.175684 1551 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-msthq_default(dc9fd83f-8635-42aa-813d-408bddcc9efa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-msthq_default(dc9fd83f-8635-42aa-813d-408bddcc9efa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-msthq" podUID="dc9fd83f-8635-42aa-813d-408bddcc9efa" Nov 1 00:50:04.429203 kubelet[1551]: E1101 00:50:04.429009 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:04.713758 kubelet[1551]: I1101 00:50:04.713492 1551 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Nov 1 00:50:04.714482 env[1224]: time="2025-11-01T00:50:04.714417259Z" level=info msg="StopPodSandbox for \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\"" Nov 1 00:50:04.777964 env[1224]: time="2025-11-01T00:50:04.777875670Z" level=error msg="StopPodSandbox for \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\" failed" error="failed to destroy network for sandbox \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:50:04.778223 kubelet[1551]: E1101 00:50:04.778171 1551 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Nov 1 00:50:04.778327 kubelet[1551]: E1101 00:50:04.778245 1551 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468"} Nov 1 00:50:04.778327 kubelet[1551]: E1101 00:50:04.778305 1551 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dc9fd83f-8635-42aa-813d-408bddcc9efa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 00:50:04.778506 kubelet[1551]: E1101 00:50:04.778343 1551 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dc9fd83f-8635-42aa-813d-408bddcc9efa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-msthq" podUID="dc9fd83f-8635-42aa-813d-408bddcc9efa" Nov 1 00:50:05.015163 kernel: kauditd_printk_skb: 34 callbacks suppressed Nov 1 00:50:05.015351 kernel: audit: type=1131 audit(1761958205.005:555): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:50:05.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:50:05.006268 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Nov 1 00:50:05.053000 audit: BPF prog-id=60 op=UNLOAD Nov 1 00:50:05.068660 kernel: audit: type=1334 audit(1761958205.053:556): prog-id=60 op=UNLOAD Nov 1 00:50:05.068873 kernel: audit: type=1334 audit(1761958205.053:557): prog-id=59 op=UNLOAD Nov 1 00:50:05.053000 audit: BPF prog-id=59 op=UNLOAD Nov 1 00:50:05.053000 audit: BPF prog-id=58 op=UNLOAD Nov 1 00:50:05.076862 kernel: audit: type=1334 audit(1761958205.053:558): prog-id=58 op=UNLOAD Nov 1 00:50:05.430068 kubelet[1551]: E1101 00:50:05.429886 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:06.430434 kubelet[1551]: E1101 00:50:06.430339 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:07.431263 kubelet[1551]: E1101 00:50:07.431117 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:08.431746 kubelet[1551]: E1101 00:50:08.431598 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:09.432928 kubelet[1551]: E1101 00:50:09.432862 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:10.412161 kubelet[1551]: E1101 00:50:10.412101 1551 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:10.434074 kubelet[1551]: E1101 00:50:10.433980 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:10.467103 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2573489005.mount: Deactivated successfully. Nov 1 00:50:10.499742 env[1224]: time="2025-11-01T00:50:10.499622277Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:50:10.503097 env[1224]: time="2025-11-01T00:50:10.503031354Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:50:10.505521 env[1224]: time="2025-11-01T00:50:10.505466000Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:50:10.507585 env[1224]: time="2025-11-01T00:50:10.507535215Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:50:10.508447 env[1224]: time="2025-11-01T00:50:10.508375523Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9\"" Nov 1 00:50:10.525212 env[1224]: time="2025-11-01T00:50:10.525131536Z" level=info msg="CreateContainer within sandbox \"3e636e2c1c9178960820b850e2c16d83e55a2877984cd7cf5e561bb9a0340e81\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Nov 1 00:50:10.558676 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2344997332.mount: Deactivated successfully. Nov 1 00:50:10.563719 env[1224]: time="2025-11-01T00:50:10.562600577Z" level=info msg="CreateContainer within sandbox \"3e636e2c1c9178960820b850e2c16d83e55a2877984cd7cf5e561bb9a0340e81\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2171e3bb8e908e7a00024e2d23cc7bfef1e7b34052f03d21a8fbec3ea361e479\"" Nov 1 00:50:10.563941 env[1224]: time="2025-11-01T00:50:10.563690211Z" level=info msg="StartContainer for \"2171e3bb8e908e7a00024e2d23cc7bfef1e7b34052f03d21a8fbec3ea361e479\"" Nov 1 00:50:10.597065 systemd[1]: Started cri-containerd-2171e3bb8e908e7a00024e2d23cc7bfef1e7b34052f03d21a8fbec3ea361e479.scope. Nov 1 00:50:10.635000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.635000 audit[2081]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe96d585018 items=0 ppid=1620 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:10.690027 kernel: audit: type=1400 audit(1761958210.635:559): avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.690272 kernel: audit: type=1300 audit(1761958210.635:559): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe96d585018 items=0 ppid=1620 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:10.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373165336262386539303865376130303032346532643233636337 Nov 1 00:50:10.638000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.743920 kernel: audit: type=1327 audit(1761958210.635:559): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373165336262386539303865376130303032346532643233636337 Nov 1 00:50:10.744143 kernel: audit: type=1400 audit(1761958210.638:560): avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.744201 kernel: audit: type=1400 audit(1761958210.638:560): avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.638000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.766279 kernel: audit: type=1400 audit(1761958210.638:560): avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.638000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.808169 kernel: audit: type=1400 audit(1761958210.638:560): avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.638000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.638000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.856031 kernel: audit: type=1400 audit(1761958210.638:560): avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.856273 kernel: audit: type=1400 audit(1761958210.638:560): avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.638000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.638000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.877843 kernel: audit: type=1400 audit(1761958210.638:560): avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.638000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.638000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.638000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.638000 audit: BPF prog-id=84 op=LOAD Nov 1 00:50:10.638000 audit[2081]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001fa9c8 items=0 ppid=1620 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:10.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373165336262386539303865376130303032346532643233636337 Nov 1 00:50:10.689000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.689000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.689000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.689000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.689000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.689000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.689000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.689000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.689000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.689000 audit: BPF prog-id=85 op=LOAD Nov 1 00:50:10.689000 audit[2081]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001faa18 items=0 ppid=1620 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:10.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373165336262386539303865376130303032346532643233636337 Nov 1 00:50:10.690000 audit: BPF prog-id=85 op=UNLOAD Nov 1 00:50:10.690000 audit: BPF prog-id=84 op=UNLOAD Nov 1 00:50:10.690000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.690000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.690000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.690000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.690000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.690000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.690000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.690000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.690000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.690000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:10.690000 audit: BPF prog-id=86 op=LOAD Nov 1 00:50:10.690000 audit[2081]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001faaa8 items=0 ppid=1620 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:10.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373165336262386539303865376130303032346532643233636337 Nov 1 00:50:10.880198 env[1224]: time="2025-11-01T00:50:10.880135589Z" level=info msg="StartContainer for \"2171e3bb8e908e7a00024e2d23cc7bfef1e7b34052f03d21a8fbec3ea361e479\" returns successfully" Nov 1 00:50:10.984451 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Nov 1 00:50:10.984628 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Nov 1 00:50:11.434856 kubelet[1551]: E1101 00:50:11.434736 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:11.762091 kubelet[1551]: I1101 00:50:11.761994 1551 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-nlnqb" podStartSLOduration=3.853036509 podStartE2EDuration="21.761964788s" podCreationTimestamp="2025-11-01 00:49:50 +0000 UTC" firstStartedPulling="2025-11-01 00:49:52.600953359 +0000 UTC m=+3.271019349" lastFinishedPulling="2025-11-01 00:50:10.509881654 +0000 UTC m=+21.179947628" observedRunningTime="2025-11-01 00:50:11.761645728 +0000 UTC m=+22.431711724" watchObservedRunningTime="2025-11-01 00:50:11.761964788 +0000 UTC m=+22.432030773" Nov 1 00:50:12.314000 audit[2194]: AVC avc: denied { write } for pid=2194 comm="tee" name="fd" dev="proc" ino=19723 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:50:12.314000 audit[2194]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffece3237b2 a2=241 a3=1b6 items=1 ppid=2175 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.314000 audit: CWD cwd="/etc/service/enabled/bird/log" Nov 1 00:50:12.314000 audit: PATH item=0 name="/dev/fd/63" inode=19224 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:50:12.314000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:50:12.324000 audit[2199]: AVC avc: denied { write } for pid=2199 comm="tee" name="fd" dev="proc" ino=19728 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:50:12.324000 audit[2199]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc23d397b3 a2=241 a3=1b6 items=1 ppid=2169 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.324000 audit: CWD cwd="/etc/service/enabled/cni/log" Nov 1 00:50:12.324000 audit: PATH item=0 name="/dev/fd/63" inode=19720 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:50:12.324000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:50:12.329000 audit[2212]: AVC avc: denied { write } for pid=2212 comm="tee" name="fd" dev="proc" ino=19734 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:50:12.329000 audit[2212]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc4f8c7b1 a2=241 a3=1b6 items=1 ppid=2174 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.329000 audit: CWD cwd="/etc/service/enabled/confd/log" Nov 1 00:50:12.329000 audit: PATH item=0 name="/dev/fd/63" inode=19725 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:50:12.329000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:50:12.344000 audit[2208]: AVC avc: denied { write } for pid=2208 comm="tee" name="fd" dev="proc" ino=19738 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:50:12.344000 audit[2208]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd6ecce7a2 a2=241 a3=1b6 items=1 ppid=2171 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.344000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Nov 1 00:50:12.344000 audit: PATH item=0 name="/dev/fd/63" inode=19235 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:50:12.344000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:50:12.354000 audit[2228]: AVC avc: denied { write } for pid=2228 comm="tee" name="fd" dev="proc" ino=19251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:50:12.357000 audit[2222]: AVC avc: denied { write } for pid=2222 comm="tee" name="fd" dev="proc" ino=19254 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:50:12.357000 audit[2222]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd01a957b1 a2=241 a3=1b6 items=1 ppid=2179 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.357000 audit: CWD cwd="/etc/service/enabled/bird6/log" Nov 1 00:50:12.357000 audit: PATH item=0 name="/dev/fd/63" inode=19240 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:50:12.357000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:50:12.364000 audit[2226]: AVC avc: denied { write } for pid=2226 comm="tee" name="fd" dev="proc" ino=19258 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:50:12.354000 audit[2228]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe1dacc7b1 a2=241 a3=1b6 items=1 ppid=2184 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.354000 audit: CWD cwd="/etc/service/enabled/felix/log" Nov 1 00:50:12.354000 audit: PATH item=0 name="/dev/fd/63" inode=19246 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:50:12.354000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:50:12.364000 audit[2226]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff5f4f67a1 a2=241 a3=1b6 items=1 ppid=2167 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.364000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Nov 1 00:50:12.364000 audit: PATH item=0 name="/dev/fd/63" inode=19243 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:50:12.364000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:50:12.435899 kubelet[1551]: E1101 00:50:12.435829 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit: BPF prog-id=87 op=LOAD Nov 1 00:50:12.736000 audit[2271]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcfe641f60 a2=98 a3=1fffffffffffffff items=0 ppid=2185 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.736000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:50:12.736000 audit: BPF prog-id=87 op=UNLOAD Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit: BPF prog-id=88 op=LOAD Nov 1 00:50:12.736000 audit[2271]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcfe641e40 a2=94 a3=3 items=0 ppid=2185 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.736000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:50:12.736000 audit: BPF prog-id=88 op=UNLOAD Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit: BPF prog-id=89 op=LOAD Nov 1 00:50:12.736000 audit[2271]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcfe641e80 a2=94 a3=7ffcfe642060 items=0 ppid=2185 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.736000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:50:12.736000 audit: BPF prog-id=89 op=UNLOAD Nov 1 00:50:12.736000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.736000 audit[2271]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffcfe641f50 a2=50 a3=a000000085 items=0 ppid=2185 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.736000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit: BPF prog-id=90 op=LOAD Nov 1 00:50:12.741000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcad729de0 a2=98 a3=3 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.741000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.741000 audit: BPF prog-id=90 op=UNLOAD Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit: BPF prog-id=91 op=LOAD Nov 1 00:50:12.741000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcad729bd0 a2=94 a3=54428f items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.741000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.741000 audit: BPF prog-id=91 op=UNLOAD Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.741000 audit: BPF prog-id=92 op=LOAD Nov 1 00:50:12.741000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcad729c00 a2=94 a3=2 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.741000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.742000 audit: BPF prog-id=92 op=UNLOAD Nov 1 00:50:12.785848 systemd[1]: run-containerd-runc-k8s.io-2171e3bb8e908e7a00024e2d23cc7bfef1e7b34052f03d21a8fbec3ea361e479-runc.HzDbq6.mount: Deactivated successfully. Nov 1 00:50:12.952000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.952000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.952000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.952000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.952000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.952000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.952000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.952000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.952000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.952000 audit: BPF prog-id=93 op=LOAD Nov 1 00:50:12.952000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcad729ac0 a2=94 a3=1 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.952000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.952000 audit: BPF prog-id=93 op=UNLOAD Nov 1 00:50:12.952000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.952000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcad729b90 a2=50 a3=7ffcad729c70 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.952000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.965000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.965000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcad729ad0 a2=28 a3=0 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.965000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.965000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.965000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcad729b00 a2=28 a3=0 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.965000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.965000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.965000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcad729a10 a2=28 a3=0 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.965000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.965000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.965000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcad729b20 a2=28 a3=0 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.965000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.965000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.965000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcad729b00 a2=28 a3=0 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.965000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.965000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.965000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcad729af0 a2=28 a3=0 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.965000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.965000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.965000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcad729b20 a2=28 a3=0 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.965000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.965000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.965000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcad729b00 a2=28 a3=0 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.965000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.965000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.965000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcad729b20 a2=28 a3=0 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.965000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.965000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.965000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcad729af0 a2=28 a3=0 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.965000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.965000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.965000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcad729b60 a2=28 a3=0 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.965000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcad729910 a2=50 a3=1 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.966000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit: BPF prog-id=94 op=LOAD Nov 1 00:50:12.966000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcad729910 a2=94 a3=5 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.966000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.966000 audit: BPF prog-id=94 op=UNLOAD Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcad7299c0 a2=50 a3=1 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.966000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcad729ae0 a2=4 a3=38 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.966000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.966000 audit[2272]: AVC avc: denied { confidentiality } for pid=2272 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:12.966000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcad729b30 a2=94 a3=6 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.966000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { confidentiality } for pid=2272 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:12.967000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcad7292e0 a2=94 a3=88 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.967000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.967000 audit[2272]: AVC avc: denied { confidentiality } for pid=2272 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:12.967000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcad7292e0 a2=94 a3=88 items=0 ppid=2185 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.967000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit: BPF prog-id=95 op=LOAD Nov 1 00:50:12.982000 audit[2296]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe40b15c0 a2=98 a3=1999999999999999 items=0 ppid=2185 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.982000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 00:50:12.982000 audit: BPF prog-id=95 op=UNLOAD Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit: BPF prog-id=96 op=LOAD Nov 1 00:50:12.982000 audit[2296]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe40b14a0 a2=94 a3=ffff items=0 ppid=2185 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.982000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 00:50:12.982000 audit: BPF prog-id=96 op=UNLOAD Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:12.982000 audit: BPF prog-id=97 op=LOAD Nov 1 00:50:12.982000 audit[2296]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe40b14e0 a2=94 a3=7fffe40b16c0 items=0 ppid=2185 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:12.982000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 00:50:12.982000 audit: BPF prog-id=97 op=UNLOAD Nov 1 00:50:13.085410 systemd-networkd[1031]: vxlan.calico: Link UP Nov 1 00:50:13.085428 systemd-networkd[1031]: vxlan.calico: Gained carrier Nov 1 00:50:13.137000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.137000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.137000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.137000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.137000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.137000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.137000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.137000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.137000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.137000 audit: BPF prog-id=98 op=LOAD Nov 1 00:50:13.137000 audit[2324]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd24ca49b0 a2=98 a3=0 items=0 ppid=2185 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.137000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:50:13.138000 audit: BPF prog-id=98 op=UNLOAD Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit: BPF prog-id=99 op=LOAD Nov 1 00:50:13.138000 audit[2324]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd24ca47c0 a2=94 a3=54428f items=0 ppid=2185 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.138000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:50:13.138000 audit: BPF prog-id=99 op=UNLOAD Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit: BPF prog-id=100 op=LOAD Nov 1 00:50:13.138000 audit[2324]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd24ca47f0 a2=94 a3=2 items=0 ppid=2185 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.138000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:50:13.138000 audit: BPF prog-id=100 op=UNLOAD Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd24ca46c0 a2=28 a3=0 items=0 ppid=2185 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.138000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd24ca46f0 a2=28 a3=0 items=0 ppid=2185 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.138000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd24ca4600 a2=28 a3=0 items=0 ppid=2185 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.138000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd24ca4710 a2=28 a3=0 items=0 ppid=2185 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.138000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd24ca46f0 a2=28 a3=0 items=0 ppid=2185 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.138000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd24ca46e0 a2=28 a3=0 items=0 ppid=2185 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.138000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd24ca4710 a2=28 a3=0 items=0 ppid=2185 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.138000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd24ca46f0 a2=28 a3=0 items=0 ppid=2185 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.138000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd24ca4710 a2=28 a3=0 items=0 ppid=2185 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.138000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd24ca46e0 a2=28 a3=0 items=0 ppid=2185 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.138000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd24ca4750 a2=28 a3=0 items=0 ppid=2185 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.138000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.138000 audit: BPF prog-id=101 op=LOAD Nov 1 00:50:13.138000 audit[2324]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd24ca45c0 a2=94 a3=0 items=0 ppid=2185 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.138000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:50:13.143000 audit: BPF prog-id=101 op=UNLOAD Nov 1 00:50:13.144000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.144000 audit[2324]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd24ca45b0 a2=50 a3=2800 items=0 ppid=2185 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.144000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit[2324]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd24ca45b0 a2=50 a3=2800 items=0 ppid=2185 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit: BPF prog-id=102 op=LOAD Nov 1 00:50:13.148000 audit[2324]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd24ca3dd0 a2=94 a3=2 items=0 ppid=2185 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:50:13.148000 audit: BPF prog-id=102 op=UNLOAD Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.148000 audit: BPF prog-id=103 op=LOAD Nov 1 00:50:13.148000 audit[2324]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd24ca3ed0 a2=94 a3=30 items=0 ppid=2185 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:50:13.158000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.158000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.158000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.158000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.158000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.158000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.158000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.158000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.158000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.158000 audit: BPF prog-id=104 op=LOAD Nov 1 00:50:13.158000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd288a5830 a2=98 a3=0 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.158000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.158000 audit: BPF prog-id=104 op=UNLOAD Nov 1 00:50:13.158000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.158000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.158000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.158000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.158000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.158000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.158000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.158000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.158000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.158000 audit: BPF prog-id=105 op=LOAD Nov 1 00:50:13.158000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd288a5620 a2=94 a3=54428f items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.158000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.159000 audit: BPF prog-id=105 op=UNLOAD Nov 1 00:50:13.159000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.159000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.159000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.159000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.159000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.159000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.159000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.159000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.159000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.159000 audit: BPF prog-id=106 op=LOAD Nov 1 00:50:13.159000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd288a5650 a2=94 a3=2 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.159000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.159000 audit: BPF prog-id=106 op=UNLOAD Nov 1 00:50:13.292000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.292000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.292000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.292000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.292000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.292000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.292000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.292000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.292000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.292000 audit: BPF prog-id=107 op=LOAD Nov 1 00:50:13.292000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd288a5510 a2=94 a3=1 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.292000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.292000 audit: BPF prog-id=107 op=UNLOAD Nov 1 00:50:13.292000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.292000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd288a55e0 a2=50 a3=7ffd288a56c0 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.292000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.305000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.305000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd288a5520 a2=28 a3=0 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.305000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.305000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.305000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd288a5550 a2=28 a3=0 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.305000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.305000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.305000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd288a5460 a2=28 a3=0 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.305000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.305000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.305000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd288a5570 a2=28 a3=0 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.305000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.305000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.305000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd288a5550 a2=28 a3=0 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.305000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.305000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.305000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd288a5540 a2=28 a3=0 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.305000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.305000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.305000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd288a5570 a2=28 a3=0 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.305000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.305000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.305000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd288a5550 a2=28 a3=0 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.305000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.305000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.305000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd288a5570 a2=28 a3=0 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.305000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.305000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.305000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd288a5540 a2=28 a3=0 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.305000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.305000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.305000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd288a55b0 a2=28 a3=0 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.305000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd288a5360 a2=50 a3=1 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.306000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit: BPF prog-id=108 op=LOAD Nov 1 00:50:13.306000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd288a5360 a2=94 a3=5 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.306000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.306000 audit: BPF prog-id=108 op=UNLOAD Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd288a5410 a2=50 a3=1 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.306000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd288a5530 a2=4 a3=38 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.306000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { confidentiality } for pid=2328 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:13.306000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd288a5580 a2=94 a3=6 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.306000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.306000 audit[2328]: AVC avc: denied { confidentiality } for pid=2328 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:13.306000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd288a4d30 a2=94 a3=88 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.306000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.307000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.307000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.307000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.307000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.307000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.307000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.307000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.307000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.307000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd288a4d30 a2=94 a3=88 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.307000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.307000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd288a6760 a2=10 a3=f8f00800 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.308000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.308000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd288a6600 a2=10 a3=3 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.308000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.308000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd288a65a0 a2=10 a3=3 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.308000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:13.308000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd288a65a0 a2=10 a3=7 items=0 ppid=2185 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:50:13.314000 audit: BPF prog-id=103 op=UNLOAD Nov 1 00:50:13.404000 audit[2353]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:50:13.404000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffa5abdc20 a2=0 a3=7fffa5abdc0c items=0 ppid=2185 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.404000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:50:13.428000 audit[2354]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:50:13.428000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc3e0c9590 a2=0 a3=7ffc3e0c957c items=0 ppid=2185 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.428000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:50:13.435000 audit[2352]: NETFILTER_CFG table=raw:67 family=2 entries=21 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:50:13.435000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd518a2610 a2=0 a3=7ffd518a25fc items=0 ppid=2185 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.435000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:50:13.438573 kubelet[1551]: E1101 00:50:13.436044 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:13.435000 audit[2355]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:50:13.435000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc82c529d0 a2=0 a3=55bc1852e000 items=0 ppid=2185 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:13.435000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:50:14.403597 systemd-networkd[1031]: vxlan.calico: Gained IPv6LL Nov 1 00:50:14.437059 kubelet[1551]: E1101 00:50:14.436984 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:14.652842 env[1224]: time="2025-11-01T00:50:14.650512731Z" level=info msg="StopPodSandbox for \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\"" Nov 1 00:50:14.771877 env[1224]: 2025-11-01 00:50:14.719 [INFO][2375] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Nov 1 00:50:14.771877 env[1224]: 2025-11-01 00:50:14.720 [INFO][2375] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" iface="eth0" netns="/var/run/netns/cni-986efaf4-dca3-0cc5-f2b8-7a65570090c3" Nov 1 00:50:14.771877 env[1224]: 2025-11-01 00:50:14.720 [INFO][2375] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" iface="eth0" netns="/var/run/netns/cni-986efaf4-dca3-0cc5-f2b8-7a65570090c3" Nov 1 00:50:14.771877 env[1224]: 2025-11-01 00:50:14.721 [INFO][2375] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" iface="eth0" netns="/var/run/netns/cni-986efaf4-dca3-0cc5-f2b8-7a65570090c3" Nov 1 00:50:14.771877 env[1224]: 2025-11-01 00:50:14.721 [INFO][2375] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Nov 1 00:50:14.771877 env[1224]: 2025-11-01 00:50:14.721 [INFO][2375] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Nov 1 00:50:14.771877 env[1224]: 2025-11-01 00:50:14.755 [INFO][2382] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" HandleID="k8s-pod-network.54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Workload="10.128.0.106-k8s-csi--node--driver--wp5pf-eth0" Nov 1 00:50:14.771877 env[1224]: 2025-11-01 00:50:14.756 [INFO][2382] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:50:14.771877 env[1224]: 2025-11-01 00:50:14.756 [INFO][2382] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:50:14.771877 env[1224]: 2025-11-01 00:50:14.764 [WARNING][2382] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" HandleID="k8s-pod-network.54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Workload="10.128.0.106-k8s-csi--node--driver--wp5pf-eth0" Nov 1 00:50:14.771877 env[1224]: 2025-11-01 00:50:14.764 [INFO][2382] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" HandleID="k8s-pod-network.54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Workload="10.128.0.106-k8s-csi--node--driver--wp5pf-eth0" Nov 1 00:50:14.771877 env[1224]: 2025-11-01 00:50:14.766 [INFO][2382] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:50:14.771877 env[1224]: 2025-11-01 00:50:14.769 [INFO][2375] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Nov 1 00:50:14.773045 env[1224]: time="2025-11-01T00:50:14.772977861Z" level=info msg="TearDown network for sandbox \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\" successfully" Nov 1 00:50:14.773244 env[1224]: time="2025-11-01T00:50:14.773212779Z" level=info msg="StopPodSandbox for \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\" returns successfully" Nov 1 00:50:14.776419 systemd[1]: run-netns-cni\x2d986efaf4\x2ddca3\x2d0cc5\x2df2b8\x2d7a65570090c3.mount: Deactivated successfully. Nov 1 00:50:14.779397 env[1224]: time="2025-11-01T00:50:14.779343466Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wp5pf,Uid:139d6e0b-76aa-43ef-aa51-d6466b32bf78,Namespace:calico-system,Attempt:1,}" Nov 1 00:50:14.947195 systemd-networkd[1031]: calid0d896a24c2: Link UP Nov 1 00:50:14.962173 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:50:14.962414 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid0d896a24c2: link becomes ready Nov 1 00:50:14.962980 systemd-networkd[1031]: calid0d896a24c2: Gained carrier Nov 1 00:50:14.986591 env[1224]: 2025-11-01 00:50:14.855 [INFO][2388] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.106-k8s-csi--node--driver--wp5pf-eth0 csi-node-driver- calico-system 139d6e0b-76aa-43ef-aa51-d6466b32bf78 1353 0 2025-11-01 00:49:50 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:857b56db8f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.128.0.106 csi-node-driver-wp5pf eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calid0d896a24c2 [] [] }} ContainerID="8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f" Namespace="calico-system" Pod="csi-node-driver-wp5pf" WorkloadEndpoint="10.128.0.106-k8s-csi--node--driver--wp5pf-" Nov 1 00:50:14.986591 env[1224]: 2025-11-01 00:50:14.855 [INFO][2388] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f" Namespace="calico-system" Pod="csi-node-driver-wp5pf" WorkloadEndpoint="10.128.0.106-k8s-csi--node--driver--wp5pf-eth0" Nov 1 00:50:14.986591 env[1224]: 2025-11-01 00:50:14.894 [INFO][2400] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f" HandleID="k8s-pod-network.8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f" Workload="10.128.0.106-k8s-csi--node--driver--wp5pf-eth0" Nov 1 00:50:14.986591 env[1224]: 2025-11-01 00:50:14.894 [INFO][2400] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f" HandleID="k8s-pod-network.8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f" Workload="10.128.0.106-k8s-csi--node--driver--wp5pf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5620), Attrs:map[string]string{"namespace":"calico-system", "node":"10.128.0.106", "pod":"csi-node-driver-wp5pf", "timestamp":"2025-11-01 00:50:14.894495907 +0000 UTC"}, Hostname:"10.128.0.106", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:50:14.986591 env[1224]: 2025-11-01 00:50:14.894 [INFO][2400] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:50:14.986591 env[1224]: 2025-11-01 00:50:14.894 [INFO][2400] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:50:14.986591 env[1224]: 2025-11-01 00:50:14.894 [INFO][2400] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.106' Nov 1 00:50:14.986591 env[1224]: 2025-11-01 00:50:14.905 [INFO][2400] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f" host="10.128.0.106" Nov 1 00:50:14.986591 env[1224]: 2025-11-01 00:50:14.910 [INFO][2400] ipam/ipam.go 394: Looking up existing affinities for host host="10.128.0.106" Nov 1 00:50:14.986591 env[1224]: 2025-11-01 00:50:14.916 [INFO][2400] ipam/ipam.go 511: Trying affinity for 192.168.102.64/26 host="10.128.0.106" Nov 1 00:50:14.986591 env[1224]: 2025-11-01 00:50:14.918 [INFO][2400] ipam/ipam.go 158: Attempting to load block cidr=192.168.102.64/26 host="10.128.0.106" Nov 1 00:50:14.986591 env[1224]: 2025-11-01 00:50:14.922 [INFO][2400] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.102.64/26 host="10.128.0.106" Nov 1 00:50:14.986591 env[1224]: 2025-11-01 00:50:14.922 [INFO][2400] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.102.64/26 handle="k8s-pod-network.8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f" host="10.128.0.106" Nov 1 00:50:14.986591 env[1224]: 2025-11-01 00:50:14.925 [INFO][2400] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f Nov 1 00:50:14.986591 env[1224]: 2025-11-01 00:50:14.931 [INFO][2400] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.102.64/26 handle="k8s-pod-network.8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f" host="10.128.0.106" Nov 1 00:50:14.986591 env[1224]: 2025-11-01 00:50:14.940 [INFO][2400] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.102.65/26] block=192.168.102.64/26 handle="k8s-pod-network.8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f" host="10.128.0.106" Nov 1 00:50:14.986591 env[1224]: 2025-11-01 00:50:14.940 [INFO][2400] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.102.65/26] handle="k8s-pod-network.8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f" host="10.128.0.106" Nov 1 00:50:14.986591 env[1224]: 2025-11-01 00:50:14.940 [INFO][2400] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:50:14.986591 env[1224]: 2025-11-01 00:50:14.940 [INFO][2400] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.102.65/26] IPv6=[] ContainerID="8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f" HandleID="k8s-pod-network.8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f" Workload="10.128.0.106-k8s-csi--node--driver--wp5pf-eth0" Nov 1 00:50:14.988080 env[1224]: 2025-11-01 00:50:14.943 [INFO][2388] cni-plugin/k8s.go 418: Populated endpoint ContainerID="8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f" Namespace="calico-system" Pod="csi-node-driver-wp5pf" WorkloadEndpoint="10.128.0.106-k8s-csi--node--driver--wp5pf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.106-k8s-csi--node--driver--wp5pf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"139d6e0b-76aa-43ef-aa51-d6466b32bf78", ResourceVersion:"1353", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 49, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.106", ContainerID:"", Pod:"csi-node-driver-wp5pf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.102.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid0d896a24c2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:50:14.988080 env[1224]: 2025-11-01 00:50:14.943 [INFO][2388] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.102.65/32] ContainerID="8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f" Namespace="calico-system" Pod="csi-node-driver-wp5pf" WorkloadEndpoint="10.128.0.106-k8s-csi--node--driver--wp5pf-eth0" Nov 1 00:50:14.988080 env[1224]: 2025-11-01 00:50:14.943 [INFO][2388] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid0d896a24c2 ContainerID="8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f" Namespace="calico-system" Pod="csi-node-driver-wp5pf" WorkloadEndpoint="10.128.0.106-k8s-csi--node--driver--wp5pf-eth0" Nov 1 00:50:14.988080 env[1224]: 2025-11-01 00:50:14.964 [INFO][2388] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f" Namespace="calico-system" Pod="csi-node-driver-wp5pf" WorkloadEndpoint="10.128.0.106-k8s-csi--node--driver--wp5pf-eth0" Nov 1 00:50:14.988080 env[1224]: 2025-11-01 00:50:14.965 [INFO][2388] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f" Namespace="calico-system" Pod="csi-node-driver-wp5pf" WorkloadEndpoint="10.128.0.106-k8s-csi--node--driver--wp5pf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.106-k8s-csi--node--driver--wp5pf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"139d6e0b-76aa-43ef-aa51-d6466b32bf78", ResourceVersion:"1353", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 49, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.106", ContainerID:"8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f", Pod:"csi-node-driver-wp5pf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.102.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid0d896a24c2", MAC:"c2:2e:d2:eb:56:01", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:50:14.988080 env[1224]: 2025-11-01 00:50:14.980 [INFO][2388] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f" Namespace="calico-system" Pod="csi-node-driver-wp5pf" WorkloadEndpoint="10.128.0.106-k8s-csi--node--driver--wp5pf-eth0" Nov 1 00:50:15.011135 env[1224]: time="2025-11-01T00:50:15.010993205Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:50:15.011135 env[1224]: time="2025-11-01T00:50:15.011072806Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:50:15.011650 env[1224]: time="2025-11-01T00:50:15.011580906Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:50:15.013665 env[1224]: time="2025-11-01T00:50:15.012994425Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f pid=2424 runtime=io.containerd.runc.v2 Nov 1 00:50:15.053295 systemd[1]: Started cri-containerd-8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f.scope. Nov 1 00:50:15.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.074000 audit: BPF prog-id=109 op=LOAD Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2424 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:15.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862613932303461353633386161306332393038653137323763373962 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2424 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:15.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862613932303461353633386161306332393038653137323763373962 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit: BPF prog-id=110 op=LOAD Nov 1 00:50:15.076000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025960 items=0 ppid=2424 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:15.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862613932303461353633386161306332393038653137323763373962 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.076000 audit: BPF prog-id=111 op=LOAD Nov 1 00:50:15.076000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000259a8 items=0 ppid=2424 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:15.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862613932303461353633386161306332393038653137323763373962 Nov 1 00:50:15.076000 audit: BPF prog-id=111 op=UNLOAD Nov 1 00:50:15.076000 audit: BPF prog-id=110 op=UNLOAD Nov 1 00:50:15.077000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.077000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.077000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.077000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.077000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.077000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.077000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.077000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.077000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.077000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:15.077000 audit: BPF prog-id=112 op=LOAD Nov 1 00:50:15.077000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025db8 items=0 ppid=2424 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:15.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862613932303461353633386161306332393038653137323763373962 Nov 1 00:50:15.029000 audit[2417]: NETFILTER_CFG table=filter:69 family=2 entries=38 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:50:15.029000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffd9789ad60 a2=0 a3=7ffd9789ad4c items=0 ppid=2185 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:15.029000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:50:15.102850 env[1224]: time="2025-11-01T00:50:15.102761657Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wp5pf,Uid:139d6e0b-76aa-43ef-aa51-d6466b32bf78,Namespace:calico-system,Attempt:1,} returns sandbox id \"8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f\"" Nov 1 00:50:15.105204 env[1224]: time="2025-11-01T00:50:15.105133712Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:50:15.305571 env[1224]: time="2025-11-01T00:50:15.305452643Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:50:15.309824 env[1224]: time="2025-11-01T00:50:15.307066834Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:50:15.310061 kubelet[1551]: E1101 00:50:15.309848 1551 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:50:15.310639 kubelet[1551]: E1101 00:50:15.310031 1551 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:50:15.313476 kubelet[1551]: E1101 00:50:15.313325 1551 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mhvgf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wp5pf_calico-system(139d6e0b-76aa-43ef-aa51-d6466b32bf78): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:50:15.316589 env[1224]: time="2025-11-01T00:50:15.316531569Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:50:15.438037 kubelet[1551]: E1101 00:50:15.437955 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:15.524127 env[1224]: time="2025-11-01T00:50:15.524031609Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:50:15.525566 env[1224]: time="2025-11-01T00:50:15.525483737Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:50:15.526035 kubelet[1551]: E1101 00:50:15.525964 1551 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:50:15.526177 kubelet[1551]: E1101 00:50:15.526062 1551 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:50:15.526742 kubelet[1551]: E1101 00:50:15.526667 1551 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mhvgf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wp5pf_calico-system(139d6e0b-76aa-43ef-aa51-d6466b32bf78): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:50:15.528282 kubelet[1551]: E1101 00:50:15.528196 1551 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-wp5pf" podUID="139d6e0b-76aa-43ef-aa51-d6466b32bf78" Nov 1 00:50:15.647625 env[1224]: time="2025-11-01T00:50:15.647431909Z" level=info msg="StopPodSandbox for \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\"" Nov 1 00:50:15.756762 kubelet[1551]: E1101 00:50:15.756614 1551 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-wp5pf" podUID="139d6e0b-76aa-43ef-aa51-d6466b32bf78" Nov 1 00:50:15.759182 env[1224]: 2025-11-01 00:50:15.709 [INFO][2473] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Nov 1 00:50:15.759182 env[1224]: 2025-11-01 00:50:15.709 [INFO][2473] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" iface="eth0" netns="/var/run/netns/cni-4fc523ed-e90b-27a3-8f2f-5bd2fbc5df76" Nov 1 00:50:15.759182 env[1224]: 2025-11-01 00:50:15.710 [INFO][2473] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" iface="eth0" netns="/var/run/netns/cni-4fc523ed-e90b-27a3-8f2f-5bd2fbc5df76" Nov 1 00:50:15.759182 env[1224]: 2025-11-01 00:50:15.710 [INFO][2473] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" iface="eth0" netns="/var/run/netns/cni-4fc523ed-e90b-27a3-8f2f-5bd2fbc5df76" Nov 1 00:50:15.759182 env[1224]: 2025-11-01 00:50:15.710 [INFO][2473] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Nov 1 00:50:15.759182 env[1224]: 2025-11-01 00:50:15.710 [INFO][2473] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Nov 1 00:50:15.759182 env[1224]: 2025-11-01 00:50:15.738 [INFO][2480] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" HandleID="k8s-pod-network.d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Workload="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0" Nov 1 00:50:15.759182 env[1224]: 2025-11-01 00:50:15.738 [INFO][2480] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:50:15.759182 env[1224]: 2025-11-01 00:50:15.739 [INFO][2480] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:50:15.759182 env[1224]: 2025-11-01 00:50:15.750 [WARNING][2480] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" HandleID="k8s-pod-network.d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Workload="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0" Nov 1 00:50:15.759182 env[1224]: 2025-11-01 00:50:15.751 [INFO][2480] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" HandleID="k8s-pod-network.d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Workload="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0" Nov 1 00:50:15.759182 env[1224]: 2025-11-01 00:50:15.753 [INFO][2480] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:50:15.759182 env[1224]: 2025-11-01 00:50:15.757 [INFO][2473] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Nov 1 00:50:15.760447 env[1224]: time="2025-11-01T00:50:15.759611946Z" level=info msg="TearDown network for sandbox \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\" successfully" Nov 1 00:50:15.760447 env[1224]: time="2025-11-01T00:50:15.759655543Z" level=info msg="StopPodSandbox for \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\" returns successfully" Nov 1 00:50:15.760447 env[1224]: time="2025-11-01T00:50:15.760330986Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-msthq,Uid:dc9fd83f-8635-42aa-813d-408bddcc9efa,Namespace:default,Attempt:1,}" Nov 1 00:50:15.776352 systemd[1]: run-netns-cni\x2d4fc523ed\x2de90b\x2d27a3\x2d8f2f\x2d5bd2fbc5df76.mount: Deactivated successfully. Nov 1 00:50:15.923963 systemd-networkd[1031]: cali216b432c85a: Link UP Nov 1 00:50:15.933940 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali216b432c85a: link becomes ready Nov 1 00:50:15.938768 systemd-networkd[1031]: cali216b432c85a: Gained carrier Nov 1 00:50:15.962129 env[1224]: 2025-11-01 00:50:15.842 [INFO][2486] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0 nginx-deployment-7fcdb87857- default dc9fd83f-8635-42aa-813d-408bddcc9efa 1371 0 2025-11-01 00:50:03 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.106 nginx-deployment-7fcdb87857-msthq eth0 default [] [] [kns.default ksa.default.default] cali216b432c85a [] [] }} ContainerID="8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c" Namespace="default" Pod="nginx-deployment-7fcdb87857-msthq" WorkloadEndpoint="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-" Nov 1 00:50:15.962129 env[1224]: 2025-11-01 00:50:15.842 [INFO][2486] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c" Namespace="default" Pod="nginx-deployment-7fcdb87857-msthq" WorkloadEndpoint="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0" Nov 1 00:50:15.962129 env[1224]: 2025-11-01 00:50:15.875 [INFO][2499] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c" HandleID="k8s-pod-network.8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c" Workload="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0" Nov 1 00:50:15.962129 env[1224]: 2025-11-01 00:50:15.875 [INFO][2499] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c" HandleID="k8s-pod-network.8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c" Workload="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cb0f0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.106", "pod":"nginx-deployment-7fcdb87857-msthq", "timestamp":"2025-11-01 00:50:15.875527826 +0000 UTC"}, Hostname:"10.128.0.106", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:50:15.962129 env[1224]: 2025-11-01 00:50:15.876 [INFO][2499] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:50:15.962129 env[1224]: 2025-11-01 00:50:15.876 [INFO][2499] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:50:15.962129 env[1224]: 2025-11-01 00:50:15.876 [INFO][2499] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.106' Nov 1 00:50:15.962129 env[1224]: 2025-11-01 00:50:15.886 [INFO][2499] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c" host="10.128.0.106" Nov 1 00:50:15.962129 env[1224]: 2025-11-01 00:50:15.891 [INFO][2499] ipam/ipam.go 394: Looking up existing affinities for host host="10.128.0.106" Nov 1 00:50:15.962129 env[1224]: 2025-11-01 00:50:15.896 [INFO][2499] ipam/ipam.go 511: Trying affinity for 192.168.102.64/26 host="10.128.0.106" Nov 1 00:50:15.962129 env[1224]: 2025-11-01 00:50:15.900 [INFO][2499] ipam/ipam.go 158: Attempting to load block cidr=192.168.102.64/26 host="10.128.0.106" Nov 1 00:50:15.962129 env[1224]: 2025-11-01 00:50:15.902 [INFO][2499] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.102.64/26 host="10.128.0.106" Nov 1 00:50:15.962129 env[1224]: 2025-11-01 00:50:15.902 [INFO][2499] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.102.64/26 handle="k8s-pod-network.8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c" host="10.128.0.106" Nov 1 00:50:15.962129 env[1224]: 2025-11-01 00:50:15.904 [INFO][2499] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c Nov 1 00:50:15.962129 env[1224]: 2025-11-01 00:50:15.910 [INFO][2499] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.102.64/26 handle="k8s-pod-network.8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c" host="10.128.0.106" Nov 1 00:50:15.962129 env[1224]: 2025-11-01 00:50:15.917 [INFO][2499] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.102.66/26] block=192.168.102.64/26 handle="k8s-pod-network.8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c" host="10.128.0.106" Nov 1 00:50:15.962129 env[1224]: 2025-11-01 00:50:15.917 [INFO][2499] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.102.66/26] handle="k8s-pod-network.8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c" host="10.128.0.106" Nov 1 00:50:15.962129 env[1224]: 2025-11-01 00:50:15.917 [INFO][2499] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:50:15.962129 env[1224]: 2025-11-01 00:50:15.917 [INFO][2499] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.102.66/26] IPv6=[] ContainerID="8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c" HandleID="k8s-pod-network.8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c" Workload="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0" Nov 1 00:50:15.963352 env[1224]: 2025-11-01 00:50:15.919 [INFO][2486] cni-plugin/k8s.go 418: Populated endpoint ContainerID="8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c" Namespace="default" Pod="nginx-deployment-7fcdb87857-msthq" WorkloadEndpoint="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"dc9fd83f-8635-42aa-813d-408bddcc9efa", ResourceVersion:"1371", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 50, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.106", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-msthq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.102.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali216b432c85a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:50:15.963352 env[1224]: 2025-11-01 00:50:15.919 [INFO][2486] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.102.66/32] ContainerID="8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c" Namespace="default" Pod="nginx-deployment-7fcdb87857-msthq" WorkloadEndpoint="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0" Nov 1 00:50:15.963352 env[1224]: 2025-11-01 00:50:15.919 [INFO][2486] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali216b432c85a ContainerID="8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c" Namespace="default" Pod="nginx-deployment-7fcdb87857-msthq" WorkloadEndpoint="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0" Nov 1 00:50:15.963352 env[1224]: 2025-11-01 00:50:15.940 [INFO][2486] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c" Namespace="default" Pod="nginx-deployment-7fcdb87857-msthq" WorkloadEndpoint="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0" Nov 1 00:50:15.963352 env[1224]: 2025-11-01 00:50:15.944 [INFO][2486] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c" Namespace="default" Pod="nginx-deployment-7fcdb87857-msthq" WorkloadEndpoint="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"dc9fd83f-8635-42aa-813d-408bddcc9efa", ResourceVersion:"1371", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 50, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.106", ContainerID:"8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c", Pod:"nginx-deployment-7fcdb87857-msthq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.102.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali216b432c85a", MAC:"ae:44:e1:ac:99:41", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:50:15.963352 env[1224]: 2025-11-01 00:50:15.954 [INFO][2486] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c" Namespace="default" Pod="nginx-deployment-7fcdb87857-msthq" WorkloadEndpoint="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0" Nov 1 00:50:15.978000 audit[2515]: NETFILTER_CFG table=filter:70 family=2 entries=42 op=nft_register_chain pid=2515 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:50:15.984269 env[1224]: time="2025-11-01T00:50:15.984175944Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:50:15.984565 env[1224]: time="2025-11-01T00:50:15.984524012Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:50:15.984725 env[1224]: time="2025-11-01T00:50:15.984689774Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:50:15.985064 env[1224]: time="2025-11-01T00:50:15.985023953Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c pid=2524 runtime=io.containerd.runc.v2 Nov 1 00:50:15.985157 kernel: kauditd_printk_skb: 656 callbacks suppressed Nov 1 00:50:15.985206 kernel: audit: type=1325 audit(1761958215.978:693): table=filter:70 family=2 entries=42 op=nft_register_chain pid=2515 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:50:16.005856 kernel: audit: type=1300 audit(1761958215.978:693): arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffebba248e0 a2=0 a3=7ffebba248cc items=0 ppid=2185 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:15.978000 audit[2515]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffebba248e0 a2=0 a3=7ffebba248cc items=0 ppid=2185 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:16.035191 systemd[1]: Started cri-containerd-8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c.scope. Nov 1 00:50:15.978000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:50:16.080851 kernel: audit: type=1327 audit(1761958215.978:693): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:50:16.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.108839 kernel: audit: type=1400 audit(1761958216.076:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.129884 kernel: audit: type=1400 audit(1761958216.076:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.150936 kernel: audit: type=1400 audit(1761958216.076:696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.174566 kernel: audit: type=1400 audit(1761958216.076:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.174699 kernel: audit: type=1400 audit(1761958216.076:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.177660 env[1224]: time="2025-11-01T00:50:16.175475597Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-msthq,Uid:dc9fd83f-8635-42aa-813d-408bddcc9efa,Namespace:default,Attempt:1,} returns sandbox id \"8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c\"" Nov 1 00:50:16.179942 env[1224]: time="2025-11-01T00:50:16.179902328Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Nov 1 00:50:16.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.215772 kernel: audit: type=1400 audit(1761958216.076:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.215827 systemd-networkd[1031]: calid0d896a24c2: Gained IPv6LL Nov 1 00:50:16.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.238083 kernel: audit: type=1400 audit(1761958216.076:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.079000 audit: BPF prog-id=113 op=LOAD Nov 1 00:50:16.079000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.079000 audit[2533]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2524 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:16.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861306239356361363234333735663964616638343636306336303135 Nov 1 00:50:16.079000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.079000 audit[2533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2524 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:16.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861306239356361363234333735663964616638343636306336303135 Nov 1 00:50:16.079000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.079000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.079000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.079000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.079000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.079000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.079000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.079000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.079000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.079000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.079000 audit: BPF prog-id=114 op=LOAD Nov 1 00:50:16.079000 audit[2533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000261ce0 items=0 ppid=2524 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:16.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861306239356361363234333735663964616638343636306336303135 Nov 1 00:50:16.080000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.080000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.080000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.080000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.080000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.080000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.080000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.080000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.080000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.080000 audit: BPF prog-id=115 op=LOAD Nov 1 00:50:16.080000 audit[2533]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000261d28 items=0 ppid=2524 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:16.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861306239356361363234333735663964616638343636306336303135 Nov 1 00:50:16.080000 audit: BPF prog-id=115 op=UNLOAD Nov 1 00:50:16.080000 audit: BPF prog-id=114 op=UNLOAD Nov 1 00:50:16.080000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.080000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.080000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.080000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.080000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.080000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.080000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.080000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.080000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.080000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:16.080000 audit: BPF prog-id=116 op=LOAD Nov 1 00:50:16.080000 audit[2533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e2138 items=0 ppid=2524 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:16.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861306239356361363234333735663964616638343636306336303135 Nov 1 00:50:16.438826 kubelet[1551]: E1101 00:50:16.438654 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:16.760448 kubelet[1551]: E1101 00:50:16.760378 1551 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-wp5pf" podUID="139d6e0b-76aa-43ef-aa51-d6466b32bf78" Nov 1 00:50:17.438920 kubelet[1551]: E1101 00:50:17.438858 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:17.989198 systemd-networkd[1031]: cali216b432c85a: Gained IPv6LL Nov 1 00:50:18.439120 kubelet[1551]: E1101 00:50:18.439037 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:19.264733 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3758235504.mount: Deactivated successfully. Nov 1 00:50:19.439677 kubelet[1551]: E1101 00:50:19.439599 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:19.754035 update_engine[1214]: I1101 00:50:19.752925 1214 update_attempter.cc:509] Updating boot flags... Nov 1 00:50:20.440218 kubelet[1551]: E1101 00:50:20.440090 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:21.441196 env[1224]: time="2025-11-01T00:50:21.441033647Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:50:21.441932 kubelet[1551]: E1101 00:50:21.441104 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:21.444571 env[1224]: time="2025-11-01T00:50:21.444504774Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:50:21.447398 env[1224]: time="2025-11-01T00:50:21.447347990Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:50:21.450560 env[1224]: time="2025-11-01T00:50:21.450517441Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:50:21.452076 env[1224]: time="2025-11-01T00:50:21.452022476Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9\"" Nov 1 00:50:21.455724 env[1224]: time="2025-11-01T00:50:21.455677727Z" level=info msg="CreateContainer within sandbox \"8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Nov 1 00:50:21.474963 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3964212358.mount: Deactivated successfully. Nov 1 00:50:21.485056 env[1224]: time="2025-11-01T00:50:21.484993661Z" level=info msg="CreateContainer within sandbox \"8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"6df27962fb742398b42b1428a6b8c4a542d122ab027be91fdd57229f0d2749c4\"" Nov 1 00:50:21.485991 env[1224]: time="2025-11-01T00:50:21.485856264Z" level=info msg="StartContainer for \"6df27962fb742398b42b1428a6b8c4a542d122ab027be91fdd57229f0d2749c4\"" Nov 1 00:50:21.516447 systemd[1]: Started cri-containerd-6df27962fb742398b42b1428a6b8c4a542d122ab027be91fdd57229f0d2749c4.scope. Nov 1 00:50:21.570586 kernel: kauditd_printk_skb: 50 callbacks suppressed Nov 1 00:50:21.570875 kernel: audit: type=1400 audit(1761958221.543:712): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.612223 kernel: audit: type=1400 audit(1761958221.543:713): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.612413 kernel: audit: type=1400 audit(1761958221.546:714): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.655484 kernel: audit: type=1400 audit(1761958221.546:715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.655700 kernel: audit: type=1400 audit(1761958221.546:716): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.677227 kernel: audit: type=1400 audit(1761958221.546:717): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.699400 kernel: audit: type=1400 audit(1761958221.546:718): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.742288 kernel: audit: type=1400 audit(1761958221.546:719): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.743328 kernel: audit: type=1400 audit(1761958221.546:720): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.743418 kernel: audit: type=1400 audit(1761958221.570:721): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.744766 env[1224]: time="2025-11-01T00:50:21.744698738Z" level=info msg="StartContainer for \"6df27962fb742398b42b1428a6b8c4a542d122ab027be91fdd57229f0d2749c4\" returns successfully" Nov 1 00:50:21.570000 audit: BPF prog-id=117 op=LOAD Nov 1 00:50:21.570000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.570000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2524 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:21.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664663237393632666237343233393862343262313432386136623863 Nov 1 00:50:21.570000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.570000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2524 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:21.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664663237393632666237343233393862343262313432386136623863 Nov 1 00:50:21.570000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.570000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.570000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.570000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.570000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.570000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.570000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.570000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.570000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.570000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.570000 audit: BPF prog-id=118 op=LOAD Nov 1 00:50:21.570000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000203fb0 items=0 ppid=2524 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:21.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664663237393632666237343233393862343262313432386136623863 Nov 1 00:50:21.611000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.611000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.611000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.611000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.611000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.611000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.611000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.611000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.611000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.611000 audit: BPF prog-id=119 op=LOAD Nov 1 00:50:21.611000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000203ff8 items=0 ppid=2524 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:21.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664663237393632666237343233393862343262313432386136623863 Nov 1 00:50:21.611000 audit: BPF prog-id=119 op=UNLOAD Nov 1 00:50:21.612000 audit: BPF prog-id=118 op=UNLOAD Nov 1 00:50:21.612000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.612000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.612000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.612000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.612000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.612000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.612000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.612000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.612000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.612000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:21.612000 audit: BPF prog-id=120 op=LOAD Nov 1 00:50:21.612000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000390408 items=0 ppid=2524 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:21.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664663237393632666237343233393862343262313432386136623863 Nov 1 00:50:21.850611 kubelet[1551]: I1101 00:50:21.850502 1551 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-msthq" podStartSLOduration=13.575643686 podStartE2EDuration="18.85046885s" podCreationTimestamp="2025-11-01 00:50:03 +0000 UTC" firstStartedPulling="2025-11-01 00:50:16.179029517 +0000 UTC m=+26.849095510" lastFinishedPulling="2025-11-01 00:50:21.453854687 +0000 UTC m=+32.123920674" observedRunningTime="2025-11-01 00:50:21.850346861 +0000 UTC m=+32.520412856" watchObservedRunningTime="2025-11-01 00:50:21.85046885 +0000 UTC m=+32.520534858" Nov 1 00:50:22.442191 kubelet[1551]: E1101 00:50:22.442109 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:23.442562 kubelet[1551]: E1101 00:50:23.442502 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:24.443950 kubelet[1551]: E1101 00:50:24.443877 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:25.444437 kubelet[1551]: E1101 00:50:25.444374 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:26.444922 kubelet[1551]: E1101 00:50:26.444842 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:27.445754 kubelet[1551]: E1101 00:50:27.445674 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:28.446571 kubelet[1551]: E1101 00:50:28.446498 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:28.648947 env[1224]: time="2025-11-01T00:50:28.648883260Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:50:28.881698 env[1224]: time="2025-11-01T00:50:28.881603352Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:50:28.883302 env[1224]: time="2025-11-01T00:50:28.883226007Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:50:28.883665 kubelet[1551]: E1101 00:50:28.883610 1551 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:50:28.883829 kubelet[1551]: E1101 00:50:28.883705 1551 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:50:28.884489 kubelet[1551]: E1101 00:50:28.883989 1551 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mhvgf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wp5pf_calico-system(139d6e0b-76aa-43ef-aa51-d6466b32bf78): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:50:28.886305 env[1224]: time="2025-11-01T00:50:28.886250538Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:50:29.086914 env[1224]: time="2025-11-01T00:50:29.086830070Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:50:29.088206 env[1224]: time="2025-11-01T00:50:29.088130185Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:50:29.088519 kubelet[1551]: E1101 00:50:29.088455 1551 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:50:29.088660 kubelet[1551]: E1101 00:50:29.088525 1551 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:50:29.088782 kubelet[1551]: E1101 00:50:29.088714 1551 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mhvgf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wp5pf_calico-system(139d6e0b-76aa-43ef-aa51-d6466b32bf78): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:50:29.090506 kubelet[1551]: E1101 00:50:29.090452 1551 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-wp5pf" podUID="139d6e0b-76aa-43ef-aa51-d6466b32bf78" Nov 1 00:50:29.127000 audit[2655]: NETFILTER_CFG table=filter:71 family=2 entries=26 op=nft_register_rule pid=2655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:50:29.134215 kernel: kauditd_printk_skb: 47 callbacks suppressed Nov 1 00:50:29.134329 kernel: audit: type=1325 audit(1761958229.127:730): table=filter:71 family=2 entries=26 op=nft_register_rule pid=2655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:50:29.127000 audit[2655]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7fff9daefe10 a2=0 a3=7fff9daefdfc items=0 ppid=1772 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:29.184528 kernel: audit: type=1300 audit(1761958229.127:730): arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7fff9daefe10 a2=0 a3=7fff9daefdfc items=0 ppid=1772 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:29.184677 kernel: audit: type=1327 audit(1761958229.127:730): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:50:29.127000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:50:29.187689 systemd[1]: Created slice kubepods-besteffort-pod47f226d7_e1fa_4812_9aa5_d7d70f3afb48.slice. Nov 1 00:50:29.185000 audit[2655]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=2655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:50:29.215008 kernel: audit: type=1325 audit(1761958229.185:731): table=nat:72 family=2 entries=20 op=nft_register_rule pid=2655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:50:29.215177 kernel: audit: type=1300 audit(1761958229.185:731): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff9daefe10 a2=0 a3=0 items=0 ppid=1772 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:29.185000 audit[2655]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff9daefe10 a2=0 a3=0 items=0 ppid=1772 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:29.185000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:50:29.260186 kubelet[1551]: I1101 00:50:29.260070 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/47f226d7-e1fa-4812-9aa5-d7d70f3afb48-data\") pod \"nfs-server-provisioner-0\" (UID: \"47f226d7-e1fa-4812-9aa5-d7d70f3afb48\") " pod="default/nfs-server-provisioner-0" Nov 1 00:50:29.260586 kubelet[1551]: I1101 00:50:29.260549 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qwbht\" (UniqueName: \"kubernetes.io/projected/47f226d7-e1fa-4812-9aa5-d7d70f3afb48-kube-api-access-qwbht\") pod \"nfs-server-provisioner-0\" (UID: \"47f226d7-e1fa-4812-9aa5-d7d70f3afb48\") " pod="default/nfs-server-provisioner-0" Nov 1 00:50:29.262429 kernel: audit: type=1327 audit(1761958229.185:731): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:50:29.273000 audit[2657]: NETFILTER_CFG table=filter:73 family=2 entries=38 op=nft_register_rule pid=2657 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:50:29.290837 kernel: audit: type=1325 audit(1761958229.273:732): table=filter:73 family=2 entries=38 op=nft_register_rule pid=2657 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:50:29.273000 audit[2657]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7fffc29dd7d0 a2=0 a3=7fffc29dd7bc items=0 ppid=1772 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:29.324838 kernel: audit: type=1300 audit(1761958229.273:732): arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7fffc29dd7d0 a2=0 a3=7fffc29dd7bc items=0 ppid=1772 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:29.324996 kernel: audit: type=1327 audit(1761958229.273:732): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:50:29.273000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:50:29.290000 audit[2657]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=2657 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:50:29.356409 kernel: audit: type=1325 audit(1761958229.290:733): table=nat:74 family=2 entries=20 op=nft_register_rule pid=2657 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:50:29.290000 audit[2657]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffc29dd7d0 a2=0 a3=0 items=0 ppid=1772 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:29.290000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:50:29.447562 kubelet[1551]: E1101 00:50:29.447380 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:29.493782 env[1224]: time="2025-11-01T00:50:29.493712258Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:47f226d7-e1fa-4812-9aa5-d7d70f3afb48,Namespace:default,Attempt:0,}" Nov 1 00:50:29.646423 systemd-networkd[1031]: cali60e51b789ff: Link UP Nov 1 00:50:29.655046 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:50:29.662877 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Nov 1 00:50:29.663621 systemd-networkd[1031]: cali60e51b789ff: Gained carrier Nov 1 00:50:29.685092 env[1224]: 2025-11-01 00:50:29.565 [INFO][2660] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.106-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 47f226d7-e1fa-4812-9aa5-d7d70f3afb48 1469 0 2025-11-01 00:50:29 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.128.0.106 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.106-k8s-nfs--server--provisioner--0-" Nov 1 00:50:29.685092 env[1224]: 2025-11-01 00:50:29.565 [INFO][2660] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.106-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:50:29.685092 env[1224]: 2025-11-01 00:50:29.598 [INFO][2672] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a" HandleID="k8s-pod-network.7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a" Workload="10.128.0.106-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:50:29.685092 env[1224]: 2025-11-01 00:50:29.598 [INFO][2672] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a" HandleID="k8s-pod-network.7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a" Workload="10.128.0.106-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d50d0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.106", "pod":"nfs-server-provisioner-0", "timestamp":"2025-11-01 00:50:29.598403004 +0000 UTC"}, Hostname:"10.128.0.106", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:50:29.685092 env[1224]: 2025-11-01 00:50:29.598 [INFO][2672] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:50:29.685092 env[1224]: 2025-11-01 00:50:29.598 [INFO][2672] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:50:29.685092 env[1224]: 2025-11-01 00:50:29.598 [INFO][2672] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.106' Nov 1 00:50:29.685092 env[1224]: 2025-11-01 00:50:29.609 [INFO][2672] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a" host="10.128.0.106" Nov 1 00:50:29.685092 env[1224]: 2025-11-01 00:50:29.615 [INFO][2672] ipam/ipam.go 394: Looking up existing affinities for host host="10.128.0.106" Nov 1 00:50:29.685092 env[1224]: 2025-11-01 00:50:29.620 [INFO][2672] ipam/ipam.go 511: Trying affinity for 192.168.102.64/26 host="10.128.0.106" Nov 1 00:50:29.685092 env[1224]: 2025-11-01 00:50:29.622 [INFO][2672] ipam/ipam.go 158: Attempting to load block cidr=192.168.102.64/26 host="10.128.0.106" Nov 1 00:50:29.685092 env[1224]: 2025-11-01 00:50:29.625 [INFO][2672] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.102.64/26 host="10.128.0.106" Nov 1 00:50:29.685092 env[1224]: 2025-11-01 00:50:29.625 [INFO][2672] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.102.64/26 handle="k8s-pod-network.7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a" host="10.128.0.106" Nov 1 00:50:29.685092 env[1224]: 2025-11-01 00:50:29.627 [INFO][2672] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a Nov 1 00:50:29.685092 env[1224]: 2025-11-01 00:50:29.631 [INFO][2672] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.102.64/26 handle="k8s-pod-network.7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a" host="10.128.0.106" Nov 1 00:50:29.685092 env[1224]: 2025-11-01 00:50:29.639 [INFO][2672] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.102.67/26] block=192.168.102.64/26 handle="k8s-pod-network.7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a" host="10.128.0.106" Nov 1 00:50:29.685092 env[1224]: 2025-11-01 00:50:29.639 [INFO][2672] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.102.67/26] handle="k8s-pod-network.7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a" host="10.128.0.106" Nov 1 00:50:29.685092 env[1224]: 2025-11-01 00:50:29.639 [INFO][2672] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:50:29.685092 env[1224]: 2025-11-01 00:50:29.639 [INFO][2672] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.102.67/26] IPv6=[] ContainerID="7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a" HandleID="k8s-pod-network.7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a" Workload="10.128.0.106-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:50:29.686683 env[1224]: 2025-11-01 00:50:29.641 [INFO][2660] cni-plugin/k8s.go 418: Populated endpoint ContainerID="7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.106-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.106-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"47f226d7-e1fa-4812-9aa5-d7d70f3afb48", ResourceVersion:"1469", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 50, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.106", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.102.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:50:29.686683 env[1224]: 2025-11-01 00:50:29.641 [INFO][2660] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.102.67/32] ContainerID="7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.106-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:50:29.686683 env[1224]: 2025-11-01 00:50:29.641 [INFO][2660] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.106-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:50:29.686683 env[1224]: 2025-11-01 00:50:29.664 [INFO][2660] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.106-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:50:29.687070 env[1224]: 2025-11-01 00:50:29.666 [INFO][2660] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.106-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.106-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"47f226d7-e1fa-4812-9aa5-d7d70f3afb48", ResourceVersion:"1469", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 50, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.106", ContainerID:"7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.102.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"36:0e:06:e0:c9:15", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:50:29.687070 env[1224]: 2025-11-01 00:50:29.678 [INFO][2660] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.106-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:50:29.709535 env[1224]: time="2025-11-01T00:50:29.709347515Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:50:29.709535 env[1224]: time="2025-11-01T00:50:29.709450415Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:50:29.709535 env[1224]: time="2025-11-01T00:50:29.709490199Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:50:29.711650 env[1224]: time="2025-11-01T00:50:29.711580970Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a pid=2696 runtime=io.containerd.runc.v2 Nov 1 00:50:29.724000 audit[2704]: NETFILTER_CFG table=filter:75 family=2 entries=40 op=nft_register_chain pid=2704 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:50:29.724000 audit[2704]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffe823d4e80 a2=0 a3=7ffe823d4e6c items=0 ppid=2185 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:29.724000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:50:29.745974 systemd[1]: Started cri-containerd-7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a.scope. Nov 1 00:50:29.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.768000 audit: BPF prog-id=121 op=LOAD Nov 1 00:50:29.768000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.768000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2696 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:29.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765623237653333356535326238323633336433633031356236313939 Nov 1 00:50:29.768000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.768000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2696 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:29.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765623237653333356535326238323633336433633031356236313939 Nov 1 00:50:29.768000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.768000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.768000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.768000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.768000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.768000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.768000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.768000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.768000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.768000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.768000 audit: BPF prog-id=122 op=LOAD Nov 1 00:50:29.768000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001c5080 items=0 ppid=2696 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:29.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765623237653333356535326238323633336433633031356236313939 Nov 1 00:50:29.769000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.769000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.769000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.769000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.769000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.769000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.769000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.769000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.769000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.769000 audit: BPF prog-id=123 op=LOAD Nov 1 00:50:29.769000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001c50c8 items=0 ppid=2696 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:29.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765623237653333356535326238323633336433633031356236313939 Nov 1 00:50:29.769000 audit: BPF prog-id=123 op=UNLOAD Nov 1 00:50:29.769000 audit: BPF prog-id=122 op=UNLOAD Nov 1 00:50:29.769000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.769000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.769000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.769000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.769000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.769000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.769000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.769000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.769000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.769000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:29.769000 audit: BPF prog-id=124 op=LOAD Nov 1 00:50:29.769000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c54d8 items=0 ppid=2696 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:29.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765623237653333356535326238323633336433633031356236313939 Nov 1 00:50:29.810144 env[1224]: time="2025-11-01T00:50:29.810077845Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:47f226d7-e1fa-4812-9aa5-d7d70f3afb48,Namespace:default,Attempt:0,} returns sandbox id \"7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a\"" Nov 1 00:50:29.812607 env[1224]: time="2025-11-01T00:50:29.812564001Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Nov 1 00:50:30.376439 systemd[1]: run-containerd-runc-k8s.io-7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a-runc.78Ftgd.mount: Deactivated successfully. Nov 1 00:50:30.412375 kubelet[1551]: E1101 00:50:30.412277 1551 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:30.448058 kubelet[1551]: E1101 00:50:30.447980 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:31.044425 systemd-networkd[1031]: cali60e51b789ff: Gained IPv6LL Nov 1 00:50:31.448966 kubelet[1551]: E1101 00:50:31.448757 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:32.449441 kubelet[1551]: E1101 00:50:32.449304 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:32.575427 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount642097466.mount: Deactivated successfully. Nov 1 00:50:33.451926 kubelet[1551]: E1101 00:50:33.451829 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:34.452153 kubelet[1551]: E1101 00:50:34.452082 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:35.453317 kubelet[1551]: E1101 00:50:35.453239 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:35.938930 env[1224]: time="2025-11-01T00:50:35.938842229Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:50:35.941848 env[1224]: time="2025-11-01T00:50:35.941762015Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:50:35.944704 env[1224]: time="2025-11-01T00:50:35.944650536Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:50:35.947438 env[1224]: time="2025-11-01T00:50:35.947396734Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:50:35.948672 env[1224]: time="2025-11-01T00:50:35.948622091Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Nov 1 00:50:35.953489 env[1224]: time="2025-11-01T00:50:35.953442664Z" level=info msg="CreateContainer within sandbox \"7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Nov 1 00:50:35.971766 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3718765947.mount: Deactivated successfully. Nov 1 00:50:35.985537 env[1224]: time="2025-11-01T00:50:35.985458390Z" level=info msg="CreateContainer within sandbox \"7eb27e335e52b82633d3c015b6199b877aed407fe76d9568ae624dfd2054e92a\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"fa872d1fa3741269d52b588a058839677a9bc46f0dbb0423c31f4f3b61fd2b0d\"" Nov 1 00:50:35.986826 env[1224]: time="2025-11-01T00:50:35.986767212Z" level=info msg="StartContainer for \"fa872d1fa3741269d52b588a058839677a9bc46f0dbb0423c31f4f3b61fd2b0d\"" Nov 1 00:50:36.028121 systemd[1]: Started cri-containerd-fa872d1fa3741269d52b588a058839677a9bc46f0dbb0423c31f4f3b61fd2b0d.scope. Nov 1 00:50:36.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.061533 kernel: kauditd_printk_skb: 62 callbacks suppressed Nov 1 00:50:36.061635 kernel: audit: type=1400 audit(1761958236.054:753): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102931 kernel: audit: type=1400 audit(1761958236.055:754): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.145474 kernel: audit: type=1400 audit(1761958236.055:755): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.146431 kernel: audit: type=1400 audit(1761958236.055:756): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.146514 kernel: audit: type=1400 audit(1761958236.055:757): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.188351 kernel: audit: type=1400 audit(1761958236.055:758): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.188602 kernel: audit: type=1400 audit(1761958236.055:759): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.229590 kernel: audit: type=1400 audit(1761958236.055:760): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.229854 kernel: audit: type=1400 audit(1761958236.055:761): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.271157 kernel: audit: type=1400 audit(1761958236.081:762): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.081000 audit: BPF prog-id=125 op=LOAD Nov 1 00:50:36.082000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.082000 audit[2747]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2696 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:36.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661383732643166613337343132363964353262353838613035383833 Nov 1 00:50:36.082000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.082000 audit[2747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2696 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:36.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661383732643166613337343132363964353262353838613035383833 Nov 1 00:50:36.082000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.082000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.082000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.082000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.082000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.082000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.082000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.082000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.082000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.082000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.082000 audit: BPF prog-id=126 op=LOAD Nov 1 00:50:36.082000 audit[2747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001d9a80 items=0 ppid=2696 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:36.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661383732643166613337343132363964353262353838613035383833 Nov 1 00:50:36.102000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102000 audit: BPF prog-id=127 op=LOAD Nov 1 00:50:36.102000 audit[2747]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001d9ac8 items=0 ppid=2696 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:36.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661383732643166613337343132363964353262353838613035383833 Nov 1 00:50:36.102000 audit: BPF prog-id=127 op=UNLOAD Nov 1 00:50:36.102000 audit: BPF prog-id=126 op=UNLOAD Nov 1 00:50:36.102000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:36.102000 audit: BPF prog-id=128 op=LOAD Nov 1 00:50:36.102000 audit[2747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001d9ed8 items=0 ppid=2696 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:36.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661383732643166613337343132363964353262353838613035383833 Nov 1 00:50:36.274949 env[1224]: time="2025-11-01T00:50:36.274816148Z" level=info msg="StartContainer for \"fa872d1fa3741269d52b588a058839677a9bc46f0dbb0423c31f4f3b61fd2b0d\" returns successfully" Nov 1 00:50:36.304000 audit[2775]: AVC avc: denied { search } for pid=2775 comm="rpcbind" name="crypto" dev="proc" ino=21344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c476,c762 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 00:50:36.304000 audit[2775]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f31b40290c0 a2=0 a3=0 items=0 ppid=2757 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c476,c762 key=(null) Nov 1 00:50:36.304000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Nov 1 00:50:36.352000 audit[2780]: AVC avc: denied { search } for pid=2780 comm="dbus-daemon" name="crypto" dev="proc" ino=21344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c476,c762 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 00:50:36.352000 audit[2780]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f4367d090c0 a2=0 a3=0 items=0 ppid=2757 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c476,c762 key=(null) Nov 1 00:50:36.352000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Nov 1 00:50:36.358000 audit[2781]: AVC avc: denied { watch } for pid=2781 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=522292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c476,c762 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c476,c762 tclass=dir permissive=0 Nov 1 00:50:36.358000 audit[2781]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55addce73c10 a2=2c8 a3=7ffdf1ecde0c items=0 ppid=2757 pid=2781 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c476,c762 key=(null) Nov 1 00:50:36.358000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Nov 1 00:50:36.364000 audit[2782]: AVC avc: denied { read } for pid=2782 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21372 scontext=system_u:system_r:svirt_lxc_net_t:s0:c476,c762 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Nov 1 00:50:36.364000 audit[2782]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f2b211db320 a1=80000 a2=d a3=7fff7013a800 items=0 ppid=2757 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c476,c762 key=(null) Nov 1 00:50:36.364000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Nov 1 00:50:36.366000 audit[2782]: AVC avc: denied { search } for pid=2782 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c476,c762 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 00:50:36.366000 audit[2782]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f2b2072f0c0 a2=0 a3=0 items=0 ppid=2757 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c476,c762 key=(null) Nov 1 00:50:36.366000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Nov 1 00:50:36.454564 kubelet[1551]: E1101 00:50:36.454493 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:36.892680 kubelet[1551]: I1101 00:50:36.892588 1551 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.753218383 podStartE2EDuration="7.892548112s" podCreationTimestamp="2025-11-01 00:50:29 +0000 UTC" firstStartedPulling="2025-11-01 00:50:29.811890436 +0000 UTC m=+40.481956415" lastFinishedPulling="2025-11-01 00:50:35.951220158 +0000 UTC m=+46.621286144" observedRunningTime="2025-11-01 00:50:36.891462896 +0000 UTC m=+47.561528882" watchObservedRunningTime="2025-11-01 00:50:36.892548112 +0000 UTC m=+47.562614106" Nov 1 00:50:36.914000 audit[2799]: NETFILTER_CFG table=filter:76 family=2 entries=26 op=nft_register_rule pid=2799 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:50:36.914000 audit[2799]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff231db2a0 a2=0 a3=7fff231db28c items=0 ppid=1772 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:36.914000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:50:36.921000 audit[2799]: NETFILTER_CFG table=nat:77 family=2 entries=104 op=nft_register_chain pid=2799 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:50:36.921000 audit[2799]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7fff231db2a0 a2=0 a3=7fff231db28c items=0 ppid=1772 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:36.921000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:50:37.455299 kubelet[1551]: E1101 00:50:37.455219 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:38.456378 kubelet[1551]: E1101 00:50:38.456320 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:39.457357 kubelet[1551]: E1101 00:50:39.457269 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:40.458430 kubelet[1551]: E1101 00:50:40.458366 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:40.650006 kubelet[1551]: E1101 00:50:40.649780 1551 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-wp5pf" podUID="139d6e0b-76aa-43ef-aa51-d6466b32bf78" Nov 1 00:50:41.459481 kubelet[1551]: E1101 00:50:41.459410 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:42.460114 kubelet[1551]: E1101 00:50:42.460033 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:42.773464 systemd[1]: run-containerd-runc-k8s.io-2171e3bb8e908e7a00024e2d23cc7bfef1e7b34052f03d21a8fbec3ea361e479-runc.Cv2YQr.mount: Deactivated successfully. Nov 1 00:50:43.461164 kubelet[1551]: E1101 00:50:43.461087 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:44.461610 kubelet[1551]: E1101 00:50:44.461532 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:45.462607 kubelet[1551]: E1101 00:50:45.462525 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:46.274729 systemd[1]: Created slice kubepods-besteffort-pod5870640f_f8f8_4f8a_8600_c5af58549492.slice. Nov 1 00:50:46.396152 kubelet[1551]: I1101 00:50:46.396054 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-531dd229-b9e3-4a66-98d6-6c6609c082b6\" (UniqueName: \"kubernetes.io/nfs/5870640f-f8f8-4f8a-8600-c5af58549492-pvc-531dd229-b9e3-4a66-98d6-6c6609c082b6\") pod \"test-pod-1\" (UID: \"5870640f-f8f8-4f8a-8600-c5af58549492\") " pod="default/test-pod-1" Nov 1 00:50:46.396152 kubelet[1551]: I1101 00:50:46.396141 1551 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pgpbj\" (UniqueName: \"kubernetes.io/projected/5870640f-f8f8-4f8a-8600-c5af58549492-kube-api-access-pgpbj\") pod \"test-pod-1\" (UID: \"5870640f-f8f8-4f8a-8600-c5af58549492\") " pod="default/test-pod-1" Nov 1 00:50:46.463643 kubelet[1551]: E1101 00:50:46.463575 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:46.541987 kernel: Failed to create system directory netfs Nov 1 00:50:46.542255 kernel: kauditd_printk_skb: 68 callbacks suppressed Nov 1 00:50:46.542307 kernel: audit: type=1400 audit(1761958246.528:778): avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.542362 kernel: Failed to create system directory netfs Nov 1 00:50:46.528000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.570107 kernel: audit: type=1400 audit(1761958246.528:778): avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.570313 kernel: Failed to create system directory netfs Nov 1 00:50:46.528000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.598176 kernel: audit: type=1400 audit(1761958246.528:778): avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.598328 kernel: Failed to create system directory netfs Nov 1 00:50:46.528000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.649463 kernel: audit: type=1400 audit(1761958246.528:778): avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.528000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.528000 audit[2826]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5597be8715e0 a1=153bc a2=5597b5fb52b0 a3=5 items=0 ppid=1735 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:46.528000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:50:46.698497 kernel: audit: type=1300 audit(1761958246.528:778): arch=c000003e syscall=175 success=yes exit=0 a0=5597be8715e0 a1=153bc a2=5597b5fb52b0 a3=5 items=0 ppid=1735 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:46.698696 kernel: audit: type=1327 audit(1761958246.528:778): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:50:46.661000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.733812 kernel: Failed to create system directory fscache Nov 1 00:50:46.733973 kernel: audit: type=1400 audit(1761958246.661:779): avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.734048 kernel: Failed to create system directory fscache Nov 1 00:50:46.734081 kernel: audit: type=1400 audit(1761958246.661:779): avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.661000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.762070 kernel: Failed to create system directory fscache Nov 1 00:50:46.762233 kernel: audit: type=1400 audit(1761958246.661:779): avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.661000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.790313 kernel: Failed to create system directory fscache Nov 1 00:50:46.790527 kernel: audit: type=1400 audit(1761958246.661:779): avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.661000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.814051 kernel: Failed to create system directory fscache Nov 1 00:50:46.661000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.661000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.823816 kernel: Failed to create system directory fscache Nov 1 00:50:46.823934 kernel: Failed to create system directory fscache Nov 1 00:50:46.661000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.661000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.834240 kernel: Failed to create system directory fscache Nov 1 00:50:46.834358 kernel: Failed to create system directory fscache Nov 1 00:50:46.661000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.839495 kernel: Failed to create system directory fscache Nov 1 00:50:46.661000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.661000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.849862 kernel: Failed to create system directory fscache Nov 1 00:50:46.849967 kernel: Failed to create system directory fscache Nov 1 00:50:46.661000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.661000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.860287 kernel: Failed to create system directory fscache Nov 1 00:50:46.860415 kernel: Failed to create system directory fscache Nov 1 00:50:46.661000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.661000 audit[2826]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5597bea869c0 a1=4c0fc a2=5597b5fb52b0 a3=5 items=0 ppid=1735 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:46.870952 kernel: FS-Cache: Loaded Nov 1 00:50:46.661000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.924680 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.924857 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.924905 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.940061 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.940207 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.940254 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.950380 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.950512 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.960625 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.960729 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.971057 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.971188 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.981363 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.981503 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.991710 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.991877 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.002007 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.002151 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.012269 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.012373 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.022514 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.022607 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.032758 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.032894 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.043007 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.048292 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.048384 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.058617 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.058742 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.068858 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.068987 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.079132 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.079286 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.089382 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.089490 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.099619 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.099719 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.109864 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.109947 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.120304 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.120440 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.130689 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.130829 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.141002 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.141122 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.146842 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.156456 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.156519 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.166984 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.167092 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.177225 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.177325 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.187473 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.187568 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.197715 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.197826 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.207964 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.208064 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.218198 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.218330 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.228442 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.228568 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.239107 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.239266 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.249383 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.249583 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.259678 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.259850 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.269951 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.270089 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.280230 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.280404 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.290487 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.290627 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.300897 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.301064 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.311051 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.311256 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.321338 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.321537 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.331622 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.331741 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.342637 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.342895 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.352878 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.352995 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.363069 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.363183 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.368337 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.378560 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.378675 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.388767 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.388884 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.394012 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.399839 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.409413 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.409864 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.414908 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.425049 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.425158 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.435324 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.435419 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.445694 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.445790 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.461676 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.461780 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.461832 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.463970 kubelet[1551]: E1101 00:50:47.463892 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:47.466880 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.472927 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.482404 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.482523 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.492791 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.492926 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.508254 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.508368 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.508438 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.518740 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.518914 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.524124 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.534375 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.534474 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.544745 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.544889 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.555111 kernel: Failed to create system directory sunrpc Nov 1 00:50:47.555240 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.560425 kernel: Failed to create system directory sunrpc Nov 1 00:50:46.899000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.586127 kernel: RPC: Registered named UNIX socket transport module. Nov 1 00:50:47.586420 kernel: RPC: Registered udp transport module. Nov 1 00:50:47.586468 kernel: RPC: Registered tcp transport module. Nov 1 00:50:47.590930 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Nov 1 00:50:46.899000 audit[2826]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5597bead2ad0 a1=1a8274 a2=5597b5fb52b0 a3=5 items=6 ppid=1735 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:46.899000 audit: CWD cwd="/" Nov 1 00:50:46.899000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:50:46.899000 audit: PATH item=1 name=(null) inode=23708 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:50:46.899000 audit: PATH item=2 name=(null) inode=23708 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:50:46.899000 audit: PATH item=3 name=(null) inode=23709 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:50:46.899000 audit: PATH item=4 name=(null) inode=23708 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:50:46.899000 audit: PATH item=5 name=(null) inode=23710 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:50:46.899000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.661439 kernel: Failed to create system directory nfs Nov 1 00:50:47.661551 kernel: Failed to create system directory nfs Nov 1 00:50:47.661628 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.671201 kernel: Failed to create system directory nfs Nov 1 00:50:47.671314 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.681166 kernel: Failed to create system directory nfs Nov 1 00:50:47.681266 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.691021 kernel: Failed to create system directory nfs Nov 1 00:50:47.691155 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.700741 kernel: Failed to create system directory nfs Nov 1 00:50:47.700888 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.710647 kernel: Failed to create system directory nfs Nov 1 00:50:47.710779 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.720407 kernel: Failed to create system directory nfs Nov 1 00:50:47.720515 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.730250 kernel: Failed to create system directory nfs Nov 1 00:50:47.730371 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.739944 kernel: Failed to create system directory nfs Nov 1 00:50:47.740076 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.749727 kernel: Failed to create system directory nfs Nov 1 00:50:47.750024 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.759451 kernel: Failed to create system directory nfs Nov 1 00:50:47.759582 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.769220 kernel: Failed to create system directory nfs Nov 1 00:50:47.769301 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.778946 kernel: Failed to create system directory nfs Nov 1 00:50:47.779016 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.788757 kernel: Failed to create system directory nfs Nov 1 00:50:47.788880 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.798500 kernel: Failed to create system directory nfs Nov 1 00:50:47.798602 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.808370 kernel: Failed to create system directory nfs Nov 1 00:50:47.808528 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.818098 kernel: Failed to create system directory nfs Nov 1 00:50:47.818221 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.827934 kernel: Failed to create system directory nfs Nov 1 00:50:47.828054 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.837656 kernel: Failed to create system directory nfs Nov 1 00:50:47.837786 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.842715 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.852498 kernel: Failed to create system directory nfs Nov 1 00:50:47.852601 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.862262 kernel: Failed to create system directory nfs Nov 1 00:50:47.862375 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.867018 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.871992 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.881710 kernel: Failed to create system directory nfs Nov 1 00:50:47.881865 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.891436 kernel: Failed to create system directory nfs Nov 1 00:50:47.891678 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.902090 kernel: Failed to create system directory nfs Nov 1 00:50:47.902299 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.907035 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.911968 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.921686 kernel: Failed to create system directory nfs Nov 1 00:50:47.921849 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.931492 kernel: Failed to create system directory nfs Nov 1 00:50:47.931661 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.941319 kernel: Failed to create system directory nfs Nov 1 00:50:47.941435 kernel: Failed to create system directory nfs Nov 1 00:50:47.639000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:47.976865 kernel: FS-Cache: Netfs 'nfs' registered for caching Nov 1 00:50:47.639000 audit[2826]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5597becf3c10 a1=16eb2c a2=5597b5fb52b0 a3=5 items=0 ppid=1735 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:47.639000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.043949 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.044128 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.044173 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.053854 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.053985 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.063771 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.063951 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.073614 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.073748 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.083495 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.083645 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.093632 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.093824 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.103683 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.103846 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.114166 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.114320 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.124091 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.124265 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.129113 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.134197 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.144215 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.144487 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.149348 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.154362 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.159310 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.164351 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.169273 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.174304 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.179281 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.184244 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.194365 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.194504 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.199358 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.204318 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.209323 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.214314 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.219301 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.224395 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.229279 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.239280 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.239428 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.249207 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.249342 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.259187 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.259345 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.269094 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.269215 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.279045 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.279158 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.289018 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.289144 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.298967 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.299094 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.308979 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.309113 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.313974 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.323897 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.324050 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.329047 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.334026 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.343877 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.344032 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.353830 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.353949 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.363782 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.363918 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.373768 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.373915 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.383666 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.383765 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.393633 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.393779 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.403955 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.404071 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.413964 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.414088 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.418953 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.428779 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.428924 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.438758 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.438978 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.454169 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.454315 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.454364 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.464169 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.464328 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.464459 kubelet[1551]: E1101 00:50:48.464077 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.478948 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.479166 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.479216 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.488862 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.489002 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.498758 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.498911 kernel: Failed to create system directory nfs4 Nov 1 00:50:48.016000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.693993 kernel: NFS: Registering the id_resolver key type Nov 1 00:50:48.694256 kernel: Key type id_resolver registered Nov 1 00:50:48.694299 kernel: Key type id_legacy registered Nov 1 00:50:48.016000 audit[2831]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f69aadc4010 a1=2095c4 a2=56106c6032b0 a3=5 items=0 ppid=1735 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:48.016000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.727527 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.727675 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.727717 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.732818 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.743049 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.743146 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.753304 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.753406 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.763588 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.763662 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.773786 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.773893 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.784075 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.784186 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.794361 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.794519 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.804598 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.804709 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.809876 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.814998 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.825219 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.825343 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.835479 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.835623 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.845744 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.845867 kernel: Failed to create system directory rpcgss Nov 1 00:50:48.712000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:50:48.712000 audit[2832]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f9a55095010 a1=70bf4 a2=55e64f2f12b0 a3=5 items=0 ppid=1735 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:48.712000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Nov 1 00:50:48.887663 nfsidmap[2842]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Nov 1 00:50:48.898417 nfsidmap[2843]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Nov 1 00:50:48.914000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2674 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:50:48.915000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2674 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:50:48.915000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2674 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:50:48.915000 audit[1353]: AVC avc: denied { watch_reads } for pid=1353 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2674 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:50:48.915000 audit[1353]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=560c04de8730 a2=10 a3=ee86930ecddfee6e items=0 ppid=1 pid=1353 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:48.915000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 00:50:48.915000 audit[1353]: AVC avc: denied { watch_reads } for pid=1353 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2674 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:50:48.915000 audit[1353]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=560c04de8730 a2=10 a3=ee86930ecddfee6e items=0 ppid=1 pid=1353 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:48.915000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 00:50:48.916000 audit[1353]: AVC avc: denied { watch_reads } for pid=1353 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2674 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:50:48.916000 audit[1353]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=560c04de8730 a2=10 a3=ee86930ecddfee6e items=0 ppid=1 pid=1353 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:48.916000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 00:50:48.984160 env[1224]: time="2025-11-01T00:50:48.981447965Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:5870640f-f8f8-4f8a-8600-c5af58549492,Namespace:default,Attempt:0,}" Nov 1 00:50:49.236943 systemd-networkd[1031]: cali5ec59c6bf6e: Link UP Nov 1 00:50:49.253270 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:50:49.253449 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Nov 1 00:50:49.254414 systemd-networkd[1031]: cali5ec59c6bf6e: Gained carrier Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.059 [INFO][2844] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.106-k8s-test--pod--1-eth0 default 5870640f-f8f8-4f8a-8600-c5af58549492 1563 0 2025-11-01 00:50:29 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.106 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.106-k8s-test--pod--1-" Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.059 [INFO][2844] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.106-k8s-test--pod--1-eth0" Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.104 [INFO][2857] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276" HandleID="k8s-pod-network.1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276" Workload="10.128.0.106-k8s-test--pod--1-eth0" Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.105 [INFO][2857] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276" HandleID="k8s-pod-network.1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276" Workload="10.128.0.106-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000103ef0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.106", "pod":"test-pod-1", "timestamp":"2025-11-01 00:50:49.104785663 +0000 UTC"}, Hostname:"10.128.0.106", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.105 [INFO][2857] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.105 [INFO][2857] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.105 [INFO][2857] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.106' Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.121 [INFO][2857] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276" host="10.128.0.106" Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.128 [INFO][2857] ipam/ipam.go 394: Looking up existing affinities for host host="10.128.0.106" Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.138 [INFO][2857] ipam/ipam.go 511: Trying affinity for 192.168.102.64/26 host="10.128.0.106" Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.141 [INFO][2857] ipam/ipam.go 158: Attempting to load block cidr=192.168.102.64/26 host="10.128.0.106" Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.146 [INFO][2857] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.102.64/26 host="10.128.0.106" Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.146 [INFO][2857] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.102.64/26 handle="k8s-pod-network.1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276" host="10.128.0.106" Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.148 [INFO][2857] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276 Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.202 [INFO][2857] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.102.64/26 handle="k8s-pod-network.1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276" host="10.128.0.106" Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.228 [INFO][2857] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.102.68/26] block=192.168.102.64/26 handle="k8s-pod-network.1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276" host="10.128.0.106" Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.228 [INFO][2857] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.102.68/26] handle="k8s-pod-network.1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276" host="10.128.0.106" Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.228 [INFO][2857] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.228 [INFO][2857] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.102.68/26] IPv6=[] ContainerID="1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276" HandleID="k8s-pod-network.1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276" Workload="10.128.0.106-k8s-test--pod--1-eth0" Nov 1 00:50:49.273580 env[1224]: 2025-11-01 00:50:49.231 [INFO][2844] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.106-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.106-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"5870640f-f8f8-4f8a-8600-c5af58549492", ResourceVersion:"1563", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 50, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.106", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.102.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:50:49.275175 env[1224]: 2025-11-01 00:50:49.231 [INFO][2844] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.102.68/32] ContainerID="1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.106-k8s-test--pod--1-eth0" Nov 1 00:50:49.275175 env[1224]: 2025-11-01 00:50:49.231 [INFO][2844] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.106-k8s-test--pod--1-eth0" Nov 1 00:50:49.275175 env[1224]: 2025-11-01 00:50:49.257 [INFO][2844] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.106-k8s-test--pod--1-eth0" Nov 1 00:50:49.275175 env[1224]: 2025-11-01 00:50:49.258 [INFO][2844] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.106-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.106-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"5870640f-f8f8-4f8a-8600-c5af58549492", ResourceVersion:"1563", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 50, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.106", ContainerID:"1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.102.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"02:b6:ea:af:89:61", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:50:49.275175 env[1224]: 2025-11-01 00:50:49.270 [INFO][2844] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.106-k8s-test--pod--1-eth0" Nov 1 00:50:49.296888 env[1224]: time="2025-11-01T00:50:49.296529621Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:50:49.296888 env[1224]: time="2025-11-01T00:50:49.296595534Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:50:49.296888 env[1224]: time="2025-11-01T00:50:49.296626064Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:50:49.297261 env[1224]: time="2025-11-01T00:50:49.296981722Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276 pid=2881 runtime=io.containerd.runc.v2 Nov 1 00:50:49.312000 audit[2879]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=2879 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:50:49.312000 audit[2879]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fffe831b730 a2=0 a3=7fffe831b71c items=0 ppid=2185 pid=2879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:49.312000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:50:49.330365 systemd[1]: Started cri-containerd-1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276.scope. Nov 1 00:50:49.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.356000 audit: BPF prog-id=129 op=LOAD Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2881 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:49.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164333831656137663464336239626564373565636564346136333166 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2881 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:49.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164333831656137663464336239626564373565636564346136333166 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit: BPF prog-id=130 op=LOAD Nov 1 00:50:49.357000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c0d00 items=0 ppid=2881 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:49.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164333831656137663464336239626564373565636564346136333166 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit: BPF prog-id=131 op=LOAD Nov 1 00:50:49.357000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c0d48 items=0 ppid=2881 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:49.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164333831656137663464336239626564373565636564346136333166 Nov 1 00:50:49.357000 audit: BPF prog-id=131 op=UNLOAD Nov 1 00:50:49.357000 audit: BPF prog-id=130 op=UNLOAD Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.357000 audit: BPF prog-id=132 op=LOAD Nov 1 00:50:49.357000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c1158 items=0 ppid=2881 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:49.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164333831656137663464336239626564373565636564346136333166 Nov 1 00:50:49.406240 env[1224]: time="2025-11-01T00:50:49.406172444Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:5870640f-f8f8-4f8a-8600-c5af58549492,Namespace:default,Attempt:0,} returns sandbox id \"1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276\"" Nov 1 00:50:49.408725 env[1224]: time="2025-11-01T00:50:49.408680006Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Nov 1 00:50:49.465393 kubelet[1551]: E1101 00:50:49.465280 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:49.634785 env[1224]: time="2025-11-01T00:50:49.634704872Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:50:49.637196 env[1224]: time="2025-11-01T00:50:49.637144198Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:50:49.639878 env[1224]: time="2025-11-01T00:50:49.639832329Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:50:49.642624 env[1224]: time="2025-11-01T00:50:49.642573968Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:50:49.643562 env[1224]: time="2025-11-01T00:50:49.643508143Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9\"" Nov 1 00:50:49.647755 env[1224]: time="2025-11-01T00:50:49.647708430Z" level=info msg="CreateContainer within sandbox \"1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276\" for container &ContainerMetadata{Name:test,Attempt:0,}" Nov 1 00:50:49.669647 env[1224]: time="2025-11-01T00:50:49.669574572Z" level=info msg="CreateContainer within sandbox \"1d381ea7f4d3b9bed75eced4a631fd39819661dbc48645c9b0424ebe91f98276\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"65b55088fff18e08d3189aa1a36f92ec0ba67c573e8dbdf825c7fadcb37583d9\"" Nov 1 00:50:49.670826 env[1224]: time="2025-11-01T00:50:49.670769802Z" level=info msg="StartContainer for \"65b55088fff18e08d3189aa1a36f92ec0ba67c573e8dbdf825c7fadcb37583d9\"" Nov 1 00:50:49.699996 systemd[1]: Started cri-containerd-65b55088fff18e08d3189aa1a36f92ec0ba67c573e8dbdf825c7fadcb37583d9.scope. Nov 1 00:50:49.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.730000 audit: BPF prog-id=133 op=LOAD Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit[2924]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2881 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:49.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635623535303838666666313865303864333138396161316133366639 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit[2924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2881 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:49.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635623535303838666666313865303864333138396161316133366639 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit: BPF prog-id=134 op=LOAD Nov 1 00:50:49.731000 audit[2924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002fbdc0 items=0 ppid=2881 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:49.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635623535303838666666313865303864333138396161316133366639 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.731000 audit: BPF prog-id=135 op=LOAD Nov 1 00:50:49.731000 audit[2924]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002fbe08 items=0 ppid=2881 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:49.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635623535303838666666313865303864333138396161316133366639 Nov 1 00:50:49.731000 audit: BPF prog-id=135 op=UNLOAD Nov 1 00:50:49.732000 audit: BPF prog-id=134 op=UNLOAD Nov 1 00:50:49.732000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.732000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.732000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.732000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.732000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.732000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.732000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.732000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.732000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.732000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:50:49.732000 audit: BPF prog-id=136 op=LOAD Nov 1 00:50:49.732000 audit[2924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003d8218 items=0 ppid=2881 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:50:49.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635623535303838666666313865303864333138396161316133366639 Nov 1 00:50:49.762073 env[1224]: time="2025-11-01T00:50:49.761994757Z" level=info msg="StartContainer for \"65b55088fff18e08d3189aa1a36f92ec0ba67c573e8dbdf825c7fadcb37583d9\" returns successfully" Nov 1 00:50:49.926686 kubelet[1551]: I1101 00:50:49.926474 1551 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=20.688958745 podStartE2EDuration="20.926441739s" podCreationTimestamp="2025-11-01 00:50:29 +0000 UTC" firstStartedPulling="2025-11-01 00:50:49.407954327 +0000 UTC m=+60.078020305" lastFinishedPulling="2025-11-01 00:50:49.645437317 +0000 UTC m=+60.315503299" observedRunningTime="2025-11-01 00:50:49.925785427 +0000 UTC m=+60.595851426" watchObservedRunningTime="2025-11-01 00:50:49.926441739 +0000 UTC m=+60.596507737" Nov 1 00:50:50.412333 kubelet[1551]: E1101 00:50:50.412261 1551 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:50.457888 env[1224]: time="2025-11-01T00:50:50.457829376Z" level=info msg="StopPodSandbox for \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\"" Nov 1 00:50:50.466156 kubelet[1551]: E1101 00:50:50.466093 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:50.546995 env[1224]: 2025-11-01 00:50:50.504 [WARNING][2982] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"dc9fd83f-8635-42aa-813d-408bddcc9efa", ResourceVersion:"1415", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 50, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.106", ContainerID:"8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c", Pod:"nginx-deployment-7fcdb87857-msthq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.102.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali216b432c85a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:50:50.546995 env[1224]: 2025-11-01 00:50:50.505 [INFO][2982] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Nov 1 00:50:50.546995 env[1224]: 2025-11-01 00:50:50.505 [INFO][2982] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" iface="eth0" netns="" Nov 1 00:50:50.546995 env[1224]: 2025-11-01 00:50:50.505 [INFO][2982] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Nov 1 00:50:50.546995 env[1224]: 2025-11-01 00:50:50.505 [INFO][2982] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Nov 1 00:50:50.546995 env[1224]: 2025-11-01 00:50:50.532 [INFO][2989] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" HandleID="k8s-pod-network.d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Workload="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0" Nov 1 00:50:50.546995 env[1224]: 2025-11-01 00:50:50.533 [INFO][2989] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:50:50.546995 env[1224]: 2025-11-01 00:50:50.533 [INFO][2989] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:50:50.546995 env[1224]: 2025-11-01 00:50:50.542 [WARNING][2989] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" HandleID="k8s-pod-network.d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Workload="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0" Nov 1 00:50:50.546995 env[1224]: 2025-11-01 00:50:50.542 [INFO][2989] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" HandleID="k8s-pod-network.d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Workload="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0" Nov 1 00:50:50.546995 env[1224]: 2025-11-01 00:50:50.544 [INFO][2989] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:50:50.546995 env[1224]: 2025-11-01 00:50:50.545 [INFO][2982] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Nov 1 00:50:50.547787 env[1224]: time="2025-11-01T00:50:50.547019203Z" level=info msg="TearDown network for sandbox \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\" successfully" Nov 1 00:50:50.547787 env[1224]: time="2025-11-01T00:50:50.547063871Z" level=info msg="StopPodSandbox for \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\" returns successfully" Nov 1 00:50:50.548596 env[1224]: time="2025-11-01T00:50:50.548545841Z" level=info msg="RemovePodSandbox for \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\"" Nov 1 00:50:50.548734 env[1224]: time="2025-11-01T00:50:50.548610171Z" level=info msg="Forcibly stopping sandbox \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\"" Nov 1 00:50:50.676002 env[1224]: 2025-11-01 00:50:50.598 [WARNING][3004] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"dc9fd83f-8635-42aa-813d-408bddcc9efa", ResourceVersion:"1415", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 50, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.106", ContainerID:"8a0b95ca624375f9daf84660c6015efc12372c07c52edf18d28af7082d09695c", Pod:"nginx-deployment-7fcdb87857-msthq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.102.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali216b432c85a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:50:50.676002 env[1224]: 2025-11-01 00:50:50.599 [INFO][3004] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Nov 1 00:50:50.676002 env[1224]: 2025-11-01 00:50:50.599 [INFO][3004] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" iface="eth0" netns="" Nov 1 00:50:50.676002 env[1224]: 2025-11-01 00:50:50.599 [INFO][3004] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Nov 1 00:50:50.676002 env[1224]: 2025-11-01 00:50:50.599 [INFO][3004] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Nov 1 00:50:50.676002 env[1224]: 2025-11-01 00:50:50.624 [INFO][3011] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" HandleID="k8s-pod-network.d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Workload="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0" Nov 1 00:50:50.676002 env[1224]: 2025-11-01 00:50:50.625 [INFO][3011] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:50:50.676002 env[1224]: 2025-11-01 00:50:50.625 [INFO][3011] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:50:50.676002 env[1224]: 2025-11-01 00:50:50.660 [WARNING][3011] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" HandleID="k8s-pod-network.d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Workload="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0" Nov 1 00:50:50.676002 env[1224]: 2025-11-01 00:50:50.661 [INFO][3011] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" HandleID="k8s-pod-network.d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Workload="10.128.0.106-k8s-nginx--deployment--7fcdb87857--msthq-eth0" Nov 1 00:50:50.676002 env[1224]: 2025-11-01 00:50:50.672 [INFO][3011] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:50:50.676002 env[1224]: 2025-11-01 00:50:50.673 [INFO][3004] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468" Nov 1 00:50:50.676002 env[1224]: time="2025-11-01T00:50:50.675043716Z" level=info msg="TearDown network for sandbox \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\" successfully" Nov 1 00:50:50.681496 env[1224]: time="2025-11-01T00:50:50.681445241Z" level=info msg="RemovePodSandbox \"d38ff455c82567a305401169dd7a52f806b256c82071d47f698d21c529ee7468\" returns successfully" Nov 1 00:50:50.682190 env[1224]: time="2025-11-01T00:50:50.682142318Z" level=info msg="StopPodSandbox for \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\"" Nov 1 00:50:50.769535 env[1224]: 2025-11-01 00:50:50.727 [WARNING][3027] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.106-k8s-csi--node--driver--wp5pf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"139d6e0b-76aa-43ef-aa51-d6466b32bf78", ResourceVersion:"1532", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 49, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.106", ContainerID:"8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f", Pod:"csi-node-driver-wp5pf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.102.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid0d896a24c2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:50:50.769535 env[1224]: 2025-11-01 00:50:50.727 [INFO][3027] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Nov 1 00:50:50.769535 env[1224]: 2025-11-01 00:50:50.727 [INFO][3027] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" iface="eth0" netns="" Nov 1 00:50:50.769535 env[1224]: 2025-11-01 00:50:50.727 [INFO][3027] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Nov 1 00:50:50.769535 env[1224]: 2025-11-01 00:50:50.727 [INFO][3027] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Nov 1 00:50:50.769535 env[1224]: 2025-11-01 00:50:50.756 [INFO][3034] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" HandleID="k8s-pod-network.54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Workload="10.128.0.106-k8s-csi--node--driver--wp5pf-eth0" Nov 1 00:50:50.769535 env[1224]: 2025-11-01 00:50:50.756 [INFO][3034] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:50:50.769535 env[1224]: 2025-11-01 00:50:50.756 [INFO][3034] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:50:50.769535 env[1224]: 2025-11-01 00:50:50.765 [WARNING][3034] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" HandleID="k8s-pod-network.54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Workload="10.128.0.106-k8s-csi--node--driver--wp5pf-eth0" Nov 1 00:50:50.769535 env[1224]: 2025-11-01 00:50:50.765 [INFO][3034] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" HandleID="k8s-pod-network.54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Workload="10.128.0.106-k8s-csi--node--driver--wp5pf-eth0" Nov 1 00:50:50.769535 env[1224]: 2025-11-01 00:50:50.766 [INFO][3034] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:50:50.769535 env[1224]: 2025-11-01 00:50:50.767 [INFO][3027] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Nov 1 00:50:50.769535 env[1224]: time="2025-11-01T00:50:50.769502191Z" level=info msg="TearDown network for sandbox \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\" successfully" Nov 1 00:50:50.770356 env[1224]: time="2025-11-01T00:50:50.769553607Z" level=info msg="StopPodSandbox for \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\" returns successfully" Nov 1 00:50:50.771058 env[1224]: time="2025-11-01T00:50:50.770999404Z" level=info msg="RemovePodSandbox for \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\"" Nov 1 00:50:50.771193 env[1224]: time="2025-11-01T00:50:50.771057915Z" level=info msg="Forcibly stopping sandbox \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\"" Nov 1 00:50:50.857777 env[1224]: 2025-11-01 00:50:50.817 [WARNING][3048] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.106-k8s-csi--node--driver--wp5pf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"139d6e0b-76aa-43ef-aa51-d6466b32bf78", ResourceVersion:"1532", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 49, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.106", ContainerID:"8ba9204a5638aa0c2908e1727c79b1badb67dfddcea5d2077976dad28114548f", Pod:"csi-node-driver-wp5pf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.102.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid0d896a24c2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:50:50.857777 env[1224]: 2025-11-01 00:50:50.817 [INFO][3048] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Nov 1 00:50:50.857777 env[1224]: 2025-11-01 00:50:50.817 [INFO][3048] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" iface="eth0" netns="" Nov 1 00:50:50.857777 env[1224]: 2025-11-01 00:50:50.817 [INFO][3048] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Nov 1 00:50:50.857777 env[1224]: 2025-11-01 00:50:50.818 [INFO][3048] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Nov 1 00:50:50.857777 env[1224]: 2025-11-01 00:50:50.844 [INFO][3055] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" HandleID="k8s-pod-network.54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Workload="10.128.0.106-k8s-csi--node--driver--wp5pf-eth0" Nov 1 00:50:50.857777 env[1224]: 2025-11-01 00:50:50.844 [INFO][3055] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:50:50.857777 env[1224]: 2025-11-01 00:50:50.844 [INFO][3055] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:50:50.857777 env[1224]: 2025-11-01 00:50:50.853 [WARNING][3055] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" HandleID="k8s-pod-network.54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Workload="10.128.0.106-k8s-csi--node--driver--wp5pf-eth0" Nov 1 00:50:50.857777 env[1224]: 2025-11-01 00:50:50.853 [INFO][3055] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" HandleID="k8s-pod-network.54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Workload="10.128.0.106-k8s-csi--node--driver--wp5pf-eth0" Nov 1 00:50:50.857777 env[1224]: 2025-11-01 00:50:50.855 [INFO][3055] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:50:50.857777 env[1224]: 2025-11-01 00:50:50.856 [INFO][3048] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad" Nov 1 00:50:50.858708 env[1224]: time="2025-11-01T00:50:50.857863735Z" level=info msg="TearDown network for sandbox \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\" successfully" Nov 1 00:50:50.862547 env[1224]: time="2025-11-01T00:50:50.862476659Z" level=info msg="RemovePodSandbox \"54f3ec64d1651517e00852d7ec740547a96bbee594d153138799bd496d032bad\" returns successfully" Nov 1 00:50:51.139706 systemd-networkd[1031]: cali5ec59c6bf6e: Gained IPv6LL Nov 1 00:50:51.466751 kubelet[1551]: E1101 00:50:51.466581 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:52.467031 kubelet[1551]: E1101 00:50:52.466960 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:53.467844 kubelet[1551]: E1101 00:50:53.467765 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:53.648727 env[1224]: time="2025-11-01T00:50:53.648661372Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:50:53.846572 env[1224]: time="2025-11-01T00:50:53.846491454Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:50:53.848228 env[1224]: time="2025-11-01T00:50:53.848158551Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:50:53.848589 kubelet[1551]: E1101 00:50:53.848538 1551 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:50:53.848731 kubelet[1551]: E1101 00:50:53.848607 1551 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:50:53.848935 kubelet[1551]: E1101 00:50:53.848834 1551 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mhvgf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wp5pf_calico-system(139d6e0b-76aa-43ef-aa51-d6466b32bf78): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:50:53.851609 env[1224]: time="2025-11-01T00:50:53.851544933Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:50:54.046861 env[1224]: time="2025-11-01T00:50:54.046749038Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:50:54.048476 env[1224]: time="2025-11-01T00:50:54.048398147Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:50:54.048771 kubelet[1551]: E1101 00:50:54.048713 1551 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:50:54.048919 kubelet[1551]: E1101 00:50:54.048789 1551 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:50:54.049080 kubelet[1551]: E1101 00:50:54.049004 1551 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mhvgf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wp5pf_calico-system(139d6e0b-76aa-43ef-aa51-d6466b32bf78): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:50:54.050780 kubelet[1551]: E1101 00:50:54.050722 1551 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-wp5pf" podUID="139d6e0b-76aa-43ef-aa51-d6466b32bf78" Nov 1 00:50:54.468737 kubelet[1551]: E1101 00:50:54.468656 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:55.469473 kubelet[1551]: E1101 00:50:55.469381 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:50:56.470646 kubelet[1551]: E1101 00:50:56.470566 1551 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"