Nov 1 00:59:17.648609 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Oct 31 23:02:53 -00 2025 Nov 1 00:59:17.648625 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 Nov 1 00:59:17.648631 kernel: Disabled fast string operations Nov 1 00:59:17.648635 kernel: BIOS-provided physical RAM map: Nov 1 00:59:17.648639 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Nov 1 00:59:17.648643 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Nov 1 00:59:17.648649 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Nov 1 00:59:17.648653 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Nov 1 00:59:17.648657 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Nov 1 00:59:17.648661 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Nov 1 00:59:17.648665 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Nov 1 00:59:17.648670 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Nov 1 00:59:17.648674 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Nov 1 00:59:17.648678 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Nov 1 00:59:17.648688 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Nov 1 00:59:17.648693 kernel: NX (Execute Disable) protection: active Nov 1 00:59:17.648698 kernel: SMBIOS 2.7 present. Nov 1 00:59:17.648703 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Nov 1 00:59:17.648707 kernel: vmware: hypercall mode: 0x00 Nov 1 00:59:17.648712 kernel: Hypervisor detected: VMware Nov 1 00:59:17.648717 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Nov 1 00:59:17.648722 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Nov 1 00:59:17.648727 kernel: vmware: using clock offset of 8264534145 ns Nov 1 00:59:17.648731 kernel: tsc: Detected 3408.000 MHz processor Nov 1 00:59:17.648736 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Nov 1 00:59:17.648741 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Nov 1 00:59:17.648746 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Nov 1 00:59:17.648751 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Nov 1 00:59:17.648756 kernel: total RAM covered: 3072M Nov 1 00:59:17.648761 kernel: Found optimal setting for mtrr clean up Nov 1 00:59:17.648767 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Nov 1 00:59:17.648771 kernel: Using GB pages for direct mapping Nov 1 00:59:17.648776 kernel: ACPI: Early table checksum verification disabled Nov 1 00:59:17.648781 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Nov 1 00:59:17.648786 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Nov 1 00:59:17.648792 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Nov 1 00:59:17.648797 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Nov 1 00:59:17.648801 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Nov 1 00:59:17.648806 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Nov 1 00:59:17.651696 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Nov 1 00:59:17.651705 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Nov 1 00:59:17.651710 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Nov 1 00:59:17.651715 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Nov 1 00:59:17.651721 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Nov 1 00:59:17.651727 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Nov 1 00:59:17.651732 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Nov 1 00:59:17.651737 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Nov 1 00:59:17.651742 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Nov 1 00:59:17.651747 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Nov 1 00:59:17.651752 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Nov 1 00:59:17.651757 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Nov 1 00:59:17.651762 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Nov 1 00:59:17.651767 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Nov 1 00:59:17.651773 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Nov 1 00:59:17.651778 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Nov 1 00:59:17.651783 kernel: system APIC only can use physical flat Nov 1 00:59:17.651788 kernel: Setting APIC routing to physical flat. Nov 1 00:59:17.651794 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Nov 1 00:59:17.651799 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Nov 1 00:59:17.651804 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Nov 1 00:59:17.651828 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Nov 1 00:59:17.651834 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Nov 1 00:59:17.651840 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Nov 1 00:59:17.651845 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Nov 1 00:59:17.651850 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Nov 1 00:59:17.651855 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Nov 1 00:59:17.651860 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Nov 1 00:59:17.651865 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Nov 1 00:59:17.651870 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Nov 1 00:59:17.651875 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Nov 1 00:59:17.651880 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Nov 1 00:59:17.651885 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Nov 1 00:59:17.651891 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Nov 1 00:59:17.651896 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Nov 1 00:59:17.651901 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Nov 1 00:59:17.651906 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Nov 1 00:59:17.651911 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Nov 1 00:59:17.651916 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Nov 1 00:59:17.651921 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Nov 1 00:59:17.651926 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Nov 1 00:59:17.651931 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Nov 1 00:59:17.651936 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Nov 1 00:59:17.651941 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Nov 1 00:59:17.651946 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Nov 1 00:59:17.651951 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Nov 1 00:59:17.651956 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Nov 1 00:59:17.651961 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Nov 1 00:59:17.651966 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Nov 1 00:59:17.651971 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Nov 1 00:59:17.651976 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Nov 1 00:59:17.651981 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Nov 1 00:59:17.651986 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Nov 1 00:59:17.651992 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Nov 1 00:59:17.651997 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Nov 1 00:59:17.652001 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Nov 1 00:59:17.652006 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Nov 1 00:59:17.652011 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Nov 1 00:59:17.652016 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Nov 1 00:59:17.652021 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Nov 1 00:59:17.652026 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Nov 1 00:59:17.652031 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Nov 1 00:59:17.652036 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Nov 1 00:59:17.652042 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Nov 1 00:59:17.652047 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Nov 1 00:59:17.652052 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Nov 1 00:59:17.652057 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Nov 1 00:59:17.652062 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Nov 1 00:59:17.652067 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Nov 1 00:59:17.652072 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Nov 1 00:59:17.652077 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Nov 1 00:59:17.652082 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Nov 1 00:59:17.652087 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Nov 1 00:59:17.652093 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Nov 1 00:59:17.652098 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Nov 1 00:59:17.652103 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Nov 1 00:59:17.652108 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Nov 1 00:59:17.652113 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Nov 1 00:59:17.652118 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Nov 1 00:59:17.652127 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Nov 1 00:59:17.652133 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Nov 1 00:59:17.652138 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Nov 1 00:59:17.652144 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Nov 1 00:59:17.652149 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Nov 1 00:59:17.652155 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Nov 1 00:59:17.652161 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Nov 1 00:59:17.652166 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Nov 1 00:59:17.652172 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Nov 1 00:59:17.652177 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Nov 1 00:59:17.652182 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Nov 1 00:59:17.652187 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Nov 1 00:59:17.652194 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Nov 1 00:59:17.652199 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Nov 1 00:59:17.652204 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Nov 1 00:59:17.652210 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Nov 1 00:59:17.652215 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Nov 1 00:59:17.652220 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Nov 1 00:59:17.652225 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Nov 1 00:59:17.652231 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Nov 1 00:59:17.652236 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Nov 1 00:59:17.652242 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Nov 1 00:59:17.652248 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Nov 1 00:59:17.652254 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Nov 1 00:59:17.652259 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Nov 1 00:59:17.652264 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Nov 1 00:59:17.652270 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Nov 1 00:59:17.652275 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Nov 1 00:59:17.652280 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Nov 1 00:59:17.652286 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Nov 1 00:59:17.652291 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Nov 1 00:59:17.652297 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Nov 1 00:59:17.652302 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Nov 1 00:59:17.652308 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Nov 1 00:59:17.652313 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Nov 1 00:59:17.652318 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Nov 1 00:59:17.652324 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Nov 1 00:59:17.652329 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Nov 1 00:59:17.652334 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Nov 1 00:59:17.652340 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Nov 1 00:59:17.652345 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Nov 1 00:59:17.652351 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Nov 1 00:59:17.652357 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Nov 1 00:59:17.652362 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Nov 1 00:59:17.652367 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Nov 1 00:59:17.652372 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Nov 1 00:59:17.652378 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Nov 1 00:59:17.652383 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Nov 1 00:59:17.652388 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Nov 1 00:59:17.652394 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Nov 1 00:59:17.652399 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Nov 1 00:59:17.652405 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Nov 1 00:59:17.652410 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Nov 1 00:59:17.652416 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Nov 1 00:59:17.652421 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Nov 1 00:59:17.652426 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Nov 1 00:59:17.652432 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Nov 1 00:59:17.652437 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Nov 1 00:59:17.652442 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Nov 1 00:59:17.652447 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Nov 1 00:59:17.652453 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Nov 1 00:59:17.652459 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Nov 1 00:59:17.652464 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Nov 1 00:59:17.652470 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Nov 1 00:59:17.652475 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Nov 1 00:59:17.652480 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Nov 1 00:59:17.652485 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Nov 1 00:59:17.652491 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Nov 1 00:59:17.652496 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Nov 1 00:59:17.652502 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Nov 1 00:59:17.652507 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Nov 1 00:59:17.652514 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Nov 1 00:59:17.652520 kernel: Zone ranges: Nov 1 00:59:17.652525 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Nov 1 00:59:17.652531 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Nov 1 00:59:17.652536 kernel: Normal empty Nov 1 00:59:17.652541 kernel: Movable zone start for each node Nov 1 00:59:17.652547 kernel: Early memory node ranges Nov 1 00:59:17.652552 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Nov 1 00:59:17.652558 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Nov 1 00:59:17.652564 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Nov 1 00:59:17.652570 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Nov 1 00:59:17.652575 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Nov 1 00:59:17.652580 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Nov 1 00:59:17.652586 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Nov 1 00:59:17.652591 kernel: ACPI: PM-Timer IO Port: 0x1008 Nov 1 00:59:17.652597 kernel: system APIC only can use physical flat Nov 1 00:59:17.652602 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Nov 1 00:59:17.652607 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Nov 1 00:59:17.652614 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Nov 1 00:59:17.652619 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Nov 1 00:59:17.652625 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Nov 1 00:59:17.652630 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Nov 1 00:59:17.652635 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Nov 1 00:59:17.652641 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Nov 1 00:59:17.652646 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Nov 1 00:59:17.652651 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Nov 1 00:59:17.652657 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Nov 1 00:59:17.652662 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Nov 1 00:59:17.652668 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Nov 1 00:59:17.652674 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Nov 1 00:59:17.652683 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Nov 1 00:59:17.652689 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Nov 1 00:59:17.652694 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Nov 1 00:59:17.652700 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Nov 1 00:59:17.652705 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Nov 1 00:59:17.652710 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Nov 1 00:59:17.652716 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Nov 1 00:59:17.652722 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Nov 1 00:59:17.652728 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Nov 1 00:59:17.652733 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Nov 1 00:59:17.652739 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Nov 1 00:59:17.652744 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Nov 1 00:59:17.652749 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Nov 1 00:59:17.652755 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Nov 1 00:59:17.652760 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Nov 1 00:59:17.652765 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Nov 1 00:59:17.652771 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Nov 1 00:59:17.652777 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Nov 1 00:59:17.652782 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Nov 1 00:59:17.652788 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Nov 1 00:59:17.652793 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Nov 1 00:59:17.652798 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Nov 1 00:59:17.652804 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Nov 1 00:59:17.654386 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Nov 1 00:59:17.654394 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Nov 1 00:59:17.654400 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Nov 1 00:59:17.654408 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Nov 1 00:59:17.654413 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Nov 1 00:59:17.654419 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Nov 1 00:59:17.654424 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Nov 1 00:59:17.654430 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Nov 1 00:59:17.654435 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Nov 1 00:59:17.654440 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Nov 1 00:59:17.654446 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Nov 1 00:59:17.654451 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Nov 1 00:59:17.654456 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Nov 1 00:59:17.654463 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Nov 1 00:59:17.654468 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Nov 1 00:59:17.654474 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Nov 1 00:59:17.654479 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Nov 1 00:59:17.654484 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Nov 1 00:59:17.654490 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Nov 1 00:59:17.654495 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Nov 1 00:59:17.654500 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Nov 1 00:59:17.654506 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Nov 1 00:59:17.654512 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Nov 1 00:59:17.654518 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Nov 1 00:59:17.654523 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Nov 1 00:59:17.654528 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Nov 1 00:59:17.654534 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Nov 1 00:59:17.654539 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Nov 1 00:59:17.654544 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Nov 1 00:59:17.654550 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Nov 1 00:59:17.654555 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Nov 1 00:59:17.654561 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Nov 1 00:59:17.654567 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Nov 1 00:59:17.654572 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Nov 1 00:59:17.654577 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Nov 1 00:59:17.654583 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Nov 1 00:59:17.654588 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Nov 1 00:59:17.654594 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Nov 1 00:59:17.654599 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Nov 1 00:59:17.654604 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Nov 1 00:59:17.654610 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Nov 1 00:59:17.654616 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Nov 1 00:59:17.654621 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Nov 1 00:59:17.654627 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Nov 1 00:59:17.654632 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Nov 1 00:59:17.654638 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Nov 1 00:59:17.654643 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Nov 1 00:59:17.654648 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Nov 1 00:59:17.654654 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Nov 1 00:59:17.654659 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Nov 1 00:59:17.654665 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Nov 1 00:59:17.654671 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Nov 1 00:59:17.654676 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Nov 1 00:59:17.654682 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Nov 1 00:59:17.654687 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Nov 1 00:59:17.654692 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Nov 1 00:59:17.654698 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Nov 1 00:59:17.654703 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Nov 1 00:59:17.654708 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Nov 1 00:59:17.654714 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Nov 1 00:59:17.654720 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Nov 1 00:59:17.654725 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Nov 1 00:59:17.654731 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Nov 1 00:59:17.654736 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Nov 1 00:59:17.654742 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Nov 1 00:59:17.654747 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Nov 1 00:59:17.654752 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Nov 1 00:59:17.654758 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Nov 1 00:59:17.654763 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Nov 1 00:59:17.654770 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Nov 1 00:59:17.654775 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Nov 1 00:59:17.654781 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Nov 1 00:59:17.654786 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Nov 1 00:59:17.654791 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Nov 1 00:59:17.654796 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Nov 1 00:59:17.654802 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Nov 1 00:59:17.654814 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Nov 1 00:59:17.654821 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Nov 1 00:59:17.654826 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Nov 1 00:59:17.654833 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Nov 1 00:59:17.654839 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Nov 1 00:59:17.654844 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Nov 1 00:59:17.654849 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Nov 1 00:59:17.654855 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Nov 1 00:59:17.654860 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Nov 1 00:59:17.654865 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Nov 1 00:59:17.654871 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Nov 1 00:59:17.654876 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Nov 1 00:59:17.654882 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Nov 1 00:59:17.654888 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Nov 1 00:59:17.654893 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Nov 1 00:59:17.654898 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Nov 1 00:59:17.654904 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Nov 1 00:59:17.654910 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Nov 1 00:59:17.654915 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Nov 1 00:59:17.654920 kernel: TSC deadline timer available Nov 1 00:59:17.654926 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Nov 1 00:59:17.654933 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Nov 1 00:59:17.654938 kernel: Booting paravirtualized kernel on VMware hypervisor Nov 1 00:59:17.654944 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Nov 1 00:59:17.654949 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Nov 1 00:59:17.654955 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Nov 1 00:59:17.654961 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Nov 1 00:59:17.654966 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Nov 1 00:59:17.654972 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Nov 1 00:59:17.654977 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Nov 1 00:59:17.654983 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Nov 1 00:59:17.654989 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Nov 1 00:59:17.654994 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Nov 1 00:59:17.654999 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Nov 1 00:59:17.655011 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Nov 1 00:59:17.655018 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Nov 1 00:59:17.655024 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Nov 1 00:59:17.655029 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Nov 1 00:59:17.655035 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Nov 1 00:59:17.655041 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Nov 1 00:59:17.655047 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Nov 1 00:59:17.655052 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Nov 1 00:59:17.655058 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Nov 1 00:59:17.655065 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Nov 1 00:59:17.655071 kernel: Policy zone: DMA32 Nov 1 00:59:17.655077 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 Nov 1 00:59:17.655084 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Nov 1 00:59:17.655091 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Nov 1 00:59:17.655097 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Nov 1 00:59:17.655102 kernel: printk: log_buf_len min size: 262144 bytes Nov 1 00:59:17.655108 kernel: printk: log_buf_len: 1048576 bytes Nov 1 00:59:17.655114 kernel: printk: early log buf free: 239728(91%) Nov 1 00:59:17.655120 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Nov 1 00:59:17.655126 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Nov 1 00:59:17.655131 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Nov 1 00:59:17.655137 kernel: Memory: 1940392K/2096628K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 155976K reserved, 0K cma-reserved) Nov 1 00:59:17.655144 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Nov 1 00:59:17.655150 kernel: ftrace: allocating 34614 entries in 136 pages Nov 1 00:59:17.655158 kernel: ftrace: allocated 136 pages with 2 groups Nov 1 00:59:17.655165 kernel: rcu: Hierarchical RCU implementation. Nov 1 00:59:17.655171 kernel: rcu: RCU event tracing is enabled. Nov 1 00:59:17.655178 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Nov 1 00:59:17.655184 kernel: Rude variant of Tasks RCU enabled. Nov 1 00:59:17.655190 kernel: Tracing variant of Tasks RCU enabled. Nov 1 00:59:17.655196 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Nov 1 00:59:17.655202 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Nov 1 00:59:17.655208 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Nov 1 00:59:17.655214 kernel: random: crng init done Nov 1 00:59:17.655219 kernel: Console: colour VGA+ 80x25 Nov 1 00:59:17.655225 kernel: printk: console [tty0] enabled Nov 1 00:59:17.655231 kernel: printk: console [ttyS0] enabled Nov 1 00:59:17.655238 kernel: ACPI: Core revision 20210730 Nov 1 00:59:17.655244 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Nov 1 00:59:17.655250 kernel: APIC: Switch to symmetric I/O mode setup Nov 1 00:59:17.655256 kernel: x2apic enabled Nov 1 00:59:17.655262 kernel: Switched APIC routing to physical x2apic. Nov 1 00:59:17.655267 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Nov 1 00:59:17.655273 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Nov 1 00:59:17.655279 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Nov 1 00:59:17.655285 kernel: Disabled fast string operations Nov 1 00:59:17.655292 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Nov 1 00:59:17.655298 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 Nov 1 00:59:17.655304 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Nov 1 00:59:17.655310 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Nov 1 00:59:17.655316 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Nov 1 00:59:17.655322 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Nov 1 00:59:17.655328 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Nov 1 00:59:17.655334 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Nov 1 00:59:17.655340 kernel: RETBleed: Mitigation: Enhanced IBRS Nov 1 00:59:17.655346 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Nov 1 00:59:17.655352 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Nov 1 00:59:17.655358 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Nov 1 00:59:17.655364 kernel: SRBDS: Unknown: Dependent on hypervisor status Nov 1 00:59:17.655370 kernel: GDS: Unknown: Dependent on hypervisor status Nov 1 00:59:17.655375 kernel: active return thunk: its_return_thunk Nov 1 00:59:17.655381 kernel: ITS: Mitigation: Aligned branch/return thunks Nov 1 00:59:17.655387 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Nov 1 00:59:17.655394 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Nov 1 00:59:17.655400 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Nov 1 00:59:17.655406 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Nov 1 00:59:17.655412 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Nov 1 00:59:17.655417 kernel: Freeing SMP alternatives memory: 32K Nov 1 00:59:17.655423 kernel: pid_max: default: 131072 minimum: 1024 Nov 1 00:59:17.655429 kernel: LSM: Security Framework initializing Nov 1 00:59:17.655435 kernel: SELinux: Initializing. Nov 1 00:59:17.655441 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Nov 1 00:59:17.655447 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Nov 1 00:59:17.655454 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Nov 1 00:59:17.655460 kernel: Performance Events: Skylake events, core PMU driver. Nov 1 00:59:17.655466 kernel: core: CPUID marked event: 'cpu cycles' unavailable Nov 1 00:59:17.655472 kernel: core: CPUID marked event: 'instructions' unavailable Nov 1 00:59:17.655478 kernel: core: CPUID marked event: 'bus cycles' unavailable Nov 1 00:59:17.655484 kernel: core: CPUID marked event: 'cache references' unavailable Nov 1 00:59:17.655489 kernel: core: CPUID marked event: 'cache misses' unavailable Nov 1 00:59:17.655495 kernel: core: CPUID marked event: 'branch instructions' unavailable Nov 1 00:59:17.655502 kernel: core: CPUID marked event: 'branch misses' unavailable Nov 1 00:59:17.655507 kernel: ... version: 1 Nov 1 00:59:17.655513 kernel: ... bit width: 48 Nov 1 00:59:17.655519 kernel: ... generic registers: 4 Nov 1 00:59:17.655525 kernel: ... value mask: 0000ffffffffffff Nov 1 00:59:17.655530 kernel: ... max period: 000000007fffffff Nov 1 00:59:17.655536 kernel: ... fixed-purpose events: 0 Nov 1 00:59:17.655542 kernel: ... event mask: 000000000000000f Nov 1 00:59:17.655548 kernel: signal: max sigframe size: 1776 Nov 1 00:59:17.655554 kernel: rcu: Hierarchical SRCU implementation. Nov 1 00:59:17.655560 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Nov 1 00:59:17.655566 kernel: smp: Bringing up secondary CPUs ... Nov 1 00:59:17.655572 kernel: x86: Booting SMP configuration: Nov 1 00:59:17.655578 kernel: .... node #0, CPUs: #1 Nov 1 00:59:17.655583 kernel: Disabled fast string operations Nov 1 00:59:17.655589 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Nov 1 00:59:17.655595 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Nov 1 00:59:17.655600 kernel: smp: Brought up 1 node, 2 CPUs Nov 1 00:59:17.655606 kernel: smpboot: Max logical packages: 128 Nov 1 00:59:17.655613 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Nov 1 00:59:17.655619 kernel: devtmpfs: initialized Nov 1 00:59:17.655625 kernel: x86/mm: Memory block size: 128MB Nov 1 00:59:17.655631 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Nov 1 00:59:17.655637 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Nov 1 00:59:17.655643 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Nov 1 00:59:17.655649 kernel: pinctrl core: initialized pinctrl subsystem Nov 1 00:59:17.655654 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Nov 1 00:59:17.655660 kernel: audit: initializing netlink subsys (disabled) Nov 1 00:59:17.655667 kernel: audit: type=2000 audit(1761958756.088:1): state=initialized audit_enabled=0 res=1 Nov 1 00:59:17.655673 kernel: thermal_sys: Registered thermal governor 'step_wise' Nov 1 00:59:17.655678 kernel: thermal_sys: Registered thermal governor 'user_space' Nov 1 00:59:17.655687 kernel: cpuidle: using governor menu Nov 1 00:59:17.655693 kernel: Simple Boot Flag at 0x36 set to 0x80 Nov 1 00:59:17.655699 kernel: ACPI: bus type PCI registered Nov 1 00:59:17.655706 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Nov 1 00:59:17.655716 kernel: dca service started, version 1.12.1 Nov 1 00:59:17.655723 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Nov 1 00:59:17.655731 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Nov 1 00:59:17.655737 kernel: PCI: Using configuration type 1 for base access Nov 1 00:59:17.655743 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Nov 1 00:59:17.655748 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Nov 1 00:59:17.655754 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Nov 1 00:59:17.655760 kernel: ACPI: Added _OSI(Module Device) Nov 1 00:59:17.655766 kernel: ACPI: Added _OSI(Processor Device) Nov 1 00:59:17.655772 kernel: ACPI: Added _OSI(Processor Aggregator Device) Nov 1 00:59:17.655777 kernel: ACPI: Added _OSI(Linux-Dell-Video) Nov 1 00:59:17.655784 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Nov 1 00:59:17.655790 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Nov 1 00:59:17.655796 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Nov 1 00:59:17.655802 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Nov 1 00:59:17.655817 kernel: ACPI: Interpreter enabled Nov 1 00:59:17.655824 kernel: ACPI: PM: (supports S0 S1 S5) Nov 1 00:59:17.655830 kernel: ACPI: Using IOAPIC for interrupt routing Nov 1 00:59:17.655836 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Nov 1 00:59:17.655844 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Nov 1 00:59:17.655851 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Nov 1 00:59:17.655929 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Nov 1 00:59:17.655981 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Nov 1 00:59:17.656027 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Nov 1 00:59:17.656035 kernel: PCI host bridge to bus 0000:00 Nov 1 00:59:17.656084 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Nov 1 00:59:17.656129 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000dbfff window] Nov 1 00:59:17.656171 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Nov 1 00:59:17.656212 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Nov 1 00:59:17.656254 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Nov 1 00:59:17.656294 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Nov 1 00:59:17.656350 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Nov 1 00:59:17.656403 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Nov 1 00:59:17.656458 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Nov 1 00:59:17.656513 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Nov 1 00:59:17.656560 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Nov 1 00:59:17.656607 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Nov 1 00:59:17.656654 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Nov 1 00:59:17.656701 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Nov 1 00:59:17.656751 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Nov 1 00:59:17.656801 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Nov 1 00:59:17.658975 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Nov 1 00:59:17.659029 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Nov 1 00:59:17.659084 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Nov 1 00:59:17.659135 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Nov 1 00:59:17.659186 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Nov 1 00:59:17.659238 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Nov 1 00:59:17.659285 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Nov 1 00:59:17.659333 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Nov 1 00:59:17.659380 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Nov 1 00:59:17.659427 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Nov 1 00:59:17.659473 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Nov 1 00:59:17.659524 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Nov 1 00:59:17.659578 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.659627 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.659678 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.659729 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.659780 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.659844 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.659901 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.668903 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.668974 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.669027 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.669081 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.669131 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.669186 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.669236 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.669288 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.669337 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.669388 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.669436 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.669491 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.669539 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.669591 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.669639 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.669691 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.669751 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.669816 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.669873 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.669926 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.669976 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.670029 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.670079 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.670134 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.670183 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.670235 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.670293 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.670349 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.670397 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.670451 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.670499 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.670552 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.670599 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.670652 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.670700 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.670754 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.670800 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.670859 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.670908 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.670959 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.671008 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.671061 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.671111 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.671162 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.671210 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.671261 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.671309 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.671359 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.671410 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.671462 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.671509 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.671563 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.671610 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.671661 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.671715 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.671767 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Nov 1 00:59:17.671822 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.671875 kernel: pci_bus 0000:01: extended config space not accessible Nov 1 00:59:17.671925 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Nov 1 00:59:17.671976 kernel: pci_bus 0000:02: extended config space not accessible Nov 1 00:59:17.671988 kernel: acpiphp: Slot [32] registered Nov 1 00:59:17.671994 kernel: acpiphp: Slot [33] registered Nov 1 00:59:17.672000 kernel: acpiphp: Slot [34] registered Nov 1 00:59:17.672006 kernel: acpiphp: Slot [35] registered Nov 1 00:59:17.672012 kernel: acpiphp: Slot [36] registered Nov 1 00:59:17.672018 kernel: acpiphp: Slot [37] registered Nov 1 00:59:17.672024 kernel: acpiphp: Slot [38] registered Nov 1 00:59:17.672029 kernel: acpiphp: Slot [39] registered Nov 1 00:59:17.672035 kernel: acpiphp: Slot [40] registered Nov 1 00:59:17.672042 kernel: acpiphp: Slot [41] registered Nov 1 00:59:17.672048 kernel: acpiphp: Slot [42] registered Nov 1 00:59:17.672054 kernel: acpiphp: Slot [43] registered Nov 1 00:59:17.672060 kernel: acpiphp: Slot [44] registered Nov 1 00:59:17.672066 kernel: acpiphp: Slot [45] registered Nov 1 00:59:17.672072 kernel: acpiphp: Slot [46] registered Nov 1 00:59:17.672078 kernel: acpiphp: Slot [47] registered Nov 1 00:59:17.672083 kernel: acpiphp: Slot [48] registered Nov 1 00:59:17.672090 kernel: acpiphp: Slot [49] registered Nov 1 00:59:17.672096 kernel: acpiphp: Slot [50] registered Nov 1 00:59:17.672102 kernel: acpiphp: Slot [51] registered Nov 1 00:59:17.672108 kernel: acpiphp: Slot [52] registered Nov 1 00:59:17.672114 kernel: acpiphp: Slot [53] registered Nov 1 00:59:17.672120 kernel: acpiphp: Slot [54] registered Nov 1 00:59:17.672126 kernel: acpiphp: Slot [55] registered Nov 1 00:59:17.672132 kernel: acpiphp: Slot [56] registered Nov 1 00:59:17.672138 kernel: acpiphp: Slot [57] registered Nov 1 00:59:17.672144 kernel: acpiphp: Slot [58] registered Nov 1 00:59:17.672150 kernel: acpiphp: Slot [59] registered Nov 1 00:59:17.672157 kernel: acpiphp: Slot [60] registered Nov 1 00:59:17.672162 kernel: acpiphp: Slot [61] registered Nov 1 00:59:17.672168 kernel: acpiphp: Slot [62] registered Nov 1 00:59:17.672174 kernel: acpiphp: Slot [63] registered Nov 1 00:59:17.672222 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Nov 1 00:59:17.672270 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Nov 1 00:59:17.672317 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Nov 1 00:59:17.672364 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Nov 1 00:59:17.672411 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Nov 1 00:59:17.672461 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000dbfff window] (subtractive decode) Nov 1 00:59:17.672509 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Nov 1 00:59:17.672556 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Nov 1 00:59:17.672602 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Nov 1 00:59:17.672657 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Nov 1 00:59:17.672712 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Nov 1 00:59:17.672762 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Nov 1 00:59:17.675286 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Nov 1 00:59:17.675343 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Nov 1 00:59:17.675393 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Nov 1 00:59:17.675442 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Nov 1 00:59:17.675490 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Nov 1 00:59:17.675537 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Nov 1 00:59:17.675587 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Nov 1 00:59:17.675637 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Nov 1 00:59:17.675684 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Nov 1 00:59:17.675730 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Nov 1 00:59:17.675779 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Nov 1 00:59:17.675834 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Nov 1 00:59:17.675880 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Nov 1 00:59:17.675927 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Nov 1 00:59:17.675976 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Nov 1 00:59:17.676025 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Nov 1 00:59:17.676071 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Nov 1 00:59:17.676132 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Nov 1 00:59:17.676180 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Nov 1 00:59:17.676228 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Nov 1 00:59:17.676277 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Nov 1 00:59:17.676324 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Nov 1 00:59:17.676370 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Nov 1 00:59:17.676416 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Nov 1 00:59:17.676462 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Nov 1 00:59:17.676509 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Nov 1 00:59:17.676557 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Nov 1 00:59:17.676606 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Nov 1 00:59:17.676652 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Nov 1 00:59:17.679023 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Nov 1 00:59:17.679076 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Nov 1 00:59:17.679126 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Nov 1 00:59:17.679175 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Nov 1 00:59:17.679224 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Nov 1 00:59:17.679272 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Nov 1 00:59:17.679324 kernel: pci 0000:0b:00.0: supports D1 D2 Nov 1 00:59:17.679373 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Nov 1 00:59:17.679422 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Nov 1 00:59:17.679470 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Nov 1 00:59:17.679517 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Nov 1 00:59:17.679565 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Nov 1 00:59:17.679614 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Nov 1 00:59:17.679663 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Nov 1 00:59:17.679710 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Nov 1 00:59:17.679758 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Nov 1 00:59:17.679814 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Nov 1 00:59:17.679865 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Nov 1 00:59:17.679912 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Nov 1 00:59:17.679961 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Nov 1 00:59:17.680011 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Nov 1 00:59:17.680067 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Nov 1 00:59:17.680117 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Nov 1 00:59:17.680177 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Nov 1 00:59:17.680232 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Nov 1 00:59:17.680289 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Nov 1 00:59:17.680346 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Nov 1 00:59:17.680395 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Nov 1 00:59:17.680442 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Nov 1 00:59:17.680494 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Nov 1 00:59:17.680541 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Nov 1 00:59:17.680588 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Nov 1 00:59:17.680637 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Nov 1 00:59:17.680685 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Nov 1 00:59:17.680732 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Nov 1 00:59:17.680781 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Nov 1 00:59:17.680835 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Nov 1 00:59:17.680886 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Nov 1 00:59:17.680933 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Nov 1 00:59:17.680982 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Nov 1 00:59:17.681029 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Nov 1 00:59:17.681076 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Nov 1 00:59:17.681123 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Nov 1 00:59:17.681172 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Nov 1 00:59:17.681222 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Nov 1 00:59:17.681271 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Nov 1 00:59:17.681319 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Nov 1 00:59:17.681368 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Nov 1 00:59:17.681415 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Nov 1 00:59:17.681463 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Nov 1 00:59:17.681512 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Nov 1 00:59:17.681561 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Nov 1 00:59:17.681610 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Nov 1 00:59:17.681659 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Nov 1 00:59:17.681710 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Nov 1 00:59:17.681757 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Nov 1 00:59:17.681805 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Nov 1 00:59:17.681868 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Nov 1 00:59:17.681916 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Nov 1 00:59:17.681964 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Nov 1 00:59:17.682014 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Nov 1 00:59:17.682065 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Nov 1 00:59:17.682114 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Nov 1 00:59:17.682161 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Nov 1 00:59:17.682209 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Nov 1 00:59:17.682256 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Nov 1 00:59:17.682306 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Nov 1 00:59:17.682353 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Nov 1 00:59:17.682402 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Nov 1 00:59:17.682450 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Nov 1 00:59:17.682499 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Nov 1 00:59:17.682546 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Nov 1 00:59:17.682592 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Nov 1 00:59:17.682640 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Nov 1 00:59:17.682693 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Nov 1 00:59:17.682742 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Nov 1 00:59:17.682793 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Nov 1 00:59:17.682847 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Nov 1 00:59:17.682895 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Nov 1 00:59:17.682944 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Nov 1 00:59:17.682991 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Nov 1 00:59:17.683039 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Nov 1 00:59:17.683088 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Nov 1 00:59:17.683136 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Nov 1 00:59:17.683185 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Nov 1 00:59:17.683234 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Nov 1 00:59:17.683284 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Nov 1 00:59:17.683331 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Nov 1 00:59:17.683340 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Nov 1 00:59:17.683346 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Nov 1 00:59:17.683352 kernel: ACPI: PCI: Interrupt link LNKB disabled Nov 1 00:59:17.683358 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Nov 1 00:59:17.683366 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Nov 1 00:59:17.683372 kernel: iommu: Default domain type: Translated Nov 1 00:59:17.683378 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Nov 1 00:59:17.683427 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Nov 1 00:59:17.683475 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Nov 1 00:59:17.683522 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Nov 1 00:59:17.683531 kernel: vgaarb: loaded Nov 1 00:59:17.683537 kernel: pps_core: LinuxPPS API ver. 1 registered Nov 1 00:59:17.683543 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Nov 1 00:59:17.683551 kernel: PTP clock support registered Nov 1 00:59:17.683557 kernel: PCI: Using ACPI for IRQ routing Nov 1 00:59:17.683563 kernel: PCI: pci_cache_line_size set to 64 bytes Nov 1 00:59:17.683569 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Nov 1 00:59:17.683575 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Nov 1 00:59:17.683581 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Nov 1 00:59:17.683587 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Nov 1 00:59:17.683593 kernel: clocksource: Switched to clocksource tsc-early Nov 1 00:59:17.683599 kernel: VFS: Disk quotas dquot_6.6.0 Nov 1 00:59:17.683607 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Nov 1 00:59:17.683613 kernel: pnp: PnP ACPI init Nov 1 00:59:17.683667 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Nov 1 00:59:17.683713 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Nov 1 00:59:17.683756 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Nov 1 00:59:17.683804 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Nov 1 00:59:17.683861 kernel: pnp 00:06: [dma 2] Nov 1 00:59:17.683911 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Nov 1 00:59:17.683956 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Nov 1 00:59:17.683999 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Nov 1 00:59:17.684007 kernel: pnp: PnP ACPI: found 8 devices Nov 1 00:59:17.684014 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Nov 1 00:59:17.684020 kernel: NET: Registered PF_INET protocol family Nov 1 00:59:17.684026 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Nov 1 00:59:17.684032 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Nov 1 00:59:17.684040 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Nov 1 00:59:17.684046 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Nov 1 00:59:17.684052 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Nov 1 00:59:17.684058 kernel: TCP: Hash tables configured (established 16384 bind 16384) Nov 1 00:59:17.684064 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Nov 1 00:59:17.684070 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Nov 1 00:59:17.684076 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Nov 1 00:59:17.684082 kernel: NET: Registered PF_XDP protocol family Nov 1 00:59:17.684132 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Nov 1 00:59:17.684184 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Nov 1 00:59:17.684234 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Nov 1 00:59:17.684284 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Nov 1 00:59:17.684332 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Nov 1 00:59:17.684381 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Nov 1 00:59:17.684432 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Nov 1 00:59:17.684481 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Nov 1 00:59:17.684529 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Nov 1 00:59:17.684577 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Nov 1 00:59:17.684625 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Nov 1 00:59:17.684673 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Nov 1 00:59:17.684723 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Nov 1 00:59:17.684771 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Nov 1 00:59:17.693860 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Nov 1 00:59:17.693935 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Nov 1 00:59:17.693990 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Nov 1 00:59:17.694043 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Nov 1 00:59:17.694126 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Nov 1 00:59:17.694215 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Nov 1 00:59:17.694267 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Nov 1 00:59:17.694317 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Nov 1 00:59:17.694366 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Nov 1 00:59:17.694416 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Nov 1 00:59:17.694469 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Nov 1 00:59:17.694519 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.694567 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.694616 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.694663 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.694714 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.694762 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.694819 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.694871 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.694919 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.694967 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.695015 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.695083 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.695148 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.695245 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.695300 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.695364 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.695415 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.695471 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.695532 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.695585 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.695641 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.695701 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.695752 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.695804 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.695866 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.695915 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.695962 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.696009 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.696057 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.696104 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.696152 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.696202 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.696251 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.696299 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.696346 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.696393 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.696441 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.696488 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.696537 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.696587 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.696635 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.696682 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.696729 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.696777 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.696851 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.696902 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.696949 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.696997 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.697048 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.697096 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.697143 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.697190 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.697237 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.697284 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.697332 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.697380 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.697427 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.697477 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.697524 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.697571 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.697619 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.697666 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.697713 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.697761 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.697821 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.697872 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.697919 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.697969 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.698017 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.698064 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.698111 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.698159 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.698207 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.698253 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.698301 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.698348 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.698399 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.698447 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.698495 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.698543 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.698591 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.698638 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.698691 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Nov 1 00:59:17.698741 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Nov 1 00:59:17.698789 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Nov 1 00:59:17.699053 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Nov 1 00:59:17.699111 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Nov 1 00:59:17.699161 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Nov 1 00:59:17.699209 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Nov 1 00:59:17.699261 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Nov 1 00:59:17.699311 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Nov 1 00:59:17.699359 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Nov 1 00:59:17.699407 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Nov 1 00:59:17.699456 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Nov 1 00:59:17.699509 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Nov 1 00:59:17.699558 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Nov 1 00:59:17.699606 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Nov 1 00:59:17.699653 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Nov 1 00:59:17.699702 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Nov 1 00:59:17.699749 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Nov 1 00:59:17.699797 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Nov 1 00:59:17.700119 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Nov 1 00:59:17.700175 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Nov 1 00:59:17.700229 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Nov 1 00:59:17.700283 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Nov 1 00:59:17.700332 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Nov 1 00:59:17.700381 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Nov 1 00:59:17.700429 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Nov 1 00:59:17.700480 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Nov 1 00:59:17.700531 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Nov 1 00:59:17.700580 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Nov 1 00:59:17.700628 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Nov 1 00:59:17.700676 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Nov 1 00:59:17.700723 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Nov 1 00:59:17.700771 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Nov 1 00:59:17.701150 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Nov 1 00:59:17.701217 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Nov 1 00:59:17.701275 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Nov 1 00:59:17.701331 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Nov 1 00:59:17.701379 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Nov 1 00:59:17.701427 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Nov 1 00:59:17.701475 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Nov 1 00:59:17.701525 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Nov 1 00:59:17.701572 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Nov 1 00:59:17.701619 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Nov 1 00:59:17.701670 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Nov 1 00:59:17.701724 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Nov 1 00:59:17.701775 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Nov 1 00:59:17.702138 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Nov 1 00:59:17.702204 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Nov 1 00:59:17.702264 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Nov 1 00:59:17.702317 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Nov 1 00:59:17.702383 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Nov 1 00:59:17.702437 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Nov 1 00:59:17.702486 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Nov 1 00:59:17.702534 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Nov 1 00:59:17.702583 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Nov 1 00:59:17.702637 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Nov 1 00:59:17.702692 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Nov 1 00:59:17.702741 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Nov 1 00:59:17.702794 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Nov 1 00:59:17.703210 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Nov 1 00:59:17.703265 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Nov 1 00:59:17.703316 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Nov 1 00:59:17.703487 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Nov 1 00:59:17.703544 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Nov 1 00:59:17.703596 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Nov 1 00:59:17.703645 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Nov 1 00:59:17.703711 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Nov 1 00:59:17.703775 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Nov 1 00:59:17.703986 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Nov 1 00:59:17.704041 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Nov 1 00:59:17.704096 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Nov 1 00:59:17.704149 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Nov 1 00:59:17.704198 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Nov 1 00:59:17.704245 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Nov 1 00:59:17.704301 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Nov 1 00:59:17.704355 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Nov 1 00:59:17.704409 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Nov 1 00:59:17.704457 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Nov 1 00:59:17.704510 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Nov 1 00:59:17.704562 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Nov 1 00:59:17.704625 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Nov 1 00:59:17.704675 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Nov 1 00:59:17.704724 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Nov 1 00:59:17.704774 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Nov 1 00:59:17.705147 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Nov 1 00:59:17.705213 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Nov 1 00:59:17.705265 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Nov 1 00:59:17.705320 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Nov 1 00:59:17.705370 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Nov 1 00:59:17.705424 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Nov 1 00:59:17.705474 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Nov 1 00:59:17.705521 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Nov 1 00:59:17.705569 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Nov 1 00:59:17.705620 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Nov 1 00:59:17.705670 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Nov 1 00:59:17.705733 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Nov 1 00:59:17.705783 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Nov 1 00:59:17.705852 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Nov 1 00:59:17.705903 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Nov 1 00:59:17.705951 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Nov 1 00:59:17.705999 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Nov 1 00:59:17.706353 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Nov 1 00:59:17.706418 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Nov 1 00:59:17.706470 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Nov 1 00:59:17.706911 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Nov 1 00:59:17.706969 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Nov 1 00:59:17.707020 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Nov 1 00:59:17.707070 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Nov 1 00:59:17.707124 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Nov 1 00:59:17.707173 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Nov 1 00:59:17.707222 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Nov 1 00:59:17.707270 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Nov 1 00:59:17.707320 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Nov 1 00:59:17.707369 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Nov 1 00:59:17.707417 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Nov 1 00:59:17.707464 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Nov 1 00:59:17.707511 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Nov 1 00:59:17.707555 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000dbfff window] Nov 1 00:59:17.707597 kernel: pci_bus 0000:00: resource 6 [mem 0xc0000000-0xfebfffff window] Nov 1 00:59:17.707639 kernel: pci_bus 0000:00: resource 7 [io 0x0000-0x0cf7 window] Nov 1 00:59:17.707680 kernel: pci_bus 0000:00: resource 8 [io 0x0d00-0xfeff window] Nov 1 00:59:17.707736 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Nov 1 00:59:17.707781 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Nov 1 00:59:17.708148 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Nov 1 00:59:17.708201 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Nov 1 00:59:17.708247 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000dbfff window] Nov 1 00:59:17.708292 kernel: pci_bus 0000:02: resource 6 [mem 0xc0000000-0xfebfffff window] Nov 1 00:59:17.708343 kernel: pci_bus 0000:02: resource 7 [io 0x0000-0x0cf7 window] Nov 1 00:59:17.708537 kernel: pci_bus 0000:02: resource 8 [io 0x0d00-0xfeff window] Nov 1 00:59:17.708593 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Nov 1 00:59:17.708641 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Nov 1 00:59:17.708691 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Nov 1 00:59:17.709083 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Nov 1 00:59:17.709135 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Nov 1 00:59:17.709181 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Nov 1 00:59:17.709244 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Nov 1 00:59:17.709299 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Nov 1 00:59:17.709349 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Nov 1 00:59:17.709410 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Nov 1 00:59:17.709456 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Nov 1 00:59:17.709506 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Nov 1 00:59:17.709554 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Nov 1 00:59:17.709610 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Nov 1 00:59:17.709658 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Nov 1 00:59:17.709708 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Nov 1 00:59:17.709753 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Nov 1 00:59:17.709801 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Nov 1 00:59:17.709870 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Nov 1 00:59:17.709921 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Nov 1 00:59:17.709966 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Nov 1 00:59:17.710010 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Nov 1 00:59:17.710059 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Nov 1 00:59:17.710104 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Nov 1 00:59:17.710158 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Nov 1 00:59:17.710207 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Nov 1 00:59:17.710258 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Nov 1 00:59:17.710303 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Nov 1 00:59:17.710352 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Nov 1 00:59:17.710397 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Nov 1 00:59:17.710448 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Nov 1 00:59:17.710504 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Nov 1 00:59:17.710554 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Nov 1 00:59:17.710599 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Nov 1 00:59:17.710648 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Nov 1 00:59:17.710693 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Nov 1 00:59:17.710742 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Nov 1 00:59:17.710788 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Nov 1 00:59:17.710891 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Nov 1 00:59:17.710938 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Nov 1 00:59:17.710983 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Nov 1 00:59:17.711031 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Nov 1 00:59:17.711076 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Nov 1 00:59:17.711120 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Nov 1 00:59:17.711172 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Nov 1 00:59:17.711217 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Nov 1 00:59:17.711261 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Nov 1 00:59:17.711312 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Nov 1 00:59:17.711359 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Nov 1 00:59:17.711410 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Nov 1 00:59:17.711461 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Nov 1 00:59:17.711515 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Nov 1 00:59:17.711560 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Nov 1 00:59:17.711609 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Nov 1 00:59:17.711658 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Nov 1 00:59:17.711726 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Nov 1 00:59:17.711776 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Nov 1 00:59:17.711837 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Nov 1 00:59:17.711882 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Nov 1 00:59:17.711927 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Nov 1 00:59:17.711975 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Nov 1 00:59:17.712021 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Nov 1 00:59:17.712068 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Nov 1 00:59:17.712122 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Nov 1 00:59:17.712167 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Nov 1 00:59:17.712218 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Nov 1 00:59:17.712263 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Nov 1 00:59:17.712313 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Nov 1 00:59:17.712358 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Nov 1 00:59:17.712409 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Nov 1 00:59:17.712457 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Nov 1 00:59:17.712508 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Nov 1 00:59:17.712553 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Nov 1 00:59:17.712602 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Nov 1 00:59:17.712647 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Nov 1 00:59:17.712716 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Nov 1 00:59:17.712726 kernel: PCI: CLS 32 bytes, default 64 Nov 1 00:59:17.712734 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Nov 1 00:59:17.712740 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Nov 1 00:59:17.712747 kernel: clocksource: Switched to clocksource tsc Nov 1 00:59:17.712753 kernel: Initialise system trusted keyrings Nov 1 00:59:17.712760 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Nov 1 00:59:17.712768 kernel: Key type asymmetric registered Nov 1 00:59:17.712780 kernel: Asymmetric key parser 'x509' registered Nov 1 00:59:17.712787 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Nov 1 00:59:17.712794 kernel: io scheduler mq-deadline registered Nov 1 00:59:17.712801 kernel: io scheduler kyber registered Nov 1 00:59:17.712815 kernel: io scheduler bfq registered Nov 1 00:59:17.712872 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Nov 1 00:59:17.712922 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.712973 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Nov 1 00:59:17.713023 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.713075 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Nov 1 00:59:17.713124 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.713172 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Nov 1 00:59:17.713221 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.713270 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Nov 1 00:59:17.713323 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.713376 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Nov 1 00:59:17.713426 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.713476 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Nov 1 00:59:17.713854 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.713912 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Nov 1 00:59:17.713973 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.714316 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Nov 1 00:59:17.714386 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.714901 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Nov 1 00:59:17.714965 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.715018 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Nov 1 00:59:17.715400 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.715460 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Nov 1 00:59:17.715516 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.715859 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Nov 1 00:59:17.715917 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.716006 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Nov 1 00:59:17.716075 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.716162 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Nov 1 00:59:17.716213 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.716265 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Nov 1 00:59:17.716313 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.716379 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Nov 1 00:59:17.716454 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.716505 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Nov 1 00:59:17.716553 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.716604 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Nov 1 00:59:17.716656 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.716708 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Nov 1 00:59:17.716757 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.716902 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Nov 1 00:59:17.716963 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.717014 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Nov 1 00:59:17.717065 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.717143 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Nov 1 00:59:17.717307 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.717361 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Nov 1 00:59:17.717412 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.717737 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Nov 1 00:59:17.717796 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.717869 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Nov 1 00:59:17.717944 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.718114 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Nov 1 00:59:17.718169 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.718221 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Nov 1 00:59:17.718545 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.718609 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Nov 1 00:59:17.718663 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.718726 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Nov 1 00:59:17.718779 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.718856 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Nov 1 00:59:17.718907 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.718961 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Nov 1 00:59:17.719011 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Nov 1 00:59:17.719020 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Nov 1 00:59:17.719027 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Nov 1 00:59:17.719034 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Nov 1 00:59:17.719040 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Nov 1 00:59:17.719047 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Nov 1 00:59:17.719055 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Nov 1 00:59:17.719105 kernel: rtc_cmos 00:01: registered as rtc0 Nov 1 00:59:17.719151 kernel: rtc_cmos 00:01: setting system clock to 2025-11-01T00:59:17 UTC (1761958757) Nov 1 00:59:17.719196 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Nov 1 00:59:17.719205 kernel: intel_pstate: CPU model not supported Nov 1 00:59:17.719212 kernel: NET: Registered PF_INET6 protocol family Nov 1 00:59:17.719218 kernel: Segment Routing with IPv6 Nov 1 00:59:17.719225 kernel: In-situ OAM (IOAM) with IPv6 Nov 1 00:59:17.719233 kernel: NET: Registered PF_PACKET protocol family Nov 1 00:59:17.719239 kernel: Key type dns_resolver registered Nov 1 00:59:17.719245 kernel: IPI shorthand broadcast: enabled Nov 1 00:59:17.719252 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Nov 1 00:59:17.719258 kernel: sched_clock: Marking stable (869432605, 222373587)->(1154207440, -62401248) Nov 1 00:59:17.719265 kernel: registered taskstats version 1 Nov 1 00:59:17.719271 kernel: Loading compiled-in X.509 certificates Nov 1 00:59:17.719278 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: f2055682e6899ad8548fd369019e7b47939b46a0' Nov 1 00:59:17.719284 kernel: Key type .fscrypt registered Nov 1 00:59:17.719292 kernel: Key type fscrypt-provisioning registered Nov 1 00:59:17.719298 kernel: ima: No TPM chip found, activating TPM-bypass! Nov 1 00:59:17.719304 kernel: ima: Allocated hash algorithm: sha1 Nov 1 00:59:17.719310 kernel: ima: No architecture policies found Nov 1 00:59:17.719317 kernel: clk: Disabling unused clocks Nov 1 00:59:17.719323 kernel: Freeing unused kernel image (initmem) memory: 47496K Nov 1 00:59:17.719329 kernel: Write protecting the kernel read-only data: 28672k Nov 1 00:59:17.719336 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Nov 1 00:59:17.719342 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Nov 1 00:59:17.719350 kernel: Run /init as init process Nov 1 00:59:17.719356 kernel: with arguments: Nov 1 00:59:17.719362 kernel: /init Nov 1 00:59:17.719368 kernel: with environment: Nov 1 00:59:17.719375 kernel: HOME=/ Nov 1 00:59:17.719381 kernel: TERM=linux Nov 1 00:59:17.719387 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Nov 1 00:59:17.719395 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 1 00:59:17.719404 systemd[1]: Detected virtualization vmware. Nov 1 00:59:17.719412 systemd[1]: Detected architecture x86-64. Nov 1 00:59:17.719419 systemd[1]: Running in initrd. Nov 1 00:59:17.719425 systemd[1]: No hostname configured, using default hostname. Nov 1 00:59:17.719431 systemd[1]: Hostname set to . Nov 1 00:59:17.719438 systemd[1]: Initializing machine ID from random generator. Nov 1 00:59:17.719445 systemd[1]: Queued start job for default target initrd.target. Nov 1 00:59:17.719451 systemd[1]: Started systemd-ask-password-console.path. Nov 1 00:59:17.719459 systemd[1]: Reached target cryptsetup.target. Nov 1 00:59:17.719465 systemd[1]: Reached target paths.target. Nov 1 00:59:17.719471 systemd[1]: Reached target slices.target. Nov 1 00:59:17.719478 systemd[1]: Reached target swap.target. Nov 1 00:59:17.719484 systemd[1]: Reached target timers.target. Nov 1 00:59:17.719491 systemd[1]: Listening on iscsid.socket. Nov 1 00:59:17.719498 systemd[1]: Listening on iscsiuio.socket. Nov 1 00:59:17.719505 systemd[1]: Listening on systemd-journald-audit.socket. Nov 1 00:59:17.719512 systemd[1]: Listening on systemd-journald-dev-log.socket. Nov 1 00:59:17.719518 systemd[1]: Listening on systemd-journald.socket. Nov 1 00:59:17.719525 systemd[1]: Listening on systemd-networkd.socket. Nov 1 00:59:17.719531 systemd[1]: Listening on systemd-udevd-control.socket. Nov 1 00:59:17.719538 systemd[1]: Listening on systemd-udevd-kernel.socket. Nov 1 00:59:17.719545 systemd[1]: Reached target sockets.target. Nov 1 00:59:17.719551 systemd[1]: Starting kmod-static-nodes.service... Nov 1 00:59:17.719557 systemd[1]: Finished network-cleanup.service. Nov 1 00:59:17.719565 systemd[1]: Starting systemd-fsck-usr.service... Nov 1 00:59:17.719572 systemd[1]: Starting systemd-journald.service... Nov 1 00:59:17.719578 systemd[1]: Starting systemd-modules-load.service... Nov 1 00:59:17.719584 systemd[1]: Starting systemd-resolved.service... Nov 1 00:59:17.719591 systemd[1]: Starting systemd-vconsole-setup.service... Nov 1 00:59:17.719597 systemd[1]: Finished kmod-static-nodes.service. Nov 1 00:59:17.719604 systemd[1]: Finished systemd-fsck-usr.service. Nov 1 00:59:17.719610 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Nov 1 00:59:17.719617 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Nov 1 00:59:17.719624 kernel: audit: type=1130 audit(1761958757.659:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:17.719631 systemd[1]: Finished systemd-vconsole-setup.service. Nov 1 00:59:17.719638 systemd[1]: Starting dracut-cmdline-ask.service... Nov 1 00:59:17.719645 kernel: audit: type=1130 audit(1761958757.667:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:17.719651 systemd[1]: Started systemd-resolved.service. Nov 1 00:59:17.719658 kernel: audit: type=1130 audit(1761958757.674:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:17.719664 systemd[1]: Reached target nss-lookup.target. Nov 1 00:59:17.719671 systemd[1]: Finished dracut-cmdline-ask.service. Nov 1 00:59:17.719679 kernel: audit: type=1130 audit(1761958757.685:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:17.719689 systemd[1]: Starting dracut-cmdline.service... Nov 1 00:59:17.719696 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Nov 1 00:59:17.719703 kernel: Bridge firewalling registered Nov 1 00:59:17.719710 kernel: SCSI subsystem initialized Nov 1 00:59:17.719720 systemd-journald[217]: Journal started Nov 1 00:59:17.719752 systemd-journald[217]: Runtime Journal (/run/log/journal/f0c95613ef26452aab2f3d891a028d26) is 4.8M, max 38.8M, 34.0M free. Nov 1 00:59:17.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:17.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:17.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:17.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:17.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:17.720850 systemd[1]: Started systemd-journald.service. Nov 1 00:59:17.720861 kernel: audit: type=1130 audit(1761958757.718:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:17.649914 systemd-modules-load[218]: Inserted module 'overlay' Nov 1 00:59:17.673577 systemd-resolved[219]: Positive Trust Anchors: Nov 1 00:59:17.673582 systemd-resolved[219]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Nov 1 00:59:17.673602 systemd-resolved[219]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Nov 1 00:59:17.675352 systemd-resolved[219]: Defaulting to hostname 'linux'. Nov 1 00:59:17.701065 systemd-modules-load[218]: Inserted module 'br_netfilter' Nov 1 00:59:17.724541 dracut-cmdline[232]: dracut-dracut-053 Nov 1 00:59:17.724541 dracut-cmdline[232]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Nov 1 00:59:17.724541 dracut-cmdline[232]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 Nov 1 00:59:17.728085 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Nov 1 00:59:17.728106 kernel: device-mapper: uevent: version 1.0.3 Nov 1 00:59:17.729430 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Nov 1 00:59:17.734133 systemd-modules-load[218]: Inserted module 'dm_multipath' Nov 1 00:59:17.734531 systemd[1]: Finished systemd-modules-load.service. Nov 1 00:59:17.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:17.735055 systemd[1]: Starting systemd-sysctl.service... Nov 1 00:59:17.738018 kernel: audit: type=1130 audit(1761958757.732:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:17.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:17.741239 systemd[1]: Finished systemd-sysctl.service. Nov 1 00:59:17.743830 kernel: audit: type=1130 audit(1761958757.739:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:17.763827 kernel: Loading iSCSI transport class v2.0-870. Nov 1 00:59:17.775822 kernel: iscsi: registered transport (tcp) Nov 1 00:59:17.792047 kernel: iscsi: registered transport (qla4xxx) Nov 1 00:59:17.792070 kernel: QLogic iSCSI HBA Driver Nov 1 00:59:17.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:17.808586 systemd[1]: Finished dracut-cmdline.service. Nov 1 00:59:17.811995 kernel: audit: type=1130 audit(1761958757.806:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:17.809195 systemd[1]: Starting dracut-pre-udev.service... Nov 1 00:59:17.847832 kernel: raid6: avx2x4 gen() 48295 MB/s Nov 1 00:59:17.863840 kernel: raid6: avx2x4 xor() 20087 MB/s Nov 1 00:59:17.880834 kernel: raid6: avx2x2 gen() 51827 MB/s Nov 1 00:59:17.897832 kernel: raid6: avx2x2 xor() 29950 MB/s Nov 1 00:59:17.914834 kernel: raid6: avx2x1 gen() 40822 MB/s Nov 1 00:59:17.931824 kernel: raid6: avx2x1 xor() 27459 MB/s Nov 1 00:59:17.948827 kernel: raid6: sse2x4 gen() 21114 MB/s Nov 1 00:59:17.965820 kernel: raid6: sse2x4 xor() 11849 MB/s Nov 1 00:59:17.982820 kernel: raid6: sse2x2 gen() 21445 MB/s Nov 1 00:59:17.999827 kernel: raid6: sse2x2 xor() 13255 MB/s Nov 1 00:59:18.016825 kernel: raid6: sse2x1 gen() 18114 MB/s Nov 1 00:59:18.034004 kernel: raid6: sse2x1 xor() 8879 MB/s Nov 1 00:59:18.034024 kernel: raid6: using algorithm avx2x2 gen() 51827 MB/s Nov 1 00:59:18.034040 kernel: raid6: .... xor() 29950 MB/s, rmw enabled Nov 1 00:59:18.035186 kernel: raid6: using avx2x2 recovery algorithm Nov 1 00:59:18.043823 kernel: xor: automatically using best checksumming function avx Nov 1 00:59:18.105853 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Nov 1 00:59:18.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:18.110718 systemd[1]: Finished dracut-pre-udev.service. Nov 1 00:59:18.109000 audit: BPF prog-id=7 op=LOAD Nov 1 00:59:18.109000 audit: BPF prog-id=8 op=LOAD Nov 1 00:59:18.111413 systemd[1]: Starting systemd-udevd.service... Nov 1 00:59:18.114833 kernel: audit: type=1130 audit(1761958758.109:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:18.122222 systemd-udevd[415]: Using default interface naming scheme 'v252'. Nov 1 00:59:18.125062 systemd[1]: Started systemd-udevd.service. Nov 1 00:59:18.125669 systemd[1]: Starting dracut-pre-trigger.service... Nov 1 00:59:18.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:18.134187 dracut-pre-trigger[421]: rd.md=0: removing MD RAID activation Nov 1 00:59:18.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:18.151564 systemd[1]: Finished dracut-pre-trigger.service. Nov 1 00:59:18.152157 systemd[1]: Starting systemd-udev-trigger.service... Nov 1 00:59:18.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:18.217266 systemd[1]: Finished systemd-udev-trigger.service. Nov 1 00:59:18.270898 kernel: VMware PVSCSI driver - version 1.0.7.0-k Nov 1 00:59:18.270930 kernel: vmw_pvscsi: using 64bit dma Nov 1 00:59:18.278819 kernel: vmw_pvscsi: max_id: 16 Nov 1 00:59:18.278843 kernel: vmw_pvscsi: setting ring_pages to 8 Nov 1 00:59:18.285820 kernel: libata version 3.00 loaded. Nov 1 00:59:18.289827 kernel: ata_piix 0000:00:07.1: version 2.13 Nov 1 00:59:18.295396 kernel: scsi host1: ata_piix Nov 1 00:59:18.295474 kernel: vmw_pvscsi: enabling reqCallThreshold Nov 1 00:59:18.295483 kernel: vmw_pvscsi: driver-based request coalescing enabled Nov 1 00:59:18.295490 kernel: vmw_pvscsi: using MSI-X Nov 1 00:59:18.295497 kernel: scsi host2: ata_piix Nov 1 00:59:18.295557 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Nov 1 00:59:18.295566 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Nov 1 00:59:18.295573 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Nov 1 00:59:18.300821 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Nov 1 00:59:18.304819 kernel: cryptd: max_cpu_qlen set to 1000 Nov 1 00:59:18.304836 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Nov 1 00:59:18.311430 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Nov 1 00:59:18.311501 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Nov 1 00:59:18.311519 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Nov 1 00:59:18.465830 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Nov 1 00:59:18.469830 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Nov 1 00:59:18.483819 kernel: AVX2 version of gcm_enc/dec engaged. Nov 1 00:59:18.485941 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Nov 1 00:59:18.486026 kernel: AES CTR mode by8 optimization enabled Nov 1 00:59:18.495569 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Nov 1 00:59:18.520421 kernel: sd 0:0:0:0: [sda] Write Protect is off Nov 1 00:59:18.520517 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Nov 1 00:59:18.520586 kernel: sd 0:0:0:0: [sda] Cache data unavailable Nov 1 00:59:18.520655 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Nov 1 00:59:18.520723 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Nov 1 00:59:18.524485 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Nov 1 00:59:18.524496 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Nov 1 00:59:18.524504 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Nov 1 00:59:18.524577 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Nov 1 00:59:18.554982 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Nov 1 00:59:18.556821 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (468) Nov 1 00:59:18.564480 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Nov 1 00:59:18.566305 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Nov 1 00:59:18.566583 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Nov 1 00:59:18.569108 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Nov 1 00:59:18.569869 systemd[1]: Starting disk-uuid.service... Nov 1 00:59:18.700839 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Nov 1 00:59:18.709829 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Nov 1 00:59:19.822004 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Nov 1 00:59:19.822051 disk-uuid[549]: The operation has completed successfully. Nov 1 00:59:20.216106 systemd[1]: disk-uuid.service: Deactivated successfully. Nov 1 00:59:20.216162 systemd[1]: Finished disk-uuid.service. Nov 1 00:59:20.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:20.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:20.216760 systemd[1]: Starting verity-setup.service... Nov 1 00:59:20.242830 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Nov 1 00:59:20.869219 systemd[1]: Found device dev-mapper-usr.device. Nov 1 00:59:20.870413 systemd[1]: Mounting sysusr-usr.mount... Nov 1 00:59:20.872402 systemd[1]: Finished verity-setup.service. Nov 1 00:59:20.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.180859 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Nov 1 00:59:21.180765 systemd[1]: Mounted sysusr-usr.mount. Nov 1 00:59:21.181553 systemd[1]: Starting afterburn-network-kargs.service... Nov 1 00:59:21.182183 systemd[1]: Starting ignition-setup.service... Nov 1 00:59:21.303032 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Nov 1 00:59:21.303074 kernel: BTRFS info (device sda6): using free space tree Nov 1 00:59:21.303084 kernel: BTRFS info (device sda6): has skinny extents Nov 1 00:59:21.356823 kernel: BTRFS info (device sda6): enabling ssd optimizations Nov 1 00:59:21.387803 systemd[1]: mnt-oem.mount: Deactivated successfully. Nov 1 00:59:21.520930 systemd[1]: Finished ignition-setup.service. Nov 1 00:59:21.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.521690 systemd[1]: Starting ignition-fetch-offline.service... Nov 1 00:59:21.770544 systemd[1]: Finished afterburn-network-kargs.service. Nov 1 00:59:21.775558 kernel: kauditd_printk_skb: 9 callbacks suppressed Nov 1 00:59:21.775593 kernel: audit: type=1130 audit(1761958761.769:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.771661 systemd[1]: Starting parse-ip-for-networkd.service... Nov 1 00:59:21.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.823150 systemd[1]: Finished parse-ip-for-networkd.service. Nov 1 00:59:21.826992 kernel: audit: type=1130 audit(1761958761.821:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.827011 kernel: audit: type=1334 audit(1761958761.824:22): prog-id=9 op=LOAD Nov 1 00:59:21.824000 audit: BPF prog-id=9 op=LOAD Nov 1 00:59:21.826253 systemd[1]: Starting systemd-networkd.service... Nov 1 00:59:21.841390 systemd-networkd[735]: lo: Link UP Nov 1 00:59:21.841398 systemd-networkd[735]: lo: Gained carrier Nov 1 00:59:21.841924 systemd-networkd[735]: Enumeration completed Nov 1 00:59:21.842145 systemd[1]: Started systemd-networkd.service. Nov 1 00:59:21.847715 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Nov 1 00:59:21.847831 kernel: audit: type=1130 audit(1761958761.840:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.847843 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Nov 1 00:59:21.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.842275 systemd-networkd[735]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Nov 1 00:59:21.842312 systemd[1]: Reached target network.target. Nov 1 00:59:21.843027 systemd[1]: Starting iscsiuio.service... Nov 1 00:59:21.849196 systemd-networkd[735]: ens192: Link UP Nov 1 00:59:21.849200 systemd-networkd[735]: ens192: Gained carrier Nov 1 00:59:21.850448 systemd[1]: Started iscsiuio.service. Nov 1 00:59:21.853834 kernel: audit: type=1130 audit(1761958761.848:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.851064 systemd[1]: Starting iscsid.service... Nov 1 00:59:21.853903 systemd[1]: Started iscsid.service. Nov 1 00:59:21.854192 iscsid[740]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Nov 1 00:59:21.854192 iscsid[740]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Nov 1 00:59:21.854192 iscsid[740]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Nov 1 00:59:21.854192 iscsid[740]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Nov 1 00:59:21.854192 iscsid[740]: If using hardware iscsi like qla4xxx this message can be ignored. Nov 1 00:59:21.854192 iscsid[740]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Nov 1 00:59:21.854192 iscsid[740]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Nov 1 00:59:21.854417 systemd[1]: Starting dracut-initqueue.service... Nov 1 00:59:21.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.859030 kernel: audit: type=1130 audit(1761958761.852:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.861541 systemd[1]: Finished dracut-initqueue.service. Nov 1 00:59:21.864473 kernel: audit: type=1130 audit(1761958761.859:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.861699 systemd[1]: Reached target remote-fs-pre.target. Nov 1 00:59:21.864531 systemd[1]: Reached target remote-cryptsetup.target. Nov 1 00:59:21.864714 systemd[1]: Reached target remote-fs.target. Nov 1 00:59:21.865279 systemd[1]: Starting dracut-pre-mount.service... Nov 1 00:59:21.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.870367 systemd[1]: Finished dracut-pre-mount.service. Nov 1 00:59:21.872922 kernel: audit: type=1130 audit(1761958761.868:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.935837 ignition[606]: Ignition 2.14.0 Nov 1 00:59:21.935845 ignition[606]: Stage: fetch-offline Nov 1 00:59:21.935886 ignition[606]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:59:21.935907 ignition[606]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Nov 1 00:59:21.943209 ignition[606]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Nov 1 00:59:21.943298 ignition[606]: parsed url from cmdline: "" Nov 1 00:59:21.943303 ignition[606]: no config URL provided Nov 1 00:59:21.943306 ignition[606]: reading system config file "/usr/lib/ignition/user.ign" Nov 1 00:59:21.943311 ignition[606]: no config at "/usr/lib/ignition/user.ign" Nov 1 00:59:21.943674 ignition[606]: config successfully fetched Nov 1 00:59:21.943684 ignition[606]: parsing config with SHA512: 7ad9e0460c549f39cc76efb0ec4c35c617ae9745627c2553c3cc997ae03541611b15565fb5896ff87f9f013661e92dc06dd7e863d6e89b9009efe688532fbcf1 Nov 1 00:59:21.946792 unknown[606]: fetched base config from "system" Nov 1 00:59:21.946834 unknown[606]: fetched user config from "vmware" Nov 1 00:59:21.947600 ignition[606]: fetch-offline: fetch-offline passed Nov 1 00:59:21.947689 ignition[606]: Ignition finished successfully Nov 1 00:59:21.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.948527 systemd[1]: Finished ignition-fetch-offline.service. Nov 1 00:59:21.952157 kernel: audit: type=1130 audit(1761958761.946:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.948680 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Nov 1 00:59:21.949213 systemd[1]: Starting ignition-kargs.service... Nov 1 00:59:21.957073 ignition[754]: Ignition 2.14.0 Nov 1 00:59:21.957420 ignition[754]: Stage: kargs Nov 1 00:59:21.957648 ignition[754]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:59:21.957819 ignition[754]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Nov 1 00:59:21.959397 ignition[754]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Nov 1 00:59:21.961145 ignition[754]: kargs: kargs passed Nov 1 00:59:21.961193 ignition[754]: Ignition finished successfully Nov 1 00:59:21.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.962409 systemd[1]: Finished ignition-kargs.service. Nov 1 00:59:21.963208 systemd[1]: Starting ignition-disks.service... Nov 1 00:59:21.965859 kernel: audit: type=1130 audit(1761958761.960:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.968852 ignition[760]: Ignition 2.14.0 Nov 1 00:59:21.969090 ignition[760]: Stage: disks Nov 1 00:59:21.969268 ignition[760]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:59:21.969425 ignition[760]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Nov 1 00:59:21.970731 ignition[760]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Nov 1 00:59:21.972147 ignition[760]: disks: disks passed Nov 1 00:59:21.972191 ignition[760]: Ignition finished successfully Nov 1 00:59:21.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.972874 systemd[1]: Finished ignition-disks.service. Nov 1 00:59:21.973040 systemd[1]: Reached target initrd-root-device.target. Nov 1 00:59:21.973136 systemd[1]: Reached target local-fs-pre.target. Nov 1 00:59:21.973222 systemd[1]: Reached target local-fs.target. Nov 1 00:59:21.973303 systemd[1]: Reached target sysinit.target. Nov 1 00:59:21.973383 systemd[1]: Reached target basic.target. Nov 1 00:59:21.973977 systemd[1]: Starting systemd-fsck-root.service... Nov 1 00:59:21.988989 systemd-fsck[768]: ROOT: clean, 637/1628000 files, 124069/1617920 blocks Nov 1 00:59:21.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:21.990420 systemd[1]: Finished systemd-fsck-root.service. Nov 1 00:59:21.990971 systemd[1]: Mounting sysroot.mount... Nov 1 00:59:22.054865 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Nov 1 00:59:22.054447 systemd[1]: Mounted sysroot.mount. Nov 1 00:59:22.054654 systemd[1]: Reached target initrd-root-fs.target. Nov 1 00:59:22.057166 systemd[1]: Mounting sysroot-usr.mount... Nov 1 00:59:22.057926 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Nov 1 00:59:22.058211 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Nov 1 00:59:22.058236 systemd[1]: Reached target ignition-diskful.target. Nov 1 00:59:22.059978 systemd[1]: Mounted sysroot-usr.mount. Nov 1 00:59:22.060956 systemd[1]: Starting initrd-setup-root.service... Nov 1 00:59:22.066335 initrd-setup-root[778]: cut: /sysroot/etc/passwd: No such file or directory Nov 1 00:59:22.072719 initrd-setup-root[786]: cut: /sysroot/etc/group: No such file or directory Nov 1 00:59:22.075980 initrd-setup-root[794]: cut: /sysroot/etc/shadow: No such file or directory Nov 1 00:59:22.078592 initrd-setup-root[802]: cut: /sysroot/etc/gshadow: No such file or directory Nov 1 00:59:22.124472 systemd[1]: Mounting sysroot-usr-share-oem.mount... Nov 1 00:59:22.137195 systemd[1]: Finished initrd-setup-root.service. Nov 1 00:59:22.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:22.137780 systemd[1]: Starting ignition-mount.service... Nov 1 00:59:22.138224 systemd[1]: Starting sysroot-boot.service... Nov 1 00:59:22.141511 bash[820]: umount: /sysroot/usr/share/oem: not mounted. Nov 1 00:59:22.146440 ignition[821]: INFO : Ignition 2.14.0 Nov 1 00:59:22.146647 ignition[821]: INFO : Stage: mount Nov 1 00:59:22.146835 ignition[821]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:59:22.146988 ignition[821]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Nov 1 00:59:22.148496 ignition[821]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Nov 1 00:59:22.149954 ignition[821]: INFO : mount: mount passed Nov 1 00:59:22.150063 ignition[821]: INFO : Ignition finished successfully Nov 1 00:59:22.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:22.150639 systemd[1]: Finished ignition-mount.service. Nov 1 00:59:22.201829 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (812) Nov 1 00:59:22.203870 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Nov 1 00:59:22.203896 kernel: BTRFS info (device sda6): using free space tree Nov 1 00:59:22.203905 kernel: BTRFS info (device sda6): has skinny extents Nov 1 00:59:22.226826 kernel: BTRFS info (device sda6): enabling ssd optimizations Nov 1 00:59:22.229707 systemd[1]: Mounted sysroot-usr-share-oem.mount. Nov 1 00:59:22.230405 systemd[1]: Starting ignition-files.service... Nov 1 00:59:22.239925 systemd[1]: Finished sysroot-boot.service. Nov 1 00:59:22.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:22.241146 ignition[848]: INFO : Ignition 2.14.0 Nov 1 00:59:22.241146 ignition[848]: INFO : Stage: files Nov 1 00:59:22.241486 ignition[848]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:59:22.241486 ignition[848]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Nov 1 00:59:22.242937 ignition[848]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Nov 1 00:59:22.245308 ignition[848]: DEBUG : files: compiled without relabeling support, skipping Nov 1 00:59:22.246007 ignition[848]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Nov 1 00:59:22.246007 ignition[848]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Nov 1 00:59:22.250071 ignition[848]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Nov 1 00:59:22.250374 ignition[848]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Nov 1 00:59:22.251676 unknown[848]: wrote ssh authorized keys file for user: core Nov 1 00:59:22.251966 ignition[848]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Nov 1 00:59:22.252464 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Nov 1 00:59:22.252651 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Nov 1 00:59:22.253772 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Nov 1 00:59:22.253977 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Nov 1 00:59:22.253977 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Nov 1 00:59:22.253977 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Nov 1 00:59:22.255787 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Nov 1 00:59:22.255787 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:59:22.268258 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4078352551" Nov 1 00:59:22.268511 ignition[848]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4078352551": device or resource busy Nov 1 00:59:22.268718 ignition[848]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4078352551", trying btrfs: device or resource busy Nov 1 00:59:22.268937 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4078352551" Nov 1 00:59:22.269181 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4078352551" Nov 1 00:59:22.274645 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem4078352551" Nov 1 00:59:22.274916 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem4078352551" Nov 1 00:59:22.275115 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Nov 1 00:59:22.275318 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Nov 1 00:59:22.275564 systemd[1]: mnt-oem4078352551.mount: Deactivated successfully. Nov 1 00:59:22.275717 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Nov 1 00:59:22.710724 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Nov 1 00:59:22.972961 systemd-networkd[735]: ens192: Gained IPv6LL Nov 1 00:59:22.995243 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Nov 1 00:59:22.998298 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Nov 1 00:59:22.998483 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Nov 1 00:59:22.998483 ignition[848]: INFO : files: op(c): [started] processing unit "vmtoolsd.service" Nov 1 00:59:22.998483 ignition[848]: INFO : files: op(c): [finished] processing unit "vmtoolsd.service" Nov 1 00:59:22.998483 ignition[848]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Nov 1 00:59:22.998483 ignition[848]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Nov 1 00:59:22.998483 ignition[848]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Nov 1 00:59:22.998483 ignition[848]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Nov 1 00:59:22.998483 ignition[848]: INFO : files: op(f): [started] setting preset to enabled for "vmtoolsd.service" Nov 1 00:59:22.999779 ignition[848]: INFO : files: op(f): [finished] setting preset to enabled for "vmtoolsd.service" Nov 1 00:59:22.999779 ignition[848]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Nov 1 00:59:22.999779 ignition[848]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Nov 1 00:59:23.157225 ignition[848]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Nov 1 00:59:23.157481 ignition[848]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Nov 1 00:59:23.157481 ignition[848]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Nov 1 00:59:23.157481 ignition[848]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Nov 1 00:59:23.157481 ignition[848]: INFO : files: files passed Nov 1 00:59:23.157481 ignition[848]: INFO : Ignition finished successfully Nov 1 00:59:23.158708 systemd[1]: Finished ignition-files.service. Nov 1 00:59:23.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.159299 systemd[1]: Starting initrd-setup-root-after-ignition.service... Nov 1 00:59:23.159416 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Nov 1 00:59:23.159797 systemd[1]: Starting ignition-quench.service... Nov 1 00:59:23.162721 systemd[1]: ignition-quench.service: Deactivated successfully. Nov 1 00:59:23.162949 systemd[1]: Finished ignition-quench.service. Nov 1 00:59:23.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.163639 initrd-setup-root-after-ignition[875]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Nov 1 00:59:23.163924 systemd[1]: Finished initrd-setup-root-after-ignition.service. Nov 1 00:59:23.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.164090 systemd[1]: Reached target ignition-complete.target. Nov 1 00:59:23.164660 systemd[1]: Starting initrd-parse-etc.service... Nov 1 00:59:23.174111 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Nov 1 00:59:23.174350 systemd[1]: Finished initrd-parse-etc.service. Nov 1 00:59:23.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.174717 systemd[1]: Reached target initrd-fs.target. Nov 1 00:59:23.174952 systemd[1]: Reached target initrd.target. Nov 1 00:59:23.175195 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Nov 1 00:59:23.175980 systemd[1]: Starting dracut-pre-pivot.service... Nov 1 00:59:23.183250 systemd[1]: Finished dracut-pre-pivot.service. Nov 1 00:59:23.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.184183 systemd[1]: Starting initrd-cleanup.service... Nov 1 00:59:23.191079 systemd[1]: Stopped target nss-lookup.target. Nov 1 00:59:23.191444 systemd[1]: Stopped target remote-cryptsetup.target. Nov 1 00:59:23.191728 systemd[1]: Stopped target timers.target. Nov 1 00:59:23.192038 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Nov 1 00:59:23.192263 systemd[1]: Stopped dracut-pre-pivot.service. Nov 1 00:59:23.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.192652 systemd[1]: Stopped target initrd.target. Nov 1 00:59:23.192933 systemd[1]: Stopped target basic.target. Nov 1 00:59:23.193211 systemd[1]: Stopped target ignition-complete.target. Nov 1 00:59:23.193515 systemd[1]: Stopped target ignition-diskful.target. Nov 1 00:59:23.193782 systemd[1]: Stopped target initrd-root-device.target. Nov 1 00:59:23.194073 systemd[1]: Stopped target remote-fs.target. Nov 1 00:59:23.194346 systemd[1]: Stopped target remote-fs-pre.target. Nov 1 00:59:23.194616 systemd[1]: Stopped target sysinit.target. Nov 1 00:59:23.194905 systemd[1]: Stopped target local-fs.target. Nov 1 00:59:23.195154 systemd[1]: Stopped target local-fs-pre.target. Nov 1 00:59:23.195431 systemd[1]: Stopped target swap.target. Nov 1 00:59:23.195675 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Nov 1 00:59:23.195897 systemd[1]: Stopped dracut-pre-mount.service. Nov 1 00:59:23.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.196271 systemd[1]: Stopped target cryptsetup.target. Nov 1 00:59:23.196525 systemd[1]: dracut-initqueue.service: Deactivated successfully. Nov 1 00:59:23.196745 systemd[1]: Stopped dracut-initqueue.service. Nov 1 00:59:23.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.197156 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Nov 1 00:59:23.197374 systemd[1]: Stopped ignition-fetch-offline.service. Nov 1 00:59:23.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.197743 systemd[1]: Stopped target paths.target. Nov 1 00:59:23.198008 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Nov 1 00:59:23.201851 systemd[1]: Stopped systemd-ask-password-console.path. Nov 1 00:59:23.202232 systemd[1]: Stopped target slices.target. Nov 1 00:59:23.202503 systemd[1]: Stopped target sockets.target. Nov 1 00:59:23.202775 systemd[1]: iscsid.socket: Deactivated successfully. Nov 1 00:59:23.202982 systemd[1]: Closed iscsid.socket. Nov 1 00:59:23.203268 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Nov 1 00:59:23.203504 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Nov 1 00:59:23.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.203879 systemd[1]: ignition-files.service: Deactivated successfully. Nov 1 00:59:23.204094 systemd[1]: Stopped ignition-files.service. Nov 1 00:59:23.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.204975 systemd[1]: Stopping ignition-mount.service... Nov 1 00:59:23.205838 systemd[1]: Stopping iscsiuio.service... Nov 1 00:59:23.209867 ignition[888]: INFO : Ignition 2.14.0 Nov 1 00:59:23.212011 ignition[888]: INFO : Stage: umount Nov 1 00:59:23.212011 ignition[888]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:59:23.212011 ignition[888]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Nov 1 00:59:23.212011 ignition[888]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Nov 1 00:59:23.213140 systemd[1]: Stopping sysroot-boot.service... Nov 1 00:59:23.213463 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Nov 1 00:59:23.215824 ignition[888]: INFO : umount: umount passed Nov 1 00:59:23.215824 ignition[888]: INFO : Ignition finished successfully Nov 1 00:59:23.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.215956 systemd[1]: Stopped systemd-udev-trigger.service. Nov 1 00:59:23.217781 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Nov 1 00:59:23.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.217897 systemd[1]: Stopped dracut-pre-trigger.service. Nov 1 00:59:23.219321 systemd[1]: iscsiuio.service: Deactivated successfully. Nov 1 00:59:23.219389 systemd[1]: Stopped iscsiuio.service. Nov 1 00:59:23.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.219789 systemd[1]: ignition-mount.service: Deactivated successfully. Nov 1 00:59:23.219865 systemd[1]: Stopped ignition-mount.service. Nov 1 00:59:23.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.220245 systemd[1]: Stopped target network.target. Nov 1 00:59:23.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.220370 systemd[1]: iscsiuio.socket: Deactivated successfully. Nov 1 00:59:23.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.220391 systemd[1]: Closed iscsiuio.socket. Nov 1 00:59:23.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.220487 systemd[1]: ignition-disks.service: Deactivated successfully. Nov 1 00:59:23.220514 systemd[1]: Stopped ignition-disks.service. Nov 1 00:59:23.220649 systemd[1]: ignition-kargs.service: Deactivated successfully. Nov 1 00:59:23.220675 systemd[1]: Stopped ignition-kargs.service. Nov 1 00:59:23.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.220803 systemd[1]: ignition-setup.service: Deactivated successfully. Nov 1 00:59:23.220852 systemd[1]: Stopped ignition-setup.service. Nov 1 00:59:23.221052 systemd[1]: Stopping systemd-networkd.service... Nov 1 00:59:23.221239 systemd[1]: Stopping systemd-resolved.service... Nov 1 00:59:23.221533 systemd[1]: initrd-cleanup.service: Deactivated successfully. Nov 1 00:59:23.221577 systemd[1]: Finished initrd-cleanup.service. Nov 1 00:59:23.225202 systemd[1]: sysroot-boot.mount: Deactivated successfully. Nov 1 00:59:23.226475 systemd[1]: systemd-networkd.service: Deactivated successfully. Nov 1 00:59:23.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.226529 systemd[1]: Stopped systemd-networkd.service. Nov 1 00:59:23.227035 systemd[1]: systemd-networkd.socket: Deactivated successfully. Nov 1 00:59:23.227055 systemd[1]: Closed systemd-networkd.socket. Nov 1 00:59:23.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.227739 systemd[1]: Stopping network-cleanup.service... Nov 1 00:59:23.227896 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Nov 1 00:59:23.227926 systemd[1]: Stopped parse-ip-for-networkd.service. Nov 1 00:59:23.228726 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Nov 1 00:59:23.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.228755 systemd[1]: Stopped afterburn-network-kargs.service. Nov 1 00:59:23.228000 audit: BPF prog-id=9 op=UNLOAD Nov 1 00:59:23.229799 systemd[1]: systemd-sysctl.service: Deactivated successfully. Nov 1 00:59:23.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.229911 systemd[1]: Stopped systemd-sysctl.service. Nov 1 00:59:23.230163 systemd[1]: systemd-modules-load.service: Deactivated successfully. Nov 1 00:59:23.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.230186 systemd[1]: Stopped systemd-modules-load.service. Nov 1 00:59:23.230416 systemd[1]: Stopping systemd-udevd.service... Nov 1 00:59:23.233277 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Nov 1 00:59:23.233742 systemd[1]: systemd-resolved.service: Deactivated successfully. Nov 1 00:59:23.234118 systemd[1]: Stopped systemd-resolved.service. Nov 1 00:59:23.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.234782 systemd[1]: systemd-udevd.service: Deactivated successfully. Nov 1 00:59:23.235002 systemd[1]: Stopped systemd-udevd.service. Nov 1 00:59:23.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.235870 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Nov 1 00:59:23.236104 systemd[1]: Closed systemd-udevd-control.socket. Nov 1 00:59:23.236354 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Nov 1 00:59:23.236516 systemd[1]: Closed systemd-udevd-kernel.socket. Nov 1 00:59:23.237344 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Nov 1 00:59:23.237497 systemd[1]: Stopped dracut-pre-udev.service. Nov 1 00:59:23.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.237772 systemd[1]: dracut-cmdline.service: Deactivated successfully. Nov 1 00:59:23.236000 audit: BPF prog-id=6 op=UNLOAD Nov 1 00:59:23.238091 systemd[1]: Stopped dracut-cmdline.service. Nov 1 00:59:23.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.238352 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Nov 1 00:59:23.238508 systemd[1]: Stopped dracut-cmdline-ask.service. Nov 1 00:59:23.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.239201 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Nov 1 00:59:23.239497 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Nov 1 00:59:23.239662 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Nov 1 00:59:23.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.240034 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Nov 1 00:59:23.240189 systemd[1]: Stopped kmod-static-nodes.service. Nov 1 00:59:23.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.240448 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Nov 1 00:59:23.240608 systemd[1]: Stopped systemd-vconsole-setup.service. Nov 1 00:59:23.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.241542 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Nov 1 00:59:23.242025 systemd[1]: network-cleanup.service: Deactivated successfully. Nov 1 00:59:23.242221 systemd[1]: Stopped network-cleanup.service. Nov 1 00:59:23.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.242614 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Nov 1 00:59:23.242909 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Nov 1 00:59:23.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.332724 systemd[1]: sysroot-boot.service: Deactivated successfully. Nov 1 00:59:23.332794 systemd[1]: Stopped sysroot-boot.service. Nov 1 00:59:23.333043 systemd[1]: Reached target initrd-switch-root.target. Nov 1 00:59:23.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.333149 systemd[1]: initrd-setup-root.service: Deactivated successfully. Nov 1 00:59:23.333175 systemd[1]: Stopped initrd-setup-root.service. Nov 1 00:59:23.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:23.333723 systemd[1]: Starting initrd-switch-root.service... Nov 1 00:59:23.340329 systemd[1]: Switching root. Nov 1 00:59:23.357008 systemd-journald[217]: Journal stopped Nov 1 00:59:26.786643 systemd-journald[217]: Received SIGTERM from PID 1 (systemd). Nov 1 00:59:26.786662 kernel: SELinux: Class mctp_socket not defined in policy. Nov 1 00:59:26.786669 kernel: SELinux: Class anon_inode not defined in policy. Nov 1 00:59:26.786676 kernel: SELinux: the above unknown classes and permissions will be allowed Nov 1 00:59:26.786682 kernel: SELinux: policy capability network_peer_controls=1 Nov 1 00:59:26.786689 kernel: SELinux: policy capability open_perms=1 Nov 1 00:59:26.786695 kernel: SELinux: policy capability extended_socket_class=1 Nov 1 00:59:26.786701 kernel: SELinux: policy capability always_check_network=0 Nov 1 00:59:26.786708 kernel: SELinux: policy capability cgroup_seclabel=1 Nov 1 00:59:26.786714 kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 1 00:59:26.786720 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Nov 1 00:59:26.786725 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Nov 1 00:59:26.786732 systemd[1]: Successfully loaded SELinux policy in 41.270ms. Nov 1 00:59:26.786740 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 15.662ms. Nov 1 00:59:26.786748 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 1 00:59:26.786755 systemd[1]: Detected virtualization vmware. Nov 1 00:59:26.786762 systemd[1]: Detected architecture x86-64. Nov 1 00:59:26.786768 systemd[1]: Detected first boot. Nov 1 00:59:26.786775 systemd[1]: Initializing machine ID from random generator. Nov 1 00:59:26.786782 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Nov 1 00:59:26.786788 systemd[1]: Populated /etc with preset unit settings. Nov 1 00:59:26.786795 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:59:26.786802 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:59:26.786816 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:59:26.786825 systemd[1]: iscsid.service: Deactivated successfully. Nov 1 00:59:26.786832 systemd[1]: Stopped iscsid.service. Nov 1 00:59:26.786839 systemd[1]: initrd-switch-root.service: Deactivated successfully. Nov 1 00:59:26.786845 systemd[1]: Stopped initrd-switch-root.service. Nov 1 00:59:26.786852 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Nov 1 00:59:26.786860 systemd[1]: Created slice system-addon\x2dconfig.slice. Nov 1 00:59:26.786866 systemd[1]: Created slice system-addon\x2drun.slice. Nov 1 00:59:26.786874 systemd[1]: Created slice system-getty.slice. Nov 1 00:59:26.786881 systemd[1]: Created slice system-modprobe.slice. Nov 1 00:59:26.786887 systemd[1]: Created slice system-serial\x2dgetty.slice. Nov 1 00:59:26.786894 systemd[1]: Created slice system-system\x2dcloudinit.slice. Nov 1 00:59:26.786901 systemd[1]: Created slice system-systemd\x2dfsck.slice. Nov 1 00:59:26.786907 systemd[1]: Created slice user.slice. Nov 1 00:59:26.786913 systemd[1]: Started systemd-ask-password-console.path. Nov 1 00:59:26.786920 systemd[1]: Started systemd-ask-password-wall.path. Nov 1 00:59:26.786927 systemd[1]: Set up automount boot.automount. Nov 1 00:59:26.786935 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Nov 1 00:59:26.786943 systemd[1]: Stopped target initrd-switch-root.target. Nov 1 00:59:26.786950 systemd[1]: Stopped target initrd-fs.target. Nov 1 00:59:26.786957 systemd[1]: Stopped target initrd-root-fs.target. Nov 1 00:59:26.786963 systemd[1]: Reached target integritysetup.target. Nov 1 00:59:26.786970 systemd[1]: Reached target remote-cryptsetup.target. Nov 1 00:59:26.786977 systemd[1]: Reached target remote-fs.target. Nov 1 00:59:26.786984 systemd[1]: Reached target slices.target. Nov 1 00:59:26.786992 systemd[1]: Reached target swap.target. Nov 1 00:59:26.786998 systemd[1]: Reached target torcx.target. Nov 1 00:59:26.787006 systemd[1]: Reached target veritysetup.target. Nov 1 00:59:26.787012 systemd[1]: Listening on systemd-coredump.socket. Nov 1 00:59:26.787019 systemd[1]: Listening on systemd-initctl.socket. Nov 1 00:59:26.787026 systemd[1]: Listening on systemd-networkd.socket. Nov 1 00:59:26.787034 systemd[1]: Listening on systemd-udevd-control.socket. Nov 1 00:59:26.787041 systemd[1]: Listening on systemd-udevd-kernel.socket. Nov 1 00:59:26.787048 systemd[1]: Listening on systemd-userdbd.socket. Nov 1 00:59:26.787055 systemd[1]: Mounting dev-hugepages.mount... Nov 1 00:59:26.787061 systemd[1]: Mounting dev-mqueue.mount... Nov 1 00:59:26.787068 systemd[1]: Mounting media.mount... Nov 1 00:59:26.787075 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:59:26.787083 systemd[1]: Mounting sys-kernel-debug.mount... Nov 1 00:59:26.787090 systemd[1]: Mounting sys-kernel-tracing.mount... Nov 1 00:59:26.787097 systemd[1]: Mounting tmp.mount... Nov 1 00:59:26.787104 systemd[1]: Starting flatcar-tmpfiles.service... Nov 1 00:59:26.787111 systemd[1]: Starting ignition-delete-config.service... Nov 1 00:59:26.787118 systemd[1]: Starting kmod-static-nodes.service... Nov 1 00:59:26.787125 systemd[1]: Starting modprobe@configfs.service... Nov 1 00:59:26.787131 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:59:26.787138 systemd[1]: Starting modprobe@drm.service... Nov 1 00:59:26.787147 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:59:26.787157 systemd[1]: Starting modprobe@fuse.service... Nov 1 00:59:26.787164 systemd[1]: Starting modprobe@loop.service... Nov 1 00:59:26.787171 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Nov 1 00:59:26.787178 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Nov 1 00:59:26.787185 systemd[1]: Stopped systemd-fsck-root.service. Nov 1 00:59:26.787192 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Nov 1 00:59:26.787199 systemd[1]: Stopped systemd-fsck-usr.service. Nov 1 00:59:26.787206 systemd[1]: Stopped systemd-journald.service. Nov 1 00:59:26.787214 kernel: fuse: init (API version 7.34) Nov 1 00:59:26.787220 systemd[1]: Starting systemd-journald.service... Nov 1 00:59:26.787227 kernel: loop: module loaded Nov 1 00:59:26.787233 systemd[1]: Starting systemd-modules-load.service... Nov 1 00:59:26.787240 systemd[1]: Starting systemd-network-generator.service... Nov 1 00:59:26.787247 systemd[1]: Starting systemd-remount-fs.service... Nov 1 00:59:26.787254 systemd[1]: Starting systemd-udev-trigger.service... Nov 1 00:59:26.787261 systemd[1]: verity-setup.service: Deactivated successfully. Nov 1 00:59:26.787269 systemd[1]: Stopped verity-setup.service. Nov 1 00:59:26.787276 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:59:26.787283 systemd[1]: Mounted dev-hugepages.mount. Nov 1 00:59:26.787290 systemd[1]: Mounted dev-mqueue.mount. Nov 1 00:59:26.787297 systemd[1]: Mounted media.mount. Nov 1 00:59:26.787305 systemd[1]: Mounted sys-kernel-debug.mount. Nov 1 00:59:26.787311 systemd[1]: Mounted sys-kernel-tracing.mount. Nov 1 00:59:26.787318 systemd[1]: Mounted tmp.mount. Nov 1 00:59:26.787325 systemd[1]: Finished kmod-static-nodes.service. Nov 1 00:59:26.787333 systemd[1]: modprobe@configfs.service: Deactivated successfully. Nov 1 00:59:26.787340 systemd[1]: Finished modprobe@configfs.service. Nov 1 00:59:26.787347 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:59:26.787354 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:59:26.787361 systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 1 00:59:26.787368 systemd[1]: Finished modprobe@drm.service. Nov 1 00:59:26.787375 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:59:26.787382 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:59:26.787388 kernel: kauditd_printk_skb: 91 callbacks suppressed Nov 1 00:59:26.787396 kernel: audit: type=1130 audit(1761958766.771:114): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.787403 systemd[1]: modprobe@fuse.service: Deactivated successfully. Nov 1 00:59:26.787410 kernel: audit: type=1131 audit(1761958766.771:115): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.787417 systemd[1]: Finished modprobe@fuse.service. Nov 1 00:59:26.787424 kernel: audit: type=1305 audit(1761958766.775:116): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Nov 1 00:59:26.787430 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:59:26.787437 kernel: audit: type=1130 audit(1761958766.779:117): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.787445 systemd[1]: Finished modprobe@loop.service. Nov 1 00:59:26.787453 systemd[1]: Finished systemd-network-generator.service. Nov 1 00:59:26.787460 systemd[1]: Finished systemd-remount-fs.service. Nov 1 00:59:26.787469 systemd-journald[1013]: Journal started Nov 1 00:59:26.787497 systemd-journald[1013]: Runtime Journal (/run/log/journal/f881fc44383a48dd9c2dc32af501c6d4) is 4.8M, max 38.8M, 34.0M free. Nov 1 00:59:23.630000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Nov 1 00:59:23.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 00:59:23.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 00:59:23.791000 audit: BPF prog-id=10 op=LOAD Nov 1 00:59:23.791000 audit: BPF prog-id=10 op=UNLOAD Nov 1 00:59:23.792000 audit: BPF prog-id=11 op=LOAD Nov 1 00:59:23.792000 audit: BPF prog-id=11 op=UNLOAD Nov 1 00:59:24.098000 audit[921]: AVC avc: denied { associate } for pid=921 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Nov 1 00:59:24.098000 audit[921]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=904 pid=921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:59:24.098000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:59:24.099000 audit[921]: AVC avc: denied { associate } for pid=921 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Nov 1 00:59:24.099000 audit[921]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179a9 a2=1ed a3=0 items=2 ppid=904 pid=921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:59:24.099000 audit: CWD cwd="/" Nov 1 00:59:24.099000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:24.099000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:26.788148 systemd[1]: Started systemd-journald.service. Nov 1 00:59:24.099000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:59:26.649000 audit: BPF prog-id=12 op=LOAD Nov 1 00:59:26.649000 audit: BPF prog-id=3 op=UNLOAD Nov 1 00:59:26.649000 audit: BPF prog-id=13 op=LOAD Nov 1 00:59:26.649000 audit: BPF prog-id=14 op=LOAD Nov 1 00:59:26.649000 audit: BPF prog-id=4 op=UNLOAD Nov 1 00:59:26.649000 audit: BPF prog-id=5 op=UNLOAD Nov 1 00:59:26.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.654000 audit: BPF prog-id=12 op=UNLOAD Nov 1 00:59:26.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.729000 audit: BPF prog-id=15 op=LOAD Nov 1 00:59:26.729000 audit: BPF prog-id=16 op=LOAD Nov 1 00:59:26.729000 audit: BPF prog-id=17 op=LOAD Nov 1 00:59:26.733000 audit: BPF prog-id=13 op=UNLOAD Nov 1 00:59:26.733000 audit: BPF prog-id=14 op=UNLOAD Nov 1 00:59:26.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.775000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Nov 1 00:59:26.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.648984 systemd[1]: Queued start job for default target multi-user.target. Nov 1 00:59:24.093975 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:59:26.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.648992 systemd[1]: Unnecessary job was removed for dev-sda6.device. Nov 1 00:59:24.096805 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:24Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Nov 1 00:59:26.652077 systemd[1]: systemd-journald.service: Deactivated successfully. Nov 1 00:59:24.096837 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:24Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Nov 1 00:59:26.788719 systemd[1]: Finished systemd-modules-load.service. Nov 1 00:59:24.096864 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:24Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Nov 1 00:59:24.096872 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:24Z" level=debug msg="skipped missing lower profile" missing profile=oem Nov 1 00:59:24.096901 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:24Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Nov 1 00:59:24.096909 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:24Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Nov 1 00:59:24.097068 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:24Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Nov 1 00:59:26.789301 jq[988]: true Nov 1 00:59:24.097098 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:24Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Nov 1 00:59:24.097106 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:24Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Nov 1 00:59:24.098896 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:24Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Nov 1 00:59:24.098919 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:24Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Nov 1 00:59:24.098931 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:24Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Nov 1 00:59:24.098954 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:24Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Nov 1 00:59:24.098965 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:24Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Nov 1 00:59:24.098973 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:24Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Nov 1 00:59:26.310426 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:26Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:59:26.310584 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:26Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:59:26.310657 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:26Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:59:26.310762 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:26Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:59:26.789983 jq[1026]: true Nov 1 00:59:26.310795 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:26Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Nov 1 00:59:26.310855 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-11-01T00:59:26Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Nov 1 00:59:26.792291 kernel: audit: type=1131 audit(1761958766.779:118): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.792717 systemd[1]: Reached target network-pre.target. Nov 1 00:59:26.794655 systemd[1]: Mounting sys-fs-fuse-connections.mount... Nov 1 00:59:26.775000 audit[1013]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff81f43c80 a2=4000 a3=7fff81f43d1c items=0 ppid=1 pid=1013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:59:26.775000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Nov 1 00:59:26.802881 kernel: audit: type=1300 audit(1761958766.775:116): arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff81f43c80 a2=4000 a3=7fff81f43d1c items=0 ppid=1 pid=1013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:59:26.802908 kernel: audit: type=1327 audit(1761958766.775:116): proctitle="/usr/lib/systemd/systemd-journald" Nov 1 00:59:26.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.804028 systemd[1]: Mounting sys-kernel-config.mount... Nov 1 00:59:26.804169 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Nov 1 00:59:26.807922 kernel: audit: type=1130 audit(1761958766.784:119): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.808550 systemd[1]: Starting systemd-hwdb-update.service... Nov 1 00:59:26.809423 systemd[1]: Starting systemd-journal-flush.service... Nov 1 00:59:26.809642 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:59:26.812837 kernel: audit: type=1131 audit(1761958766.784:120): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.812651 systemd[1]: Starting systemd-random-seed.service... Nov 1 00:59:26.812790 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:59:26.818317 kernel: audit: type=1130 audit(1761958766.785:121): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.813886 systemd[1]: Starting systemd-sysctl.service... Nov 1 00:59:26.815880 systemd[1]: Finished flatcar-tmpfiles.service. Nov 1 00:59:26.817742 systemd[1]: Mounted sys-fs-fuse-connections.mount. Nov 1 00:59:26.817897 systemd[1]: Mounted sys-kernel-config.mount. Nov 1 00:59:26.818996 systemd[1]: Starting systemd-sysusers.service... Nov 1 00:59:26.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.823902 systemd-journald[1013]: Time spent on flushing to /var/log/journal/f881fc44383a48dd9c2dc32af501c6d4 is 28.365ms for 1992 entries. Nov 1 00:59:26.823902 systemd-journald[1013]: System Journal (/var/log/journal/f881fc44383a48dd9c2dc32af501c6d4) is 8.0M, max 584.8M, 576.8M free. Nov 1 00:59:26.878068 systemd-journald[1013]: Received client request to flush runtime journal. Nov 1 00:59:26.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.843724 systemd[1]: Finished systemd-random-seed.service. Nov 1 00:59:26.843905 systemd[1]: Reached target first-boot-complete.target. Nov 1 00:59:26.877527 systemd[1]: Finished systemd-sysctl.service. Nov 1 00:59:26.878458 systemd[1]: Finished systemd-journal-flush.service. Nov 1 00:59:26.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.899184 systemd[1]: Finished systemd-sysusers.service. Nov 1 00:59:26.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.900200 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Nov 1 00:59:26.912476 systemd[1]: Finished systemd-udev-trigger.service. Nov 1 00:59:26.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:26.913477 systemd[1]: Starting systemd-udev-settle.service... Nov 1 00:59:26.921256 udevadm[1054]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Nov 1 00:59:27.027186 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Nov 1 00:59:27.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:27.118872 ignition[1031]: Ignition 2.14.0 Nov 1 00:59:27.119032 ignition[1031]: deleting config from guestinfo properties Nov 1 00:59:27.125575 ignition[1031]: Successfully deleted config Nov 1 00:59:27.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:27.126320 systemd[1]: Finished ignition-delete-config.service. Nov 1 00:59:27.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:27.342000 audit: BPF prog-id=18 op=LOAD Nov 1 00:59:27.342000 audit: BPF prog-id=19 op=LOAD Nov 1 00:59:27.342000 audit: BPF prog-id=7 op=UNLOAD Nov 1 00:59:27.342000 audit: BPF prog-id=8 op=UNLOAD Nov 1 00:59:27.343031 systemd[1]: Finished systemd-hwdb-update.service. Nov 1 00:59:27.344250 systemd[1]: Starting systemd-udevd.service... Nov 1 00:59:27.356301 systemd-udevd[1056]: Using default interface naming scheme 'v252'. Nov 1 00:59:27.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:27.393000 audit: BPF prog-id=20 op=LOAD Nov 1 00:59:27.394294 systemd[1]: Started systemd-udevd.service. Nov 1 00:59:27.395839 systemd[1]: Starting systemd-networkd.service... Nov 1 00:59:27.406000 audit: BPF prog-id=21 op=LOAD Nov 1 00:59:27.406000 audit: BPF prog-id=22 op=LOAD Nov 1 00:59:27.406000 audit: BPF prog-id=23 op=LOAD Nov 1 00:59:27.408939 systemd[1]: Starting systemd-userdbd.service... Nov 1 00:59:27.423043 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Nov 1 00:59:27.436560 systemd[1]: Started systemd-userdbd.service. Nov 1 00:59:27.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:27.471866 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Nov 1 00:59:27.477823 kernel: ACPI: button: Power Button [PWRF] Nov 1 00:59:27.497751 systemd-networkd[1066]: lo: Link UP Nov 1 00:59:27.497755 systemd-networkd[1066]: lo: Gained carrier Nov 1 00:59:27.498077 systemd-networkd[1066]: Enumeration completed Nov 1 00:59:27.498142 systemd[1]: Started systemd-networkd.service. Nov 1 00:59:27.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:27.498352 systemd-networkd[1066]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Nov 1 00:59:27.504025 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Nov 1 00:59:27.504157 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Nov 1 00:59:27.505670 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Nov 1 00:59:27.505797 systemd-networkd[1066]: ens192: Link UP Nov 1 00:59:27.505944 systemd-networkd[1066]: ens192: Gained carrier Nov 1 00:59:27.515014 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Nov 1 00:59:27.554000 audit[1057]: AVC avc: denied { confidentiality } for pid=1057 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Nov 1 00:59:27.554000 audit[1057]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5566d46fdf00 a1=338ec a2=7f3855428bc5 a3=5 items=110 ppid=1056 pid=1057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:59:27.554000 audit: CWD cwd="/" Nov 1 00:59:27.554000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=1 name=(null) inode=25007 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=2 name=(null) inode=25007 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=3 name=(null) inode=25008 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=4 name=(null) inode=25007 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=5 name=(null) inode=25009 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=6 name=(null) inode=25007 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=7 name=(null) inode=25010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=8 name=(null) inode=25010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=9 name=(null) inode=25011 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=10 name=(null) inode=25010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=11 name=(null) inode=25012 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=12 name=(null) inode=25010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=13 name=(null) inode=25013 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=14 name=(null) inode=25010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=15 name=(null) inode=25014 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=16 name=(null) inode=25010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=17 name=(null) inode=25015 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=18 name=(null) inode=25007 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=19 name=(null) inode=25016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=20 name=(null) inode=25016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=21 name=(null) inode=25017 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=22 name=(null) inode=25016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=23 name=(null) inode=25018 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=24 name=(null) inode=25016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=25 name=(null) inode=25019 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=26 name=(null) inode=25016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=27 name=(null) inode=25020 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=28 name=(null) inode=25016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=29 name=(null) inode=25021 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=30 name=(null) inode=25007 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=31 name=(null) inode=25022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=32 name=(null) inode=25022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=33 name=(null) inode=25023 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=34 name=(null) inode=25022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=35 name=(null) inode=25024 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=36 name=(null) inode=25022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=37 name=(null) inode=25025 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=38 name=(null) inode=25022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=39 name=(null) inode=25026 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=40 name=(null) inode=25022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=41 name=(null) inode=25027 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=42 name=(null) inode=25007 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=43 name=(null) inode=25028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=44 name=(null) inode=25028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=45 name=(null) inode=25029 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=46 name=(null) inode=25028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=47 name=(null) inode=25030 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=48 name=(null) inode=25028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=49 name=(null) inode=25031 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=50 name=(null) inode=25028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=51 name=(null) inode=25032 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=52 name=(null) inode=25028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=53 name=(null) inode=25033 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=55 name=(null) inode=25034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=56 name=(null) inode=25034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=57 name=(null) inode=25035 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=58 name=(null) inode=25034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=59 name=(null) inode=25036 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=60 name=(null) inode=25034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=61 name=(null) inode=25037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=62 name=(null) inode=25037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=63 name=(null) inode=25038 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=64 name=(null) inode=25037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=65 name=(null) inode=25039 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=66 name=(null) inode=25037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=67 name=(null) inode=25040 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=68 name=(null) inode=25037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=69 name=(null) inode=25041 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=70 name=(null) inode=25037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=71 name=(null) inode=25042 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=72 name=(null) inode=25034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=73 name=(null) inode=25043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=74 name=(null) inode=25043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=75 name=(null) inode=25044 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=76 name=(null) inode=25043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=77 name=(null) inode=25045 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=78 name=(null) inode=25043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=79 name=(null) inode=25046 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=80 name=(null) inode=25043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=81 name=(null) inode=25047 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=82 name=(null) inode=25043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=83 name=(null) inode=25048 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=84 name=(null) inode=25034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=85 name=(null) inode=25049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=86 name=(null) inode=25049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=87 name=(null) inode=25050 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=88 name=(null) inode=25049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=89 name=(null) inode=25051 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=90 name=(null) inode=25049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=91 name=(null) inode=25052 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=92 name=(null) inode=25049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=93 name=(null) inode=25053 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=94 name=(null) inode=25049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=95 name=(null) inode=25054 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=96 name=(null) inode=25034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=97 name=(null) inode=25055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=98 name=(null) inode=25055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=99 name=(null) inode=25056 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=100 name=(null) inode=25055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=101 name=(null) inode=25057 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=102 name=(null) inode=25055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=103 name=(null) inode=25058 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=104 name=(null) inode=25055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=105 name=(null) inode=25059 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=106 name=(null) inode=25055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=107 name=(null) inode=25060 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PATH item=109 name=(null) inode=25061 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:59:27.554000 audit: PROCTITLE proctitle="(udev-worker)" Nov 1 00:59:27.568823 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Nov 1 00:59:27.583852 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Nov 1 00:59:27.592822 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Nov 1 00:59:27.605219 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Nov 1 00:59:27.605315 kernel: mousedev: PS/2 mouse device common for all mice Nov 1 00:59:27.605329 kernel: Guest personality initialized and is active Nov 1 00:59:27.607832 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Nov 1 00:59:27.607873 kernel: Initialized host personality Nov 1 00:59:27.608458 (udev-worker)[1057]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Nov 1 00:59:27.622130 systemd[1]: Finished systemd-udev-settle.service. Nov 1 00:59:27.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:27.623245 systemd[1]: Starting lvm2-activation-early.service... Nov 1 00:59:27.642319 lvm[1089]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Nov 1 00:59:27.669449 systemd[1]: Finished lvm2-activation-early.service. Nov 1 00:59:27.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:27.669653 systemd[1]: Reached target cryptsetup.target. Nov 1 00:59:27.670681 systemd[1]: Starting lvm2-activation.service... Nov 1 00:59:27.673037 lvm[1090]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Nov 1 00:59:27.690299 systemd[1]: Finished lvm2-activation.service. Nov 1 00:59:27.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:27.690474 systemd[1]: Reached target local-fs-pre.target. Nov 1 00:59:27.690574 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Nov 1 00:59:27.690592 systemd[1]: Reached target local-fs.target. Nov 1 00:59:27.690682 systemd[1]: Reached target machines.target. Nov 1 00:59:27.691613 systemd[1]: Starting ldconfig.service... Nov 1 00:59:27.693415 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:59:27.693439 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:59:27.694231 systemd[1]: Starting systemd-boot-update.service... Nov 1 00:59:27.694877 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Nov 1 00:59:27.695899 systemd[1]: Starting systemd-machine-id-commit.service... Nov 1 00:59:27.696973 systemd[1]: Starting systemd-sysext.service... Nov 1 00:59:27.704130 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1092 (bootctl) Nov 1 00:59:27.704853 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Nov 1 00:59:27.717345 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Nov 1 00:59:27.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:27.718889 systemd[1]: Unmounting usr-share-oem.mount... Nov 1 00:59:27.732836 systemd[1]: usr-share-oem.mount: Deactivated successfully. Nov 1 00:59:27.732959 systemd[1]: Unmounted usr-share-oem.mount. Nov 1 00:59:27.748847 kernel: loop0: detected capacity change from 0 to 224512 Nov 1 00:59:28.039871 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Nov 1 00:59:28.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.040753 systemd[1]: Finished systemd-machine-id-commit.service. Nov 1 00:59:28.063829 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Nov 1 00:59:28.086830 kernel: loop1: detected capacity change from 0 to 224512 Nov 1 00:59:28.090984 systemd-fsck[1101]: fsck.fat 4.2 (2021-01-31) Nov 1 00:59:28.090984 systemd-fsck[1101]: /dev/sda1: 790 files, 120773/258078 clusters Nov 1 00:59:28.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.091805 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Nov 1 00:59:28.093060 systemd[1]: Mounting boot.mount... Nov 1 00:59:28.143277 systemd[1]: Mounted boot.mount. Nov 1 00:59:28.149665 (sd-sysext)[1104]: Using extensions 'kubernetes'. Nov 1 00:59:28.150079 (sd-sysext)[1104]: Merged extensions into '/usr'. Nov 1 00:59:28.153420 systemd[1]: Finished systemd-boot-update.service. Nov 1 00:59:28.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.162088 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:59:28.163164 systemd[1]: Mounting usr-share-oem.mount... Nov 1 00:59:28.164951 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:59:28.165653 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:59:28.166630 systemd[1]: Starting modprobe@loop.service... Nov 1 00:59:28.167000 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:59:28.167091 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:59:28.167172 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:59:28.170408 systemd[1]: Mounted usr-share-oem.mount. Nov 1 00:59:28.170794 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:59:28.171194 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:59:28.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.171571 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:59:28.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.171738 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:59:28.172085 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:59:28.172154 systemd[1]: Finished modprobe@loop.service. Nov 1 00:59:28.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.172549 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:59:28.172623 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:59:28.173474 systemd[1]: Finished systemd-sysext.service. Nov 1 00:59:28.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.174489 systemd[1]: Starting ensure-sysext.service... Nov 1 00:59:28.175316 systemd[1]: Starting systemd-tmpfiles-setup.service... Nov 1 00:59:28.179944 systemd[1]: Reloading. Nov 1 00:59:28.185504 systemd-tmpfiles[1112]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Nov 1 00:59:28.188469 systemd-tmpfiles[1112]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Nov 1 00:59:28.190268 systemd-tmpfiles[1112]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Nov 1 00:59:28.231497 /usr/lib/systemd/system-generators/torcx-generator[1131]: time="2025-11-01T00:59:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:59:28.231514 /usr/lib/systemd/system-generators/torcx-generator[1131]: time="2025-11-01T00:59:28Z" level=info msg="torcx already run" Nov 1 00:59:28.298443 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:59:28.298454 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:59:28.311522 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:59:28.349000 audit: BPF prog-id=24 op=LOAD Nov 1 00:59:28.349000 audit: BPF prog-id=15 op=UNLOAD Nov 1 00:59:28.350000 audit: BPF prog-id=25 op=LOAD Nov 1 00:59:28.350000 audit: BPF prog-id=26 op=LOAD Nov 1 00:59:28.350000 audit: BPF prog-id=16 op=UNLOAD Nov 1 00:59:28.350000 audit: BPF prog-id=17 op=UNLOAD Nov 1 00:59:28.351000 audit: BPF prog-id=27 op=LOAD Nov 1 00:59:28.351000 audit: BPF prog-id=28 op=LOAD Nov 1 00:59:28.351000 audit: BPF prog-id=18 op=UNLOAD Nov 1 00:59:28.351000 audit: BPF prog-id=19 op=UNLOAD Nov 1 00:59:28.351000 audit: BPF prog-id=29 op=LOAD Nov 1 00:59:28.351000 audit: BPF prog-id=21 op=UNLOAD Nov 1 00:59:28.351000 audit: BPF prog-id=30 op=LOAD Nov 1 00:59:28.351000 audit: BPF prog-id=31 op=LOAD Nov 1 00:59:28.351000 audit: BPF prog-id=22 op=UNLOAD Nov 1 00:59:28.351000 audit: BPF prog-id=23 op=UNLOAD Nov 1 00:59:28.352000 audit: BPF prog-id=32 op=LOAD Nov 1 00:59:28.352000 audit: BPF prog-id=20 op=UNLOAD Nov 1 00:59:28.355775 systemd[1]: Finished systemd-tmpfiles-setup.service. Nov 1 00:59:28.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.361784 systemd[1]: Starting audit-rules.service... Nov 1 00:59:28.363220 systemd[1]: Starting clean-ca-certificates.service... Nov 1 00:59:28.365540 systemd[1]: Starting systemd-journal-catalog-update.service... Nov 1 00:59:28.367000 audit: BPF prog-id=33 op=LOAD Nov 1 00:59:28.369629 systemd[1]: Starting systemd-resolved.service... Nov 1 00:59:28.369000 audit: BPF prog-id=34 op=LOAD Nov 1 00:59:28.371764 systemd[1]: Starting systemd-timesyncd.service... Nov 1 00:59:28.373829 systemd[1]: Starting systemd-update-utmp.service... Nov 1 00:59:28.374285 systemd[1]: Finished clean-ca-certificates.service. Nov 1 00:59:28.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.375662 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:59:28.379034 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:59:28.380828 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:59:28.381630 systemd[1]: Starting modprobe@loop.service... Nov 1 00:59:28.381764 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:59:28.381860 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:59:28.381934 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:59:28.382419 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:59:28.382499 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:59:28.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.383241 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:59:28.383310 systemd[1]: Finished modprobe@loop.service. Nov 1 00:59:28.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.385978 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:59:28.385000 audit[1200]: SYSTEM_BOOT pid=1200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.387094 systemd[1]: Starting modprobe@loop.service... Nov 1 00:59:28.387377 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:59:28.387463 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:59:28.387539 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:59:28.390216 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:59:28.390320 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:59:28.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.395987 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:59:28.397048 systemd[1]: Starting modprobe@drm.service... Nov 1 00:59:28.397233 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:59:28.397318 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:59:28.399344 systemd[1]: Starting systemd-networkd-wait-online.service... Nov 1 00:59:28.399511 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:59:28.400247 systemd[1]: Finished systemd-update-utmp.service. Nov 1 00:59:28.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.401839 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:59:28.401925 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:59:28.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.402344 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:59:28.402422 systemd[1]: Finished modprobe@loop.service. Nov 1 00:59:28.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.402757 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:59:28.402901 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:59:28.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.403751 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:59:28.403836 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:59:28.404478 systemd[1]: Finished ensure-sysext.service. Nov 1 00:59:28.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.405318 systemd[1]: Finished systemd-journal-catalog-update.service. Nov 1 00:59:28.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.405990 systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 1 00:59:28.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:59:28.406072 systemd[1]: Finished modprobe@drm.service. Nov 1 00:59:28.433768 augenrules[1221]: No rules Nov 1 00:59:28.431000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Nov 1 00:59:28.431000 audit[1221]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffca2175e00 a2=420 a3=0 items=0 ppid=1192 pid=1221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:59:28.431000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Nov 1 00:59:28.433955 systemd[1]: Finished audit-rules.service. Nov 1 00:59:28.434600 ldconfig[1091]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Nov 1 00:59:28.439287 systemd[1]: Started systemd-timesyncd.service. Nov 1 00:59:28.439487 systemd[1]: Reached target time-set.target. Nov 1 00:59:28.451072 systemd[1]: Finished ldconfig.service. Nov 1 00:59:28.452088 systemd[1]: Starting systemd-update-done.service... Nov 1 00:59:28.456452 systemd[1]: Finished systemd-update-done.service. Nov 1 01:01:06.474504 systemd-timesyncd[1197]: Contacted time server 15.204.87.223:123 (0.flatcar.pool.ntp.org). Nov 1 01:01:06.474687 systemd-timesyncd[1197]: Initial clock synchronization to Sat 2025-11-01 01:01:06.474439 UTC. Nov 1 01:01:06.475265 systemd-resolved[1196]: Positive Trust Anchors: Nov 1 01:01:06.475386 systemd-resolved[1196]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Nov 1 01:01:06.475449 systemd-resolved[1196]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Nov 1 01:01:06.505746 systemd-resolved[1196]: Defaulting to hostname 'linux'. Nov 1 01:01:06.506839 systemd[1]: Started systemd-resolved.service. Nov 1 01:01:06.506999 systemd[1]: Reached target network.target. Nov 1 01:01:06.507086 systemd[1]: Reached target nss-lookup.target. Nov 1 01:01:06.507180 systemd[1]: Reached target sysinit.target. Nov 1 01:01:06.507327 systemd[1]: Started motdgen.path. Nov 1 01:01:06.507463 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Nov 1 01:01:06.507654 systemd[1]: Started logrotate.timer. Nov 1 01:01:06.507775 systemd[1]: Started mdadm.timer. Nov 1 01:01:06.507856 systemd[1]: Started systemd-tmpfiles-clean.timer. Nov 1 01:01:06.507946 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Nov 1 01:01:06.507964 systemd[1]: Reached target paths.target. Nov 1 01:01:06.508057 systemd[1]: Reached target timers.target. Nov 1 01:01:06.508349 systemd[1]: Listening on dbus.socket. Nov 1 01:01:06.509172 systemd[1]: Starting docker.socket... Nov 1 01:01:06.510943 systemd[1]: Listening on sshd.socket. Nov 1 01:01:06.511098 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 01:01:06.511372 systemd[1]: Listening on docker.socket. Nov 1 01:01:06.511518 systemd[1]: Reached target sockets.target. Nov 1 01:01:06.511608 systemd[1]: Reached target basic.target. Nov 1 01:01:06.511721 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Nov 1 01:01:06.511740 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Nov 1 01:01:06.512410 systemd[1]: Starting containerd.service... Nov 1 01:01:06.513204 systemd[1]: Starting dbus.service... Nov 1 01:01:06.514571 systemd[1]: Starting enable-oem-cloudinit.service... Nov 1 01:01:06.515307 systemd[1]: Starting extend-filesystems.service... Nov 1 01:01:06.516857 jq[1232]: false Nov 1 01:01:06.515616 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Nov 1 01:01:06.516359 systemd[1]: Starting motdgen.service... Nov 1 01:01:06.518084 systemd[1]: Starting ssh-key-proc-cmdline.service... Nov 1 01:01:06.518952 systemd[1]: Starting sshd-keygen.service... Nov 1 01:01:06.521375 systemd[1]: Starting systemd-logind.service... Nov 1 01:01:06.521633 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 01:01:06.521679 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Nov 1 01:01:06.522685 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Nov 1 01:01:06.523071 systemd[1]: Starting update-engine.service... Nov 1 01:01:06.524201 systemd[1]: Starting update-ssh-keys-after-ignition.service... Nov 1 01:01:06.526277 systemd[1]: Starting vmtoolsd.service... Nov 1 01:01:06.527240 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Nov 1 01:01:06.527467 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Nov 1 01:01:06.527636 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Nov 1 01:01:06.531979 jq[1242]: true Nov 1 01:01:06.527721 systemd[1]: Finished ssh-key-proc-cmdline.service. Nov 1 01:01:06.536046 systemd[1]: Started vmtoolsd.service. Nov 1 01:01:06.548329 jq[1247]: true Nov 1 01:01:06.549048 extend-filesystems[1233]: Found loop1 Nov 1 01:01:06.550168 extend-filesystems[1233]: Found sda Nov 1 01:01:06.550332 extend-filesystems[1233]: Found sda1 Nov 1 01:01:06.550484 extend-filesystems[1233]: Found sda2 Nov 1 01:01:06.551674 extend-filesystems[1233]: Found sda3 Nov 1 01:01:06.552534 extend-filesystems[1233]: Found usr Nov 1 01:01:06.552807 extend-filesystems[1233]: Found sda4 Nov 1 01:01:06.552954 extend-filesystems[1233]: Found sda6 Nov 1 01:01:06.553099 extend-filesystems[1233]: Found sda7 Nov 1 01:01:06.553394 extend-filesystems[1233]: Found sda9 Nov 1 01:01:06.553529 extend-filesystems[1233]: Checking size of /dev/sda9 Nov 1 01:01:06.557387 systemd[1]: motdgen.service: Deactivated successfully. Nov 1 01:01:06.557503 systemd[1]: Finished motdgen.service. Nov 1 01:01:06.577639 extend-filesystems[1233]: Old size kept for /dev/sda9 Nov 1 01:01:06.578156 extend-filesystems[1233]: Found sr0 Nov 1 01:01:06.578577 systemd[1]: extend-filesystems.service: Deactivated successfully. Nov 1 01:01:06.578685 systemd[1]: Finished extend-filesystems.service. Nov 1 01:01:06.579241 dbus-daemon[1231]: [system] SELinux support is enabled Nov 1 01:01:06.579324 systemd[1]: Started dbus.service. Nov 1 01:01:06.580560 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Nov 1 01:01:06.580576 systemd[1]: Reached target system-config.target. Nov 1 01:01:06.580695 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Nov 1 01:01:06.580706 systemd[1]: Reached target user-config.target. Nov 1 01:01:06.600324 kernel: NET: Registered PF_VSOCK protocol family Nov 1 01:01:06.605328 bash[1279]: Updated "/home/core/.ssh/authorized_keys" Nov 1 01:01:06.604225 systemd[1]: Finished update-ssh-keys-after-ignition.service. Nov 1 01:01:06.615758 update_engine[1241]: I1101 01:01:06.614967 1241 main.cc:92] Flatcar Update Engine starting Nov 1 01:01:06.615796 systemd-logind[1238]: Watching system buttons on /dev/input/event1 (Power Button) Nov 1 01:01:06.615813 systemd-logind[1238]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Nov 1 01:01:06.615928 systemd-logind[1238]: New seat seat0. Nov 1 01:01:06.618993 systemd[1]: Started update-engine.service. Nov 1 01:01:06.619260 update_engine[1241]: I1101 01:01:06.619057 1241 update_check_scheduler.cc:74] Next update check in 5m51s Nov 1 01:01:06.620517 systemd[1]: Started locksmithd.service. Nov 1 01:01:06.626625 systemd[1]: Started systemd-logind.service. Nov 1 01:01:06.641689 env[1248]: time="2025-11-01T01:01:06.641630142Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Nov 1 01:01:06.663325 env[1248]: time="2025-11-01T01:01:06.663276423Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Nov 1 01:01:06.663769 env[1248]: time="2025-11-01T01:01:06.663754875Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Nov 1 01:01:06.665915 env[1248]: time="2025-11-01T01:01:06.665878259Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Nov 1 01:01:06.665915 env[1248]: time="2025-11-01T01:01:06.665908544Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Nov 1 01:01:06.666078 env[1248]: time="2025-11-01T01:01:06.666062252Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Nov 1 01:01:06.666078 env[1248]: time="2025-11-01T01:01:06.666075953Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Nov 1 01:01:06.666151 env[1248]: time="2025-11-01T01:01:06.666086006Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Nov 1 01:01:06.666151 env[1248]: time="2025-11-01T01:01:06.666092338Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Nov 1 01:01:06.666151 env[1248]: time="2025-11-01T01:01:06.666142017Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Nov 1 01:01:06.666643 env[1248]: time="2025-11-01T01:01:06.666529795Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Nov 1 01:01:06.666643 env[1248]: time="2025-11-01T01:01:06.666617762Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Nov 1 01:01:06.666643 env[1248]: time="2025-11-01T01:01:06.666628389Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Nov 1 01:01:06.666765 env[1248]: time="2025-11-01T01:01:06.666715037Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Nov 1 01:01:06.666765 env[1248]: time="2025-11-01T01:01:06.666724927Z" level=info msg="metadata content store policy set" policy=shared Nov 1 01:01:06.673343 env[1248]: time="2025-11-01T01:01:06.673088470Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Nov 1 01:01:06.673343 env[1248]: time="2025-11-01T01:01:06.673118223Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Nov 1 01:01:06.673343 env[1248]: time="2025-11-01T01:01:06.673126564Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Nov 1 01:01:06.673343 env[1248]: time="2025-11-01T01:01:06.673173723Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Nov 1 01:01:06.673343 env[1248]: time="2025-11-01T01:01:06.673183690Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Nov 1 01:01:06.673343 env[1248]: time="2025-11-01T01:01:06.673191384Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Nov 1 01:01:06.673343 env[1248]: time="2025-11-01T01:01:06.673199988Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Nov 1 01:01:06.673343 env[1248]: time="2025-11-01T01:01:06.673212623Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Nov 1 01:01:06.673343 env[1248]: time="2025-11-01T01:01:06.673222860Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Nov 1 01:01:06.673343 env[1248]: time="2025-11-01T01:01:06.673233105Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Nov 1 01:01:06.673343 env[1248]: time="2025-11-01T01:01:06.673241181Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Nov 1 01:01:06.673343 env[1248]: time="2025-11-01T01:01:06.673250256Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Nov 1 01:01:06.673671 env[1248]: time="2025-11-01T01:01:06.673362504Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Nov 1 01:01:06.673671 env[1248]: time="2025-11-01T01:01:06.673433637Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Nov 1 01:01:06.673671 env[1248]: time="2025-11-01T01:01:06.673623519Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Nov 1 01:01:06.673671 env[1248]: time="2025-11-01T01:01:06.673639953Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Nov 1 01:01:06.673777 env[1248]: time="2025-11-01T01:01:06.673648696Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Nov 1 01:01:06.673777 env[1248]: time="2025-11-01T01:01:06.673738196Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Nov 1 01:01:06.673777 env[1248]: time="2025-11-01T01:01:06.673748192Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Nov 1 01:01:06.673777 env[1248]: time="2025-11-01T01:01:06.673755429Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Nov 1 01:01:06.673777 env[1248]: time="2025-11-01T01:01:06.673761858Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Nov 1 01:01:06.673885 env[1248]: time="2025-11-01T01:01:06.673776259Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Nov 1 01:01:06.673885 env[1248]: time="2025-11-01T01:01:06.673788554Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Nov 1 01:01:06.673885 env[1248]: time="2025-11-01T01:01:06.673797492Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Nov 1 01:01:06.673885 env[1248]: time="2025-11-01T01:01:06.673806637Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Nov 1 01:01:06.673885 env[1248]: time="2025-11-01T01:01:06.673820574Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Nov 1 01:01:06.673995 env[1248]: time="2025-11-01T01:01:06.673916165Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Nov 1 01:01:06.673995 env[1248]: time="2025-11-01T01:01:06.673930095Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Nov 1 01:01:06.673995 env[1248]: time="2025-11-01T01:01:06.673942179Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Nov 1 01:01:06.673995 env[1248]: time="2025-11-01T01:01:06.673949652Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Nov 1 01:01:06.673995 env[1248]: time="2025-11-01T01:01:06.673959866Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Nov 1 01:01:06.673995 env[1248]: time="2025-11-01T01:01:06.673967482Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Nov 1 01:01:06.673995 env[1248]: time="2025-11-01T01:01:06.673982722Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Nov 1 01:01:06.674139 env[1248]: time="2025-11-01T01:01:06.674009613Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Nov 1 01:01:06.674339 env[1248]: time="2025-11-01T01:01:06.674159823Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Nov 1 01:01:06.674339 env[1248]: time="2025-11-01T01:01:06.674200212Z" level=info msg="Connect containerd service" Nov 1 01:01:06.674339 env[1248]: time="2025-11-01T01:01:06.674237162Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Nov 1 01:01:06.680913 env[1248]: time="2025-11-01T01:01:06.675952942Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Nov 1 01:01:06.680913 env[1248]: time="2025-11-01T01:01:06.676146885Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Nov 1 01:01:06.680913 env[1248]: time="2025-11-01T01:01:06.676171656Z" level=info msg=serving... address=/run/containerd/containerd.sock Nov 1 01:01:06.680913 env[1248]: time="2025-11-01T01:01:06.676204190Z" level=info msg="containerd successfully booted in 0.042308s" Nov 1 01:01:06.680913 env[1248]: time="2025-11-01T01:01:06.676842938Z" level=info msg="Start subscribing containerd event" Nov 1 01:01:06.680913 env[1248]: time="2025-11-01T01:01:06.676877047Z" level=info msg="Start recovering state" Nov 1 01:01:06.680913 env[1248]: time="2025-11-01T01:01:06.676931365Z" level=info msg="Start event monitor" Nov 1 01:01:06.680913 env[1248]: time="2025-11-01T01:01:06.676942425Z" level=info msg="Start snapshots syncer" Nov 1 01:01:06.680913 env[1248]: time="2025-11-01T01:01:06.676948838Z" level=info msg="Start cni network conf syncer for default" Nov 1 01:01:06.680913 env[1248]: time="2025-11-01T01:01:06.676953989Z" level=info msg="Start streaming server" Nov 1 01:01:06.676263 systemd[1]: Started containerd.service. Nov 1 01:01:06.678355 systemd-networkd[1066]: ens192: Gained IPv6LL Nov 1 01:01:06.680063 systemd[1]: Finished systemd-networkd-wait-online.service. Nov 1 01:01:06.680410 systemd[1]: Reached target network-online.target. Nov 1 01:01:06.681769 systemd[1]: Starting kubelet.service... Nov 1 01:01:06.763894 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 01:01:06.763938 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 01:01:06.798207 locksmithd[1286]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Nov 1 01:01:07.510404 systemd[1]: Started kubelet.service. Nov 1 01:01:07.954800 kubelet[1347]: E1101 01:01:07.954733 1347 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 01:01:07.955799 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 01:01:07.955877 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 01:01:08.190951 sshd_keygen[1250]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Nov 1 01:01:08.204808 systemd[1]: Finished sshd-keygen.service. Nov 1 01:01:08.206017 systemd[1]: Starting issuegen.service... Nov 1 01:01:08.209840 systemd[1]: issuegen.service: Deactivated successfully. Nov 1 01:01:08.209957 systemd[1]: Finished issuegen.service. Nov 1 01:01:08.211091 systemd[1]: Starting systemd-user-sessions.service... Nov 1 01:01:08.215736 systemd[1]: Finished systemd-user-sessions.service. Nov 1 01:01:08.216746 systemd[1]: Started getty@tty1.service. Nov 1 01:01:08.217584 systemd[1]: Started serial-getty@ttyS0.service. Nov 1 01:01:08.217778 systemd[1]: Reached target getty.target. Nov 1 01:01:08.217910 systemd[1]: Reached target multi-user.target. Nov 1 01:01:08.218847 systemd[1]: Starting systemd-update-utmp-runlevel.service... Nov 1 01:01:08.224380 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Nov 1 01:01:08.224486 systemd[1]: Finished systemd-update-utmp-runlevel.service. Nov 1 01:01:08.224671 systemd[1]: Startup finished in 909ms (kernel) + 5.990s (initrd) + 6.678s (userspace) = 13.577s. Nov 1 01:01:08.246840 login[1365]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Nov 1 01:01:08.247335 login[1364]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Nov 1 01:01:08.255514 systemd[1]: Created slice user-500.slice. Nov 1 01:01:08.256409 systemd[1]: Starting user-runtime-dir@500.service... Nov 1 01:01:08.259343 systemd-logind[1238]: New session 2 of user core. Nov 1 01:01:08.262565 systemd[1]: Finished user-runtime-dir@500.service. Nov 1 01:01:08.263621 systemd[1]: Starting user@500.service... Nov 1 01:01:08.266245 (systemd)[1368]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Nov 1 01:01:08.312497 systemd[1368]: Queued start job for default target default.target. Nov 1 01:01:08.312821 systemd[1368]: Reached target paths.target. Nov 1 01:01:08.312839 systemd[1368]: Reached target sockets.target. Nov 1 01:01:08.312848 systemd[1368]: Reached target timers.target. Nov 1 01:01:08.312856 systemd[1368]: Reached target basic.target. Nov 1 01:01:08.312888 systemd[1368]: Reached target default.target. Nov 1 01:01:08.312905 systemd[1368]: Startup finished in 42ms. Nov 1 01:01:08.312922 systemd[1]: Started user@500.service. Nov 1 01:01:08.313723 systemd[1]: Started session-2.scope. Nov 1 01:01:09.248595 login[1365]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Nov 1 01:01:09.253049 systemd[1]: Started session-1.scope. Nov 1 01:01:09.253579 systemd-logind[1238]: New session 1 of user core. Nov 1 01:01:18.206750 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Nov 1 01:01:18.206878 systemd[1]: Stopped kubelet.service. Nov 1 01:01:18.207854 systemd[1]: Starting kubelet.service... Nov 1 01:01:18.280958 systemd[1]: Started kubelet.service. Nov 1 01:01:18.463057 kubelet[1392]: E1101 01:01:18.462965 1392 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 01:01:18.465755 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 01:01:18.465860 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 01:01:28.716563 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Nov 1 01:01:28.716712 systemd[1]: Stopped kubelet.service. Nov 1 01:01:28.718005 systemd[1]: Starting kubelet.service... Nov 1 01:01:28.778430 systemd[1]: Started kubelet.service. Nov 1 01:01:28.895372 kubelet[1401]: E1101 01:01:28.895337 1401 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 01:01:28.896487 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 01:01:28.896561 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 01:01:36.671092 systemd[1]: Created slice system-sshd.slice. Nov 1 01:01:36.672341 systemd[1]: Started sshd@0-139.178.70.107:22-147.75.109.163:57794.service. Nov 1 01:01:36.849188 sshd[1408]: Accepted publickey for core from 147.75.109.163 port 57794 ssh2: RSA SHA256:Zb6OsOkmHuKObgLqAaxNeVGNfZDCbP6FgE1ozchKog8 Nov 1 01:01:36.850081 sshd[1408]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 01:01:36.852992 systemd-logind[1238]: New session 3 of user core. Nov 1 01:01:36.853509 systemd[1]: Started session-3.scope. Nov 1 01:01:36.901170 systemd[1]: Started sshd@1-139.178.70.107:22-147.75.109.163:57802.service. Nov 1 01:01:36.943200 sshd[1413]: Accepted publickey for core from 147.75.109.163 port 57802 ssh2: RSA SHA256:Zb6OsOkmHuKObgLqAaxNeVGNfZDCbP6FgE1ozchKog8 Nov 1 01:01:36.944326 sshd[1413]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 01:01:36.947326 systemd-logind[1238]: New session 4 of user core. Nov 1 01:01:36.948354 systemd[1]: Started session-4.scope. Nov 1 01:01:37.000733 sshd[1413]: pam_unix(sshd:session): session closed for user core Nov 1 01:01:37.002930 systemd[1]: Started sshd@2-139.178.70.107:22-147.75.109.163:57816.service. Nov 1 01:01:37.003998 systemd[1]: sshd@1-139.178.70.107:22-147.75.109.163:57802.service: Deactivated successfully. Nov 1 01:01:37.004388 systemd[1]: session-4.scope: Deactivated successfully. Nov 1 01:01:37.005151 systemd-logind[1238]: Session 4 logged out. Waiting for processes to exit. Nov 1 01:01:37.005789 systemd-logind[1238]: Removed session 4. Nov 1 01:01:37.038804 sshd[1418]: Accepted publickey for core from 147.75.109.163 port 57816 ssh2: RSA SHA256:Zb6OsOkmHuKObgLqAaxNeVGNfZDCbP6FgE1ozchKog8 Nov 1 01:01:37.039621 sshd[1418]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 01:01:37.042139 systemd-logind[1238]: New session 5 of user core. Nov 1 01:01:37.042712 systemd[1]: Started session-5.scope. Nov 1 01:01:37.089660 sshd[1418]: pam_unix(sshd:session): session closed for user core Nov 1 01:01:37.091985 systemd[1]: Started sshd@3-139.178.70.107:22-147.75.109.163:57824.service. Nov 1 01:01:37.092573 systemd[1]: sshd@2-139.178.70.107:22-147.75.109.163:57816.service: Deactivated successfully. Nov 1 01:01:37.093030 systemd[1]: session-5.scope: Deactivated successfully. Nov 1 01:01:37.093545 systemd-logind[1238]: Session 5 logged out. Waiting for processes to exit. Nov 1 01:01:37.094158 systemd-logind[1238]: Removed session 5. Nov 1 01:01:37.130314 sshd[1424]: Accepted publickey for core from 147.75.109.163 port 57824 ssh2: RSA SHA256:Zb6OsOkmHuKObgLqAaxNeVGNfZDCbP6FgE1ozchKog8 Nov 1 01:01:37.131213 sshd[1424]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 01:01:37.133940 systemd-logind[1238]: New session 6 of user core. Nov 1 01:01:37.134655 systemd[1]: Started session-6.scope. Nov 1 01:01:37.185978 sshd[1424]: pam_unix(sshd:session): session closed for user core Nov 1 01:01:37.188058 systemd[1]: Started sshd@4-139.178.70.107:22-147.75.109.163:57840.service. Nov 1 01:01:37.189571 systemd[1]: sshd@3-139.178.70.107:22-147.75.109.163:57824.service: Deactivated successfully. Nov 1 01:01:37.190011 systemd[1]: session-6.scope: Deactivated successfully. Nov 1 01:01:37.190535 systemd-logind[1238]: Session 6 logged out. Waiting for processes to exit. Nov 1 01:01:37.191059 systemd-logind[1238]: Removed session 6. Nov 1 01:01:37.227419 sshd[1430]: Accepted publickey for core from 147.75.109.163 port 57840 ssh2: RSA SHA256:Zb6OsOkmHuKObgLqAaxNeVGNfZDCbP6FgE1ozchKog8 Nov 1 01:01:37.228003 sshd[1430]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 01:01:37.231041 systemd-logind[1238]: New session 7 of user core. Nov 1 01:01:37.231314 systemd[1]: Started session-7.scope. Nov 1 01:01:37.369659 sudo[1434]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Nov 1 01:01:37.369800 sudo[1434]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 01:01:37.387345 dbus-daemon[1231]: \xd0\xfdjl\xcbU: received setenforce notice (enforcing=-1693953904) Nov 1 01:01:37.387431 sudo[1434]: pam_unix(sudo:session): session closed for user root Nov 1 01:01:37.396368 sshd[1430]: pam_unix(sshd:session): session closed for user core Nov 1 01:01:37.398795 systemd[1]: Started sshd@5-139.178.70.107:22-147.75.109.163:57846.service. Nov 1 01:01:37.399125 systemd[1]: sshd@4-139.178.70.107:22-147.75.109.163:57840.service: Deactivated successfully. Nov 1 01:01:37.399587 systemd[1]: session-7.scope: Deactivated successfully. Nov 1 01:01:37.400347 systemd-logind[1238]: Session 7 logged out. Waiting for processes to exit. Nov 1 01:01:37.402532 systemd-logind[1238]: Removed session 7. Nov 1 01:01:37.436615 sshd[1437]: Accepted publickey for core from 147.75.109.163 port 57846 ssh2: RSA SHA256:Zb6OsOkmHuKObgLqAaxNeVGNfZDCbP6FgE1ozchKog8 Nov 1 01:01:37.437377 sshd[1437]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 01:01:37.439876 systemd-logind[1238]: New session 8 of user core. Nov 1 01:01:37.440362 systemd[1]: Started session-8.scope. Nov 1 01:01:37.490762 sudo[1442]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Nov 1 01:01:37.490938 sudo[1442]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 01:01:37.493316 sudo[1442]: pam_unix(sudo:session): session closed for user root Nov 1 01:01:37.496950 sudo[1441]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Nov 1 01:01:37.497368 sudo[1441]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 01:01:37.504673 systemd[1]: Stopping audit-rules.service... Nov 1 01:01:37.504000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Nov 1 01:01:37.511402 auditctl[1445]: No rules Nov 1 01:01:37.514689 kernel: kauditd_printk_skb: 194 callbacks suppressed Nov 1 01:01:37.514738 kernel: audit: type=1305 audit(1761958897.504:201): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Nov 1 01:01:37.519213 kernel: audit: type=1300 audit(1761958897.504:201): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd797b6830 a2=420 a3=0 items=0 ppid=1 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:37.504000 audit[1445]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd797b6830 a2=420 a3=0 items=0 ppid=1 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:37.514954 systemd[1]: audit-rules.service: Deactivated successfully. Nov 1 01:01:37.515086 systemd[1]: Stopped audit-rules.service. Nov 1 01:01:37.516427 systemd[1]: Starting audit-rules.service... Nov 1 01:01:37.504000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Nov 1 01:01:37.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 01:01:37.527495 kernel: audit: type=1327 audit(1761958897.504:201): proctitle=2F7362696E2F617564697463746C002D44 Nov 1 01:01:37.527557 kernel: audit: type=1131 audit(1761958897.514:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 01:01:37.536484 augenrules[1462]: No rules Nov 1 01:01:37.537072 systemd[1]: Finished audit-rules.service. Nov 1 01:01:37.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 01:01:37.539000 audit[1441]: USER_END pid=1441 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 01:01:37.541030 sudo[1441]: pam_unix(sudo:session): session closed for user root Nov 1 01:01:37.544476 kernel: audit: type=1130 audit(1761958897.535:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 01:01:37.544524 kernel: audit: type=1106 audit(1761958897.539:204): pid=1441 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 01:01:37.539000 audit[1441]: CRED_DISP pid=1441 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 01:01:37.547442 kernel: audit: type=1104 audit(1761958897.539:205): pid=1441 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 01:01:37.547000 audit[1437]: USER_END pid=1437 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 01:01:37.550292 systemd[1]: sshd@5-139.178.70.107:22-147.75.109.163:57846.service: Deactivated successfully. Nov 1 01:01:37.548410 sshd[1437]: pam_unix(sshd:session): session closed for user core Nov 1 01:01:37.550682 systemd[1]: session-8.scope: Deactivated successfully. Nov 1 01:01:37.553308 kernel: audit: type=1106 audit(1761958897.547:206): pid=1437 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 01:01:37.547000 audit[1437]: CRED_DISP pid=1437 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 01:01:37.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.107:22-147.75.109.163:57846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 01:01:37.554682 systemd[1]: Started sshd@6-139.178.70.107:22-147.75.109.163:57852.service. Nov 1 01:01:37.555082 systemd-logind[1238]: Session 8 logged out. Waiting for processes to exit. Nov 1 01:01:37.559872 kernel: audit: type=1104 audit(1761958897.547:207): pid=1437 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 01:01:37.559909 kernel: audit: type=1131 audit(1761958897.548:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.107:22-147.75.109.163:57846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 01:01:37.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.107:22-147.75.109.163:57852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 01:01:37.560182 systemd-logind[1238]: Removed session 8. Nov 1 01:01:37.590000 audit[1468]: USER_ACCT pid=1468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 01:01:37.592248 sshd[1468]: Accepted publickey for core from 147.75.109.163 port 57852 ssh2: RSA SHA256:Zb6OsOkmHuKObgLqAaxNeVGNfZDCbP6FgE1ozchKog8 Nov 1 01:01:37.591000 audit[1468]: CRED_ACQ pid=1468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 01:01:37.591000 audit[1468]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef2b24f20 a2=3 a3=0 items=0 ppid=1 pid=1468 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:37.591000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 01:01:37.593226 sshd[1468]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 01:01:37.596168 systemd[1]: Started session-9.scope. Nov 1 01:01:37.596485 systemd-logind[1238]: New session 9 of user core. Nov 1 01:01:37.597000 audit[1468]: USER_START pid=1468 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 01:01:37.598000 audit[1470]: CRED_ACQ pid=1470 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 01:01:37.643000 audit[1471]: USER_ACCT pid=1471 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 01:01:37.645317 sudo[1471]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Nov 1 01:01:37.644000 audit[1471]: CRED_REFR pid=1471 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 01:01:37.645501 sudo[1471]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 01:01:37.645000 audit[1471]: USER_START pid=1471 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 01:01:37.653100 systemd[1]: /etc/systemd/system/coreos-metadata.service:11: Ignoring unknown escape sequences: "echo "COREOS_CUSTOM_PRIVATE_IPV4=$(ip addr show ens192 | grep "inet 10." | grep -Po "inet \K[\d.]+") Nov 1 01:01:37.655330 systemd[1]: Starting coreos-metadata.service... Nov 1 01:01:37.737978 systemd[1]: coreos-metadata.service: Deactivated successfully. Nov 1 01:01:37.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 01:01:37.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 01:01:37.738081 systemd[1]: Finished coreos-metadata.service. Nov 1 01:01:39.147103 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Nov 1 01:01:39.147226 systemd[1]: Stopped kubelet.service. Nov 1 01:01:39.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 01:01:39.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 01:01:39.148440 systemd[1]: Starting kubelet.service... Nov 1 01:01:39.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 01:01:39.676781 systemd[1]: Started kubelet.service. Nov 1 01:01:39.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Nov 1 01:01:39.736381 kubelet[1512]: E1101 01:01:39.733910 1512 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 01:01:39.735093 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 01:01:39.735172 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 01:01:39.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 01:01:39.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 01:01:39.743854 systemd[1]: Stopped kubelet.service. Nov 1 01:01:39.745434 systemd[1]: Starting kubelet.service... Nov 1 01:01:39.764208 systemd[1]: Reloading. Nov 1 01:01:39.818649 /usr/lib/systemd/system-generators/torcx-generator[1543]: time="2025-11-01T01:01:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 01:01:39.818849 /usr/lib/systemd/system-generators/torcx-generator[1543]: time="2025-11-01T01:01:39Z" level=info msg="torcx already run" Nov 1 01:01:39.873987 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 01:01:39.874102 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 01:01:39.885985 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 01:01:39.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.924000 audit: BPF prog-id=40 op=LOAD Nov 1 01:01:39.924000 audit: BPF prog-id=34 op=UNLOAD Nov 1 01:01:39.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.925000 audit: BPF prog-id=41 op=LOAD Nov 1 01:01:39.925000 audit: BPF prog-id=24 op=UNLOAD Nov 1 01:01:39.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.925000 audit: BPF prog-id=42 op=LOAD Nov 1 01:01:39.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.925000 audit: BPF prog-id=43 op=LOAD Nov 1 01:01:39.925000 audit: BPF prog-id=25 op=UNLOAD Nov 1 01:01:39.925000 audit: BPF prog-id=26 op=UNLOAD Nov 1 01:01:39.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit: BPF prog-id=44 op=LOAD Nov 1 01:01:39.928000 audit: BPF prog-id=35 op=UNLOAD Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit: BPF prog-id=45 op=LOAD Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit: BPF prog-id=46 op=LOAD Nov 1 01:01:39.928000 audit: BPF prog-id=36 op=UNLOAD Nov 1 01:01:39.928000 audit: BPF prog-id=37 op=UNLOAD Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit: BPF prog-id=47 op=LOAD Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.928000 audit: BPF prog-id=48 op=LOAD Nov 1 01:01:39.928000 audit: BPF prog-id=27 op=UNLOAD Nov 1 01:01:39.928000 audit: BPF prog-id=28 op=UNLOAD Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit: BPF prog-id=49 op=LOAD Nov 1 01:01:39.929000 audit: BPF prog-id=33 op=UNLOAD Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit: BPF prog-id=50 op=LOAD Nov 1 01:01:39.929000 audit: BPF prog-id=29 op=UNLOAD Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit: BPF prog-id=51 op=LOAD Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.929000 audit: BPF prog-id=52 op=LOAD Nov 1 01:01:39.929000 audit: BPF prog-id=30 op=UNLOAD Nov 1 01:01:39.930000 audit: BPF prog-id=31 op=UNLOAD Nov 1 01:01:39.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.931000 audit: BPF prog-id=53 op=LOAD Nov 1 01:01:39.931000 audit: BPF prog-id=38 op=UNLOAD Nov 1 01:01:39.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:39.931000 audit: BPF prog-id=54 op=LOAD Nov 1 01:01:39.931000 audit: BPF prog-id=32 op=UNLOAD Nov 1 01:01:39.964764 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Nov 1 01:01:39.964819 systemd[1]: kubelet.service: Failed with result 'signal'. Nov 1 01:01:39.965042 systemd[1]: Stopped kubelet.service. Nov 1 01:01:39.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Nov 1 01:01:39.966918 systemd[1]: Starting kubelet.service... Nov 1 01:01:40.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 01:01:40.280131 systemd[1]: Started kubelet.service. Nov 1 01:01:40.314634 kubelet[1607]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Nov 1 01:01:40.314634 kubelet[1607]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Nov 1 01:01:40.314634 kubelet[1607]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Nov 1 01:01:40.314878 kubelet[1607]: I1101 01:01:40.314685 1607 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Nov 1 01:01:40.617338 kubelet[1607]: I1101 01:01:40.617030 1607 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Nov 1 01:01:40.617338 kubelet[1607]: I1101 01:01:40.617052 1607 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Nov 1 01:01:40.617338 kubelet[1607]: I1101 01:01:40.617217 1607 server.go:954] "Client rotation is on, will bootstrap in background" Nov 1 01:01:40.668788 kubelet[1607]: I1101 01:01:40.668764 1607 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Nov 1 01:01:40.685020 kubelet[1607]: E1101 01:01:40.684999 1607 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Nov 1 01:01:40.685135 kubelet[1607]: I1101 01:01:40.685127 1607 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Nov 1 01:01:40.687037 kubelet[1607]: I1101 01:01:40.687027 1607 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Nov 1 01:01:40.687235 kubelet[1607]: I1101 01:01:40.687216 1607 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Nov 1 01:01:40.687387 kubelet[1607]: I1101 01:01:40.687272 1607 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.67.124.139","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Nov 1 01:01:40.689559 kubelet[1607]: I1101 01:01:40.689549 1607 topology_manager.go:138] "Creating topology manager with none policy" Nov 1 01:01:40.689617 kubelet[1607]: I1101 01:01:40.689609 1607 container_manager_linux.go:304] "Creating device plugin manager" Nov 1 01:01:40.689728 kubelet[1607]: I1101 01:01:40.689720 1607 state_mem.go:36] "Initialized new in-memory state store" Nov 1 01:01:40.698489 kubelet[1607]: I1101 01:01:40.698438 1607 kubelet.go:446] "Attempting to sync node with API server" Nov 1 01:01:40.698489 kubelet[1607]: I1101 01:01:40.698492 1607 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Nov 1 01:01:40.698597 kubelet[1607]: I1101 01:01:40.698509 1607 kubelet.go:352] "Adding apiserver pod source" Nov 1 01:01:40.698597 kubelet[1607]: I1101 01:01:40.698516 1607 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Nov 1 01:01:40.706471 kubelet[1607]: E1101 01:01:40.706445 1607 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:40.706549 kubelet[1607]: E1101 01:01:40.706488 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:40.714461 kubelet[1607]: I1101 01:01:40.714293 1607 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Nov 1 01:01:40.714563 kubelet[1607]: I1101 01:01:40.714552 1607 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Nov 1 01:01:40.717575 kubelet[1607]: W1101 01:01:40.717556 1607 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Nov 1 01:01:40.721147 kubelet[1607]: I1101 01:01:40.721126 1607 watchdog_linux.go:99] "Systemd watchdog is not enabled" Nov 1 01:01:40.721209 kubelet[1607]: I1101 01:01:40.721153 1607 server.go:1287] "Started kubelet" Nov 1 01:01:40.721288 kubelet[1607]: I1101 01:01:40.721259 1607 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Nov 1 01:01:40.721974 kubelet[1607]: I1101 01:01:40.721955 1607 server.go:479] "Adding debug handlers to kubelet server" Nov 1 01:01:40.723405 kubelet[1607]: I1101 01:01:40.723387 1607 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Nov 1 01:01:40.723508 kubelet[1607]: I1101 01:01:40.723497 1607 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Nov 1 01:01:40.723582 kubelet[1607]: I1101 01:01:40.723574 1607 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Nov 1 01:01:40.722000 audit[1607]: AVC avc: denied { mac_admin } for pid=1607 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:40.722000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 01:01:40.722000 audit[1607]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000875bc0 a1=c0009cdd88 a2=c000875b90 a3=25 items=0 ppid=1 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:40.722000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 01:01:40.722000 audit[1607]: AVC avc: denied { mac_admin } for pid=1607 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:40.722000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 01:01:40.722000 audit[1607]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000942f00 a1=c0009cdda0 a2=c000875c50 a3=25 items=0 ppid=1 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:40.722000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 01:01:40.732655 kubelet[1607]: I1101 01:01:40.732598 1607 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Nov 1 01:01:40.732802 kubelet[1607]: I1101 01:01:40.732790 1607 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Nov 1 01:01:40.738045 kubelet[1607]: W1101 01:01:40.738021 1607 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.67.124.139" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Nov 1 01:01:40.738133 kubelet[1607]: E1101 01:01:40.738054 1607 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.67.124.139\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Nov 1 01:01:40.738157 kubelet[1607]: W1101 01:01:40.738145 1607 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Nov 1 01:01:40.738230 kubelet[1607]: E1101 01:01:40.738157 1607 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Nov 1 01:01:40.738570 kubelet[1607]: I1101 01:01:40.738557 1607 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Nov 1 01:01:40.739167 kubelet[1607]: I1101 01:01:40.739154 1607 volume_manager.go:297] "Starting Kubelet Volume Manager" Nov 1 01:01:40.739332 kubelet[1607]: E1101 01:01:40.739320 1607 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Nov 1 01:01:40.739692 kubelet[1607]: I1101 01:01:40.739683 1607 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Nov 1 01:01:40.739725 kubelet[1607]: I1101 01:01:40.739712 1607 reconciler.go:26] "Reconciler: start to sync state" Nov 1 01:01:40.741559 kubelet[1607]: I1101 01:01:40.741543 1607 factory.go:221] Registration of the systemd container factory successfully Nov 1 01:01:40.741727 kubelet[1607]: I1101 01:01:40.741705 1607 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Nov 1 01:01:40.747945 kubelet[1607]: E1101 01:01:40.747921 1607 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Nov 1 01:01:40.748021 kubelet[1607]: I1101 01:01:40.748011 1607 factory.go:221] Registration of the containerd container factory successfully Nov 1 01:01:40.755435 kubelet[1607]: E1101 01:01:40.755412 1607 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.124.139\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Nov 1 01:01:40.755707 kubelet[1607]: W1101 01:01:40.755694 1607 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Nov 1 01:01:40.755804 kubelet[1607]: E1101 01:01:40.755791 1607 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Nov 1 01:01:40.757102 kubelet[1607]: E1101 01:01:40.755958 1607 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.139.1873bc48f2523ca1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.139,UID:10.67.124.139,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.67.124.139,},FirstTimestamp:2025-11-01 01:01:40.721138849 +0000 UTC m=+0.439066249,LastTimestamp:2025-11-01 01:01:40.721138849 +0000 UTC m=+0.439066249,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.139,}" Nov 1 01:01:40.757595 kubelet[1607]: I1101 01:01:40.757583 1607 cpu_manager.go:221] "Starting CPU manager" policy="none" Nov 1 01:01:40.757595 kubelet[1607]: I1101 01:01:40.757593 1607 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Nov 1 01:01:40.757662 kubelet[1607]: I1101 01:01:40.757614 1607 state_mem.go:36] "Initialized new in-memory state store" Nov 1 01:01:40.758426 kubelet[1607]: E1101 01:01:40.758359 1607 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.139.1873bc48f3eab75c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.139,UID:10.67.124.139,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.67.124.139,},FirstTimestamp:2025-11-01 01:01:40.747908956 +0000 UTC m=+0.465836360,LastTimestamp:2025-11-01 01:01:40.747908956 +0000 UTC m=+0.465836360,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.139,}" Nov 1 01:01:40.759037 kubelet[1607]: I1101 01:01:40.759021 1607 policy_none.go:49] "None policy: Start" Nov 1 01:01:40.759037 kubelet[1607]: I1101 01:01:40.759036 1607 memory_manager.go:186] "Starting memorymanager" policy="None" Nov 1 01:01:40.759096 kubelet[1607]: I1101 01:01:40.759053 1607 state_mem.go:35] "Initializing new in-memory state store" Nov 1 01:01:40.762355 kubelet[1607]: E1101 01:01:40.762275 1607 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.139.1873bc48f472d433 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.139,UID:10.67.124.139,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.67.124.139 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.67.124.139,},FirstTimestamp:2025-11-01 01:01:40.756829235 +0000 UTC m=+0.474756637,LastTimestamp:2025-11-01 01:01:40.756829235 +0000 UTC m=+0.474756637,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.139,}" Nov 1 01:01:40.763557 systemd[1]: Created slice kubepods.slice. Nov 1 01:01:40.766061 kubelet[1607]: E1101 01:01:40.765954 1607 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.139.1873bc48f472f13c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.139,UID:10.67.124.139,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.67.124.139 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.67.124.139,},FirstTimestamp:2025-11-01 01:01:40.756836668 +0000 UTC m=+0.474764069,LastTimestamp:2025-11-01 01:01:40.756836668 +0000 UTC m=+0.474764069,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.139,}" Nov 1 01:01:40.768119 systemd[1]: Created slice kubepods-burstable.slice. Nov 1 01:01:40.770035 kubelet[1607]: E1101 01:01:40.769962 1607 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.139.1873bc48f4737a70 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.139,UID:10.67.124.139,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 10.67.124.139 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:10.67.124.139,},FirstTimestamp:2025-11-01 01:01:40.756871792 +0000 UTC m=+0.474799194,LastTimestamp:2025-11-01 01:01:40.756871792 +0000 UTC m=+0.474799194,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.139,}" Nov 1 01:01:40.772381 systemd[1]: Created slice kubepods-besteffort.slice. Nov 1 01:01:40.777933 kubelet[1607]: I1101 01:01:40.777917 1607 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Nov 1 01:01:40.776000 audit[1607]: AVC avc: denied { mac_admin } for pid=1607 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:40.776000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 01:01:40.776000 audit[1607]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a0f5c0 a1=c000cf4a98 a2=c000a0f590 a3=25 items=0 ppid=1 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:40.776000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 01:01:40.778221 kubelet[1607]: I1101 01:01:40.778193 1607 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Nov 1 01:01:40.778377 kubelet[1607]: I1101 01:01:40.778369 1607 eviction_manager.go:189] "Eviction manager: starting control loop" Nov 1 01:01:40.778442 kubelet[1607]: I1101 01:01:40.778420 1607 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Nov 1 01:01:40.779042 kubelet[1607]: I1101 01:01:40.779035 1607 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Nov 1 01:01:40.780202 kubelet[1607]: E1101 01:01:40.780184 1607 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Nov 1 01:01:40.780308 kubelet[1607]: E1101 01:01:40.780300 1607 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.124.139\" not found" Nov 1 01:01:40.783757 kubelet[1607]: E1101 01:01:40.783692 1607 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.139.1873bc48f5dc5253 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.139,UID:10.67.124.139,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeAllocatableEnforced,Message:Updated Node Allocatable limit across pods,Source:EventSource{Component:kubelet,Host:10.67.124.139,},FirstTimestamp:2025-11-01 01:01:40.780520019 +0000 UTC m=+0.498447418,LastTimestamp:2025-11-01 01:01:40.780520019 +0000 UTC m=+0.498447418,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.139,}" Nov 1 01:01:40.785000 audit[1623]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1623 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:40.785000 audit[1623]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd9c56d780 a2=0 a3=7ffd9c56d76c items=0 ppid=1607 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:40.785000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Nov 1 01:01:40.786000 audit[1627]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:40.786000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff1f5b83a0 a2=0 a3=7fff1f5b838c items=0 ppid=1607 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:40.786000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Nov 1 01:01:40.788000 audit[1629]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:40.788000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe5d2d1630 a2=0 a3=7ffe5d2d161c items=0 ppid=1607 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:40.788000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 01:01:40.801000 audit[1634]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:40.801000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc9be71d50 a2=0 a3=7ffc9be71d3c items=0 ppid=1607 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:40.801000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 01:01:40.840000 audit[1639]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1639 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:40.840000 audit[1639]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdf400b9f0 a2=0 a3=7ffdf400b9dc items=0 ppid=1607 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:40.840000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Nov 1 01:01:40.842063 kubelet[1607]: I1101 01:01:40.841909 1607 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Nov 1 01:01:40.841000 audit[1640]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1640 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:40.841000 audit[1640]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff4e2bceb0 a2=0 a3=7fff4e2bce9c items=0 ppid=1607 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:40.841000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Nov 1 01:01:40.842738 kubelet[1607]: I1101 01:01:40.842728 1607 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Nov 1 01:01:40.842786 kubelet[1607]: I1101 01:01:40.842778 1607 status_manager.go:227] "Starting to sync pod status with apiserver" Nov 1 01:01:40.842840 kubelet[1607]: I1101 01:01:40.842832 1607 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Nov 1 01:01:40.842881 kubelet[1607]: I1101 01:01:40.842875 1607 kubelet.go:2382] "Starting kubelet main sync loop" Nov 1 01:01:40.842983 kubelet[1607]: E1101 01:01:40.842974 1607 kubelet.go:2406] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Nov 1 01:01:40.841000 audit[1641]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1641 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:40.841000 audit[1641]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5e037230 a2=0 a3=7ffe5e03721c items=0 ppid=1607 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:40.841000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Nov 1 01:01:40.842000 audit[1642]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:40.842000 audit[1642]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff88a80ea0 a2=0 a3=7fff88a80e8c items=0 ppid=1607 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:40.842000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Nov 1 01:01:40.843000 audit[1644]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=1644 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:40.843000 audit[1644]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd598e3420 a2=0 a3=7ffd598e340c items=0 ppid=1607 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:40.843000 audit[1643]: NETFILTER_CFG table=nat:11 family=2 entries=2 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:40.843000 audit[1643]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc856d61c0 a2=0 a3=7ffc856d61ac items=0 ppid=1607 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:40.843000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Nov 1 01:01:40.843000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Nov 1 01:01:40.844000 audit[1645]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:40.844000 audit[1645]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda5d098a0 a2=0 a3=7ffda5d0988c items=0 ppid=1607 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:40.844000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Nov 1 01:01:40.844000 audit[1646]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:40.844000 audit[1646]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc883a0910 a2=0 a3=7ffc883a08fc items=0 ppid=1607 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:40.844000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Nov 1 01:01:40.879667 kubelet[1607]: I1101 01:01:40.878982 1607 kubelet_node_status.go:75] "Attempting to register node" node="10.67.124.139" Nov 1 01:01:40.903389 kubelet[1607]: I1101 01:01:40.903368 1607 kubelet_node_status.go:78] "Successfully registered node" node="10.67.124.139" Nov 1 01:01:40.903515 kubelet[1607]: E1101 01:01:40.903505 1607 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.67.124.139\": node \"10.67.124.139\" not found" Nov 1 01:01:40.934017 kubelet[1607]: E1101 01:01:40.933987 1607 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Nov 1 01:01:41.034412 kubelet[1607]: E1101 01:01:41.034386 1607 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Nov 1 01:01:41.134926 kubelet[1607]: E1101 01:01:41.134850 1607 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Nov 1 01:01:41.235729 kubelet[1607]: E1101 01:01:41.235699 1607 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Nov 1 01:01:41.336219 kubelet[1607]: E1101 01:01:41.336184 1607 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Nov 1 01:01:41.436751 kubelet[1607]: E1101 01:01:41.436675 1607 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Nov 1 01:01:41.537277 kubelet[1607]: E1101 01:01:41.537249 1607 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Nov 1 01:01:41.618866 kubelet[1607]: I1101 01:01:41.618833 1607 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Nov 1 01:01:41.619161 kubelet[1607]: W1101 01:01:41.619145 1607 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Nov 1 01:01:41.638105 kubelet[1607]: E1101 01:01:41.638020 1607 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Nov 1 01:01:41.707188 kubelet[1607]: E1101 01:01:41.707113 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:41.738778 kubelet[1607]: E1101 01:01:41.738751 1607 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Nov 1 01:01:41.800000 audit[1471]: USER_END pid=1471 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 01:01:41.800000 audit[1471]: CRED_DISP pid=1471 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 01:01:41.801828 sudo[1471]: pam_unix(sudo:session): session closed for user root Nov 1 01:01:41.802000 audit[1468]: USER_END pid=1468 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 01:01:41.802000 audit[1468]: CRED_DISP pid=1468 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 01:01:41.802942 sshd[1468]: pam_unix(sshd:session): session closed for user core Nov 1 01:01:41.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.107:22-147.75.109.163:57852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 01:01:41.804599 systemd[1]: sshd@6-139.178.70.107:22-147.75.109.163:57852.service: Deactivated successfully. Nov 1 01:01:41.805131 systemd[1]: session-9.scope: Deactivated successfully. Nov 1 01:01:41.805893 systemd-logind[1238]: Session 9 logged out. Waiting for processes to exit. Nov 1 01:01:41.806624 systemd-logind[1238]: Removed session 9. Nov 1 01:01:41.839640 kubelet[1607]: E1101 01:01:41.839608 1607 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Nov 1 01:01:41.940081 kubelet[1607]: E1101 01:01:41.940055 1607 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Nov 1 01:01:42.040711 kubelet[1607]: E1101 01:01:42.040621 1607 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Nov 1 01:01:42.142163 kubelet[1607]: I1101 01:01:42.142148 1607 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Nov 1 01:01:42.142507 env[1248]: time="2025-11-01T01:01:42.142476517Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Nov 1 01:01:42.142739 kubelet[1607]: I1101 01:01:42.142730 1607 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Nov 1 01:01:42.708190 kubelet[1607]: E1101 01:01:42.708155 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:42.708502 kubelet[1607]: I1101 01:01:42.708168 1607 apiserver.go:52] "Watching apiserver" Nov 1 01:01:42.710509 kubelet[1607]: E1101 01:01:42.710480 1607 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bdrsw" podUID="7d1a2b41-a133-4dae-a058-ec3e3e4b4338" Nov 1 01:01:42.713910 systemd[1]: Created slice kubepods-besteffort-pod8f0cf95a_e4ad_40ab_b0b1_e84cb32a1bfe.slice. Nov 1 01:01:42.721471 systemd[1]: Created slice kubepods-besteffort-pode135300c_a466_4aad_a5ea_9c32f7948a14.slice. Nov 1 01:01:42.740188 kubelet[1607]: I1101 01:01:42.740163 1607 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Nov 1 01:01:42.752425 kubelet[1607]: I1101 01:01:42.752393 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xxq54\" (UniqueName: \"kubernetes.io/projected/8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe-kube-api-access-xxq54\") pod \"calico-node-xbd5c\" (UID: \"8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe\") " pod="calico-system/calico-node-xbd5c" Nov 1 01:01:42.752425 kubelet[1607]: I1101 01:01:42.752425 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e135300c-a466-4aad-a5ea-9c32f7948a14-kube-proxy\") pod \"kube-proxy-47k9v\" (UID: \"e135300c-a466-4aad-a5ea-9c32f7948a14\") " pod="kube-system/kube-proxy-47k9v" Nov 1 01:01:42.752565 kubelet[1607]: I1101 01:01:42.752440 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/7d1a2b41-a133-4dae-a058-ec3e3e4b4338-socket-dir\") pod \"csi-node-driver-bdrsw\" (UID: \"7d1a2b41-a133-4dae-a058-ec3e3e4b4338\") " pod="calico-system/csi-node-driver-bdrsw" Nov 1 01:01:42.752565 kubelet[1607]: I1101 01:01:42.752460 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe-cni-bin-dir\") pod \"calico-node-xbd5c\" (UID: \"8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe\") " pod="calico-system/calico-node-xbd5c" Nov 1 01:01:42.752565 kubelet[1607]: I1101 01:01:42.752470 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe-cni-net-dir\") pod \"calico-node-xbd5c\" (UID: \"8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe\") " pod="calico-system/calico-node-xbd5c" Nov 1 01:01:42.752565 kubelet[1607]: I1101 01:01:42.752480 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe-policysync\") pod \"calico-node-xbd5c\" (UID: \"8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe\") " pod="calico-system/calico-node-xbd5c" Nov 1 01:01:42.752565 kubelet[1607]: I1101 01:01:42.752489 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe-tigera-ca-bundle\") pod \"calico-node-xbd5c\" (UID: \"8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe\") " pod="calico-system/calico-node-xbd5c" Nov 1 01:01:42.752691 kubelet[1607]: I1101 01:01:42.752499 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/7d1a2b41-a133-4dae-a058-ec3e3e4b4338-varrun\") pod \"csi-node-driver-bdrsw\" (UID: \"7d1a2b41-a133-4dae-a058-ec3e3e4b4338\") " pod="calico-system/csi-node-driver-bdrsw" Nov 1 01:01:42.752691 kubelet[1607]: I1101 01:01:42.752510 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe-flexvol-driver-host\") pod \"calico-node-xbd5c\" (UID: \"8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe\") " pod="calico-system/calico-node-xbd5c" Nov 1 01:01:42.752691 kubelet[1607]: I1101 01:01:42.752527 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe-xtables-lock\") pod \"calico-node-xbd5c\" (UID: \"8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe\") " pod="calico-system/calico-node-xbd5c" Nov 1 01:01:42.752691 kubelet[1607]: I1101 01:01:42.752537 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e135300c-a466-4aad-a5ea-9c32f7948a14-xtables-lock\") pod \"kube-proxy-47k9v\" (UID: \"e135300c-a466-4aad-a5ea-9c32f7948a14\") " pod="kube-system/kube-proxy-47k9v" Nov 1 01:01:42.752691 kubelet[1607]: I1101 01:01:42.752546 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e135300c-a466-4aad-a5ea-9c32f7948a14-lib-modules\") pod \"kube-proxy-47k9v\" (UID: \"e135300c-a466-4aad-a5ea-9c32f7948a14\") " pod="kube-system/kube-proxy-47k9v" Nov 1 01:01:42.752784 kubelet[1607]: I1101 01:01:42.752556 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe-cni-log-dir\") pod \"calico-node-xbd5c\" (UID: \"8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe\") " pod="calico-system/calico-node-xbd5c" Nov 1 01:01:42.752784 kubelet[1607]: I1101 01:01:42.752565 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe-node-certs\") pod \"calico-node-xbd5c\" (UID: \"8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe\") " pod="calico-system/calico-node-xbd5c" Nov 1 01:01:42.752784 kubelet[1607]: I1101 01:01:42.752576 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe-var-run-calico\") pod \"calico-node-xbd5c\" (UID: \"8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe\") " pod="calico-system/calico-node-xbd5c" Nov 1 01:01:42.752784 kubelet[1607]: I1101 01:01:42.752585 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/7d1a2b41-a133-4dae-a058-ec3e3e4b4338-registration-dir\") pod \"csi-node-driver-bdrsw\" (UID: \"7d1a2b41-a133-4dae-a058-ec3e3e4b4338\") " pod="calico-system/csi-node-driver-bdrsw" Nov 1 01:01:42.752784 kubelet[1607]: I1101 01:01:42.752595 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6znxp\" (UniqueName: \"kubernetes.io/projected/7d1a2b41-a133-4dae-a058-ec3e3e4b4338-kube-api-access-6znxp\") pod \"csi-node-driver-bdrsw\" (UID: \"7d1a2b41-a133-4dae-a058-ec3e3e4b4338\") " pod="calico-system/csi-node-driver-bdrsw" Nov 1 01:01:42.752880 kubelet[1607]: I1101 01:01:42.752635 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe-lib-modules\") pod \"calico-node-xbd5c\" (UID: \"8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe\") " pod="calico-system/calico-node-xbd5c" Nov 1 01:01:42.752880 kubelet[1607]: I1101 01:01:42.752646 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe-var-lib-calico\") pod \"calico-node-xbd5c\" (UID: \"8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe\") " pod="calico-system/calico-node-xbd5c" Nov 1 01:01:42.752880 kubelet[1607]: I1101 01:01:42.752656 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cc7mf\" (UniqueName: \"kubernetes.io/projected/e135300c-a466-4aad-a5ea-9c32f7948a14-kube-api-access-cc7mf\") pod \"kube-proxy-47k9v\" (UID: \"e135300c-a466-4aad-a5ea-9c32f7948a14\") " pod="kube-system/kube-proxy-47k9v" Nov 1 01:01:42.752880 kubelet[1607]: I1101 01:01:42.752664 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/7d1a2b41-a133-4dae-a058-ec3e3e4b4338-kubelet-dir\") pod \"csi-node-driver-bdrsw\" (UID: \"7d1a2b41-a133-4dae-a058-ec3e3e4b4338\") " pod="calico-system/csi-node-driver-bdrsw" Nov 1 01:01:42.853719 kubelet[1607]: I1101 01:01:42.853664 1607 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Nov 1 01:01:42.855071 kubelet[1607]: E1101 01:01:42.855038 1607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 01:01:42.855071 kubelet[1607]: W1101 01:01:42.855066 1607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 01:01:42.855161 kubelet[1607]: E1101 01:01:42.855088 1607 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 01:01:42.855190 kubelet[1607]: E1101 01:01:42.855185 1607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 01:01:42.855210 kubelet[1607]: W1101 01:01:42.855190 1607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 01:01:42.855210 kubelet[1607]: E1101 01:01:42.855196 1607 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 01:01:42.855542 kubelet[1607]: E1101 01:01:42.855293 1607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 01:01:42.855542 kubelet[1607]: W1101 01:01:42.855300 1607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 01:01:42.855542 kubelet[1607]: E1101 01:01:42.855306 1607 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 01:01:42.855542 kubelet[1607]: E1101 01:01:42.855386 1607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 01:01:42.855542 kubelet[1607]: W1101 01:01:42.855408 1607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 01:01:42.855542 kubelet[1607]: E1101 01:01:42.855422 1607 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 01:01:42.855668 kubelet[1607]: E1101 01:01:42.855605 1607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 01:01:42.855668 kubelet[1607]: W1101 01:01:42.855610 1607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 01:01:42.855668 kubelet[1607]: E1101 01:01:42.855616 1607 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 01:01:42.860914 kubelet[1607]: E1101 01:01:42.860901 1607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 01:01:42.861020 kubelet[1607]: W1101 01:01:42.861008 1607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 01:01:42.861075 kubelet[1607]: E1101 01:01:42.861065 1607 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 01:01:42.870518 kubelet[1607]: E1101 01:01:42.870499 1607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 01:01:42.870608 kubelet[1607]: W1101 01:01:42.870597 1607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 01:01:42.870669 kubelet[1607]: E1101 01:01:42.870654 1607 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 01:01:42.877616 kubelet[1607]: E1101 01:01:42.877595 1607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 01:01:42.877616 kubelet[1607]: W1101 01:01:42.877606 1607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 01:01:42.877708 kubelet[1607]: E1101 01:01:42.877620 1607 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 01:01:42.877739 kubelet[1607]: E1101 01:01:42.877732 1607 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 01:01:42.877739 kubelet[1607]: W1101 01:01:42.877737 1607 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 01:01:42.877776 kubelet[1607]: E1101 01:01:42.877742 1607 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 01:01:43.022685 env[1248]: time="2025-11-01T01:01:43.020095044Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xbd5c,Uid:8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe,Namespace:calico-system,Attempt:0,}" Nov 1 01:01:43.024553 env[1248]: time="2025-11-01T01:01:43.024365711Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-47k9v,Uid:e135300c-a466-4aad-a5ea-9c32f7948a14,Namespace:kube-system,Attempt:0,}" Nov 1 01:01:43.708792 kubelet[1607]: E1101 01:01:43.708753 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:44.033532 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2095743674.mount: Deactivated successfully. Nov 1 01:01:44.039554 env[1248]: time="2025-11-01T01:01:44.039529316Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:44.041665 env[1248]: time="2025-11-01T01:01:44.041640729Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:44.042616 env[1248]: time="2025-11-01T01:01:44.042593596Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:44.043219 env[1248]: time="2025-11-01T01:01:44.043204834Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:44.045079 env[1248]: time="2025-11-01T01:01:44.045062233Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:44.047141 env[1248]: time="2025-11-01T01:01:44.047119987Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:44.048661 env[1248]: time="2025-11-01T01:01:44.048636705Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:44.049119 env[1248]: time="2025-11-01T01:01:44.049106216Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:44.073985 env[1248]: time="2025-11-01T01:01:44.073940954Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 01:01:44.073985 env[1248]: time="2025-11-01T01:01:44.073987162Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 01:01:44.074117 env[1248]: time="2025-11-01T01:01:44.074003133Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 01:01:44.074117 env[1248]: time="2025-11-01T01:01:44.074093309Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5eed0379ee332e82b66a62a7e1ad486af6fd8b9fce714045f695213d7abbd07f pid=1676 runtime=io.containerd.runc.v2 Nov 1 01:01:44.074295 env[1248]: time="2025-11-01T01:01:44.074238810Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 01:01:44.074295 env[1248]: time="2025-11-01T01:01:44.074262155Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 01:01:44.074387 env[1248]: time="2025-11-01T01:01:44.074370471Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 01:01:44.074515 env[1248]: time="2025-11-01T01:01:44.074498610Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/952bea5ae3133947fd50fd2b7f71b14c698008831080117fceabe554ce25c61b pid=1677 runtime=io.containerd.runc.v2 Nov 1 01:01:44.085630 systemd[1]: Started cri-containerd-5eed0379ee332e82b66a62a7e1ad486af6fd8b9fce714045f695213d7abbd07f.scope. Nov 1 01:01:44.093362 systemd[1]: Started cri-containerd-952bea5ae3133947fd50fd2b7f71b14c698008831080117fceabe554ce25c61b.scope. Nov 1 01:01:44.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.104375 kernel: kauditd_printk_skb: 246 callbacks suppressed Nov 1 01:01:44.104430 kernel: audit: type=1400 audit(1761958904.101:420): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.110723 kernel: audit: type=1400 audit(1761958904.101:421): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.114393 kernel: audit: type=1400 audit(1761958904.101:422): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.120368 kernel: audit: type=1400 audit(1761958904.101:423): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.126693 kernel: audit: type=1400 audit(1761958904.101:424): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.126754 kernel: audit: type=1400 audit(1761958904.101:425): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.127005 env[1248]: time="2025-11-01T01:01:44.126982106Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xbd5c,Uid:8f0cf95a-e4ad-40ab-b0b1-e84cb32a1bfe,Namespace:calico-system,Attempt:0,} returns sandbox id \"5eed0379ee332e82b66a62a7e1ad486af6fd8b9fce714045f695213d7abbd07f\"" Nov 1 01:01:44.128332 env[1248]: time="2025-11-01T01:01:44.128314869Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Nov 1 01:01:44.129635 kernel: audit: type=1400 audit(1761958904.101:426): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.134829 kernel: audit: type=1400 audit(1761958904.101:427): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.134895 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Nov 1 01:01:44.134913 kernel: audit: type=1400 audit(1761958904.101:428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.102000 audit: BPF prog-id=55 op=LOAD Nov 1 01:01:44.102000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.102000 audit[1697]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1676 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:44.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565656430333739656533333265383262363661363261376531616434 Nov 1 01:01:44.102000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.102000 audit[1697]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1676 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:44.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565656430333739656533333265383262363661363261376531616434 Nov 1 01:01:44.102000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.102000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.102000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.102000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.102000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.102000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.102000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.102000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.102000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.102000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.102000 audit: BPF prog-id=56 op=LOAD Nov 1 01:01:44.102000 audit[1697]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003acc70 items=0 ppid=1676 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:44.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565656430333739656533333265383262363661363261376531616434 Nov 1 01:01:44.106000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.106000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.106000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.106000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.106000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.106000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.106000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.106000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.106000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.106000 audit: BPF prog-id=57 op=LOAD Nov 1 01:01:44.106000 audit[1697]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003accb8 items=0 ppid=1676 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:44.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565656430333739656533333265383262363661363261376531616434 Nov 1 01:01:44.110000 audit: BPF prog-id=57 op=UNLOAD Nov 1 01:01:44.110000 audit: BPF prog-id=56 op=UNLOAD Nov 1 01:01:44.110000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.110000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.110000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.110000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.110000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.110000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.110000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.110000 audit[1697]: AVC avc: denied { perfmon } for pid=1697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.110000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.110000 audit[1697]: AVC avc: denied { bpf } for pid=1697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.110000 audit: BPF prog-id=58 op=LOAD Nov 1 01:01:44.110000 audit[1697]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003ad0c8 items=0 ppid=1676 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:44.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565656430333739656533333265383262363661363261376531616434 Nov 1 01:01:44.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.129000 audit: BPF prog-id=59 op=LOAD Nov 1 01:01:44.134000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.134000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1677 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:44.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935326265613561653331333339343766643530666432623766373162 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit: BPF prog-id=60 op=LOAD Nov 1 01:01:44.137000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000236720 items=0 ppid=1677 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:44.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935326265613561653331333339343766643530666432623766373162 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit: BPF prog-id=61 op=LOAD Nov 1 01:01:44.137000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000236768 items=0 ppid=1677 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:44.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935326265613561653331333339343766643530666432623766373162 Nov 1 01:01:44.137000 audit: BPF prog-id=61 op=UNLOAD Nov 1 01:01:44.137000 audit: BPF prog-id=60 op=UNLOAD Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:44.137000 audit: BPF prog-id=62 op=LOAD Nov 1 01:01:44.137000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000236b78 items=0 ppid=1677 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:44.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935326265613561653331333339343766643530666432623766373162 Nov 1 01:01:44.147776 env[1248]: time="2025-11-01T01:01:44.147749361Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-47k9v,Uid:e135300c-a466-4aad-a5ea-9c32f7948a14,Namespace:kube-system,Attempt:0,} returns sandbox id \"952bea5ae3133947fd50fd2b7f71b14c698008831080117fceabe554ce25c61b\"" Nov 1 01:01:44.709586 kubelet[1607]: E1101 01:01:44.709543 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:44.844611 kubelet[1607]: E1101 01:01:44.844579 1607 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bdrsw" podUID="7d1a2b41-a133-4dae-a058-ec3e3e4b4338" Nov 1 01:01:45.392372 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3057637952.mount: Deactivated successfully. Nov 1 01:01:45.503582 env[1248]: time="2025-11-01T01:01:45.503556738Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:45.504685 env[1248]: time="2025-11-01T01:01:45.504671603Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:45.505296 env[1248]: time="2025-11-01T01:01:45.505272519Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:45.505967 env[1248]: time="2025-11-01T01:01:45.505954877Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:45.506348 env[1248]: time="2025-11-01T01:01:45.506334122Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5\"" Nov 1 01:01:45.507212 env[1248]: time="2025-11-01T01:01:45.507200771Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\"" Nov 1 01:01:45.507943 env[1248]: time="2025-11-01T01:01:45.507929225Z" level=info msg="CreateContainer within sandbox \"5eed0379ee332e82b66a62a7e1ad486af6fd8b9fce714045f695213d7abbd07f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Nov 1 01:01:45.515074 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3638332604.mount: Deactivated successfully. Nov 1 01:01:45.526856 env[1248]: time="2025-11-01T01:01:45.526826406Z" level=info msg="CreateContainer within sandbox \"5eed0379ee332e82b66a62a7e1ad486af6fd8b9fce714045f695213d7abbd07f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ba6708b27e541998285dc844a6f6c977d047136bb5c05fb985e745d6cad6a145\"" Nov 1 01:01:45.527389 env[1248]: time="2025-11-01T01:01:45.527369556Z" level=info msg="StartContainer for \"ba6708b27e541998285dc844a6f6c977d047136bb5c05fb985e745d6cad6a145\"" Nov 1 01:01:45.538240 systemd[1]: Started cri-containerd-ba6708b27e541998285dc844a6f6c977d047136bb5c05fb985e745d6cad6a145.scope. Nov 1 01:01:45.547000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.547000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f72a0020918 items=0 ppid=1676 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:45.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261363730386232376535343139393832383564633834346136663663 Nov 1 01:01:45.547000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.547000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.547000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.547000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.547000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.547000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.547000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.547000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.547000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.547000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.547000 audit: BPF prog-id=63 op=LOAD Nov 1 01:01:45.547000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002d9ba8 items=0 ppid=1676 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:45.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261363730386232376535343139393832383564633834346136663663 Nov 1 01:01:45.548000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.548000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.548000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.548000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.548000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.548000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.548000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.548000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.548000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.548000 audit: BPF prog-id=64 op=LOAD Nov 1 01:01:45.548000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002d9bf8 items=0 ppid=1676 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:45.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261363730386232376535343139393832383564633834346136663663 Nov 1 01:01:45.548000 audit: BPF prog-id=64 op=UNLOAD Nov 1 01:01:45.548000 audit: BPF prog-id=63 op=UNLOAD Nov 1 01:01:45.548000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.548000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.548000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.548000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.548000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.548000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.548000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.548000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.548000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.548000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:45.548000 audit: BPF prog-id=65 op=LOAD Nov 1 01:01:45.548000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002d9c88 items=0 ppid=1676 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:45.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261363730386232376535343139393832383564633834346136663663 Nov 1 01:01:45.557944 env[1248]: time="2025-11-01T01:01:45.557915797Z" level=info msg="StartContainer for \"ba6708b27e541998285dc844a6f6c977d047136bb5c05fb985e745d6cad6a145\" returns successfully" Nov 1 01:01:45.566411 systemd[1]: cri-containerd-ba6708b27e541998285dc844a6f6c977d047136bb5c05fb985e745d6cad6a145.scope: Deactivated successfully. Nov 1 01:01:45.569000 audit: BPF prog-id=65 op=UNLOAD Nov 1 01:01:45.627497 env[1248]: time="2025-11-01T01:01:45.627464758Z" level=info msg="shim disconnected" id=ba6708b27e541998285dc844a6f6c977d047136bb5c05fb985e745d6cad6a145 Nov 1 01:01:45.627721 env[1248]: time="2025-11-01T01:01:45.627710419Z" level=warning msg="cleaning up after shim disconnected" id=ba6708b27e541998285dc844a6f6c977d047136bb5c05fb985e745d6cad6a145 namespace=k8s.io Nov 1 01:01:45.627828 env[1248]: time="2025-11-01T01:01:45.627817769Z" level=info msg="cleaning up dead shim" Nov 1 01:01:45.632414 env[1248]: time="2025-11-01T01:01:45.632390085Z" level=warning msg="cleanup warnings time=\"2025-11-01T01:01:45Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1789 runtime=io.containerd.runc.v2\n" Nov 1 01:01:45.710139 kubelet[1607]: E1101 01:01:45.710063 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:46.609372 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2107140494.mount: Deactivated successfully. Nov 1 01:01:46.710177 kubelet[1607]: E1101 01:01:46.710131 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:46.844643 kubelet[1607]: E1101 01:01:46.843724 1607 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bdrsw" podUID="7d1a2b41-a133-4dae-a058-ec3e3e4b4338" Nov 1 01:01:47.161031 env[1248]: time="2025-11-01T01:01:47.160996936Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:47.173771 env[1248]: time="2025-11-01T01:01:47.173727658Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:47.181254 env[1248]: time="2025-11-01T01:01:47.181215609Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:47.189440 env[1248]: time="2025-11-01T01:01:47.189411743Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:886af02535dc34886e4618b902f8c140d89af57233a245621d29642224516064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:47.190050 env[1248]: time="2025-11-01T01:01:47.190030577Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\" returns image reference \"sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f\"" Nov 1 01:01:47.191733 env[1248]: time="2025-11-01T01:01:47.191714585Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Nov 1 01:01:47.192477 env[1248]: time="2025-11-01T01:01:47.192457650Z" level=info msg="CreateContainer within sandbox \"952bea5ae3133947fd50fd2b7f71b14c698008831080117fceabe554ce25c61b\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Nov 1 01:01:47.238655 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount386117596.mount: Deactivated successfully. Nov 1 01:01:47.242625 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount200642136.mount: Deactivated successfully. Nov 1 01:01:47.270751 env[1248]: time="2025-11-01T01:01:47.270713723Z" level=info msg="CreateContainer within sandbox \"952bea5ae3133947fd50fd2b7f71b14c698008831080117fceabe554ce25c61b\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d737b5a9a71389cea3d768f6ecc45ae2a1e7b3876d9b1cfa18ac7991f46a9933\"" Nov 1 01:01:47.271301 env[1248]: time="2025-11-01T01:01:47.271258260Z" level=info msg="StartContainer for \"d737b5a9a71389cea3d768f6ecc45ae2a1e7b3876d9b1cfa18ac7991f46a9933\"" Nov 1 01:01:47.287745 systemd[1]: Started cri-containerd-d737b5a9a71389cea3d768f6ecc45ae2a1e7b3876d9b1cfa18ac7991f46a9933.scope. Nov 1 01:01:47.298000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.298000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f5b2bb2a468 items=0 ppid=1677 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437333762356139613731333839636561336437363866366563633435 Nov 1 01:01:47.299000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.299000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.299000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.299000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.299000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.299000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.299000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.299000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.299000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.299000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.299000 audit: BPF prog-id=66 op=LOAD Nov 1 01:01:47.299000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000341f08 items=0 ppid=1677 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437333762356139613731333839636561336437363866366563633435 Nov 1 01:01:47.299000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.299000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.299000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.299000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.299000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.299000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.299000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.299000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.299000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.299000 audit: BPF prog-id=67 op=LOAD Nov 1 01:01:47.299000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000341f58 items=0 ppid=1677 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437333762356139613731333839636561336437363866366563633435 Nov 1 01:01:47.300000 audit: BPF prog-id=67 op=UNLOAD Nov 1 01:01:47.300000 audit: BPF prog-id=66 op=UNLOAD Nov 1 01:01:47.300000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.300000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.300000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.300000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.300000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.300000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.300000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.300000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.300000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.300000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:47.300000 audit: BPF prog-id=68 op=LOAD Nov 1 01:01:47.300000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000341fe8 items=0 ppid=1677 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437333762356139613731333839636561336437363866366563633435 Nov 1 01:01:47.315518 env[1248]: time="2025-11-01T01:01:47.315488881Z" level=info msg="StartContainer for \"d737b5a9a71389cea3d768f6ecc45ae2a1e7b3876d9b1cfa18ac7991f46a9933\" returns successfully" Nov 1 01:01:47.393000 audit[1872]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1872 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.393000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff8db7980 a2=0 a3=7ffff8db796c items=0 ppid=1825 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.393000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Nov 1 01:01:47.394000 audit[1873]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1873 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.394000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe528c5410 a2=0 a3=7ffe528c53fc items=0 ppid=1825 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.394000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Nov 1 01:01:47.394000 audit[1874]: NETFILTER_CFG table=mangle:16 family=10 entries=1 op=nft_register_chain pid=1874 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.394000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd85ee7160 a2=0 a3=7ffd85ee714c items=0 ppid=1825 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.394000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Nov 1 01:01:47.394000 audit[1875]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1875 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.394000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffffe3da620 a2=0 a3=7ffffe3da60c items=0 ppid=1825 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.394000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Nov 1 01:01:47.397000 audit[1876]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.397000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8f869ec0 a2=0 a3=7fff8f869eac items=0 ppid=1825 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.397000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Nov 1 01:01:47.398000 audit[1878]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1878 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.398000 audit[1878]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee1d74ee0 a2=0 a3=7ffee1d74ecc items=0 ppid=1825 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Nov 1 01:01:47.496000 audit[1879]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.496000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc49539d10 a2=0 a3=7ffc49539cfc items=0 ppid=1825 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.496000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Nov 1 01:01:47.499000 audit[1881]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.499000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcd0aaf190 a2=0 a3=7ffcd0aaf17c items=0 ppid=1825 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.499000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Nov 1 01:01:47.502000 audit[1884]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1884 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.502000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcde87df30 a2=0 a3=7ffcde87df1c items=0 ppid=1825 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.502000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Nov 1 01:01:47.502000 audit[1885]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.502000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffab1fad0 a2=0 a3=7ffffab1fabc items=0 ppid=1825 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.502000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Nov 1 01:01:47.504000 audit[1887]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1887 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.504000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc28f36a60 a2=0 a3=7ffc28f36a4c items=0 ppid=1825 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.504000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Nov 1 01:01:47.505000 audit[1888]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1888 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.505000 audit[1888]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc144ae7c0 a2=0 a3=7ffc144ae7ac items=0 ppid=1825 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.505000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Nov 1 01:01:47.507000 audit[1890]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1890 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.507000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd2b4795a0 a2=0 a3=7ffd2b47958c items=0 ppid=1825 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.507000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Nov 1 01:01:47.509000 audit[1893]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1893 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.509000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc96d189d0 a2=0 a3=7ffc96d189bc items=0 ppid=1825 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.509000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Nov 1 01:01:47.510000 audit[1894]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1894 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.510000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9c983e20 a2=0 a3=7ffc9c983e0c items=0 ppid=1825 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.510000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Nov 1 01:01:47.512000 audit[1896]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1896 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.512000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcb4245fd0 a2=0 a3=7ffcb4245fbc items=0 ppid=1825 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.512000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Nov 1 01:01:47.513000 audit[1897]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1897 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.513000 audit[1897]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc26f6e910 a2=0 a3=7ffc26f6e8fc items=0 ppid=1825 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.513000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Nov 1 01:01:47.514000 audit[1899]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1899 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.514000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd35bcde70 a2=0 a3=7ffd35bcde5c items=0 ppid=1825 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.514000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 01:01:47.516000 audit[1902]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1902 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.516000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffcf192d60 a2=0 a3=7fffcf192d4c items=0 ppid=1825 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.516000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 01:01:47.519000 audit[1905]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.519000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc4d9b9b50 a2=0 a3=7ffc4d9b9b3c items=0 ppid=1825 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.519000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Nov 1 01:01:47.519000 audit[1906]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.519000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd87734d20 a2=0 a3=7ffd87734d0c items=0 ppid=1825 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.519000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Nov 1 01:01:47.521000 audit[1908]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1908 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.521000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffda0b42a90 a2=0 a3=7ffda0b42a7c items=0 ppid=1825 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.521000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 01:01:47.539000 audit[1912]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1912 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.539000 audit[1912]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc656a34f0 a2=0 a3=7ffc656a34dc items=0 ppid=1825 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.539000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 01:01:47.540000 audit[1913]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1913 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.540000 audit[1913]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5bb23d50 a2=0 a3=7fff5bb23d3c items=0 ppid=1825 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.540000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Nov 1 01:01:47.541000 audit[1915]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 01:01:47.541000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffce8474b70 a2=0 a3=7ffce8474b5c items=0 ppid=1825 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.541000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Nov 1 01:01:47.559000 audit[1921]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 01:01:47.559000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe69708030 a2=0 a3=7ffe6970801c items=0 ppid=1825 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.559000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 01:01:47.577000 audit[1921]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 01:01:47.577000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7ffe69708030 a2=0 a3=7ffe6970801c items=0 ppid=1825 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.577000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 01:01:47.585000 audit[1930]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1930 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.585000 audit[1930]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc5421d390 a2=0 a3=7ffc5421d37c items=0 ppid=1825 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.585000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Nov 1 01:01:47.587000 audit[1932]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1932 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.587000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff4a5a0e60 a2=0 a3=7fff4a5a0e4c items=0 ppid=1825 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.587000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Nov 1 01:01:47.589000 audit[1935]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1935 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.589000 audit[1935]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc11c8bca0 a2=0 a3=7ffc11c8bc8c items=0 ppid=1825 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.589000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Nov 1 01:01:47.589000 audit[1936]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1936 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.589000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4eec9370 a2=0 a3=7ffe4eec935c items=0 ppid=1825 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.589000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Nov 1 01:01:47.591000 audit[1938]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1938 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.591000 audit[1938]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe281f8c50 a2=0 a3=7ffe281f8c3c items=0 ppid=1825 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.591000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Nov 1 01:01:47.591000 audit[1939]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1939 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.591000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6bf24560 a2=0 a3=7ffe6bf2454c items=0 ppid=1825 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.591000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Nov 1 01:01:47.593000 audit[1941]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1941 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.593000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc87bcd0d0 a2=0 a3=7ffc87bcd0bc items=0 ppid=1825 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.593000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Nov 1 01:01:47.595000 audit[1944]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1944 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.595000 audit[1944]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc998e8400 a2=0 a3=7ffc998e83ec items=0 ppid=1825 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.595000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Nov 1 01:01:47.596000 audit[1945]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1945 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.596000 audit[1945]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7e135120 a2=0 a3=7ffc7e13510c items=0 ppid=1825 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.596000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Nov 1 01:01:47.597000 audit[1947]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1947 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.597000 audit[1947]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdb31ec570 a2=0 a3=7ffdb31ec55c items=0 ppid=1825 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.597000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Nov 1 01:01:47.598000 audit[1948]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1948 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.598000 audit[1948]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8e6b0020 a2=0 a3=7ffc8e6b000c items=0 ppid=1825 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.598000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Nov 1 01:01:47.599000 audit[1950]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1950 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.599000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe5d8d48d0 a2=0 a3=7ffe5d8d48bc items=0 ppid=1825 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.599000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 01:01:47.602000 audit[1953]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1953 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.602000 audit[1953]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe0603c280 a2=0 a3=7ffe0603c26c items=0 ppid=1825 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.602000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Nov 1 01:01:47.604000 audit[1956]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1956 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.604000 audit[1956]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc10635950 a2=0 a3=7ffc1063593c items=0 ppid=1825 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.604000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Nov 1 01:01:47.604000 audit[1957]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1957 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.604000 audit[1957]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff0d0d3f50 a2=0 a3=7fff0d0d3f3c items=0 ppid=1825 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.604000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Nov 1 01:01:47.606000 audit[1959]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1959 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.606000 audit[1959]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdd18743d0 a2=0 a3=7ffdd18743bc items=0 ppid=1825 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.606000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 01:01:47.607000 audit[1962]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1962 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.607000 audit[1962]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffca4039060 a2=0 a3=7ffca403904c items=0 ppid=1825 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.607000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 01:01:47.608000 audit[1963]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1963 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.608000 audit[1963]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9a36dbe0 a2=0 a3=7ffc9a36dbcc items=0 ppid=1825 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.608000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Nov 1 01:01:47.609000 audit[1965]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1965 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.609000 audit[1965]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc55fad630 a2=0 a3=7ffc55fad61c items=0 ppid=1825 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.609000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Nov 1 01:01:47.610000 audit[1966]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1966 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.610000 audit[1966]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdb424c60 a2=0 a3=7ffcdb424c4c items=0 ppid=1825 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.610000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Nov 1 01:01:47.612000 audit[1968]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1968 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.612000 audit[1968]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc15958280 a2=0 a3=7ffc1595826c items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.612000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 01:01:47.613000 audit[1971]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1971 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 01:01:47.613000 audit[1971]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe72fb5d10 a2=0 a3=7ffe72fb5cfc items=0 ppid=1825 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.613000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 01:01:47.615000 audit[1973]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1973 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Nov 1 01:01:47.615000 audit[1973]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffeb88dc330 a2=0 a3=7ffeb88dc31c items=0 ppid=1825 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.615000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 01:01:47.615000 audit[1973]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1973 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Nov 1 01:01:47.615000 audit[1973]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffeb88dc330 a2=0 a3=7ffeb88dc31c items=0 ppid=1825 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:47.615000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 01:01:47.710530 kubelet[1607]: E1101 01:01:47.710483 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:48.710822 kubelet[1607]: E1101 01:01:48.710776 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:48.845252 kubelet[1607]: E1101 01:01:48.844970 1607 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bdrsw" podUID="7d1a2b41-a133-4dae-a058-ec3e3e4b4338" Nov 1 01:01:49.711591 kubelet[1607]: E1101 01:01:49.711562 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:49.816067 env[1248]: time="2025-11-01T01:01:49.816031267Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:49.817216 env[1248]: time="2025-11-01T01:01:49.817198198Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:49.819672 env[1248]: time="2025-11-01T01:01:49.819649031Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:49.820726 env[1248]: time="2025-11-01T01:01:49.820710751Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:49.820880 env[1248]: time="2025-11-01T01:01:49.820851970Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd\"" Nov 1 01:01:49.822596 env[1248]: time="2025-11-01T01:01:49.822580707Z" level=info msg="CreateContainer within sandbox \"5eed0379ee332e82b66a62a7e1ad486af6fd8b9fce714045f695213d7abbd07f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Nov 1 01:01:49.828901 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1390787722.mount: Deactivated successfully. Nov 1 01:01:49.831357 env[1248]: time="2025-11-01T01:01:49.831324179Z" level=info msg="CreateContainer within sandbox \"5eed0379ee332e82b66a62a7e1ad486af6fd8b9fce714045f695213d7abbd07f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"653bef01b1226a2813cabfc07e676a62960b901f9fa3577e92dfc12d1468faef\"" Nov 1 01:01:49.832074 env[1248]: time="2025-11-01T01:01:49.832052922Z" level=info msg="StartContainer for \"653bef01b1226a2813cabfc07e676a62960b901f9fa3577e92dfc12d1468faef\"" Nov 1 01:01:49.845030 systemd[1]: Started cri-containerd-653bef01b1226a2813cabfc07e676a62960b901f9fa3577e92dfc12d1468faef.scope. Nov 1 01:01:49.851130 systemd[1]: run-containerd-runc-k8s.io-653bef01b1226a2813cabfc07e676a62960b901f9fa3577e92dfc12d1468faef-runc.y1vTOJ.mount: Deactivated successfully. Nov 1 01:01:49.864517 kernel: kauditd_printk_skb: 344 callbacks suppressed Nov 1 01:01:49.864602 kernel: audit: type=1400 audit(1761958909.860:519): avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.860000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.868480 kernel: audit: type=1300 audit(1761958909.860:519): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f3b991a8ba8 items=0 ppid=1676 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:49.860000 audit[1982]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f3b991a8ba8 items=0 ppid=1676 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:49.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635336265663031623132323661323831336361626663303765363736 Nov 1 01:01:49.872306 kernel: audit: type=1327 audit(1761958909.860:519): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635336265663031623132323661323831336361626663303765363736 Nov 1 01:01:49.872370 kernel: audit: type=1400 audit(1761958909.867:520): avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.877499 kernel: audit: type=1400 audit(1761958909.867:520): avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.880131 kernel: audit: type=1400 audit(1761958909.867:520): avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.880215 kernel: audit: type=1400 audit(1761958909.867:520): avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.888313 kernel: audit: type=1400 audit(1761958909.867:520): avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.888389 kernel: audit: type=1400 audit(1761958909.867:520): avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit: BPF prog-id=69 op=LOAD Nov 1 01:01:49.867000 audit[1982]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000360038 items=0 ppid=1676 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:49.892327 kernel: audit: type=1400 audit(1761958909.867:520): avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635336265663031623132323661323831336361626663303765363736 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit: BPF prog-id=70 op=LOAD Nov 1 01:01:49.867000 audit[1982]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000360088 items=0 ppid=1676 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:49.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635336265663031623132323661323831336361626663303765363736 Nov 1 01:01:49.867000 audit: BPF prog-id=70 op=UNLOAD Nov 1 01:01:49.867000 audit: BPF prog-id=69 op=UNLOAD Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:49.867000 audit: BPF prog-id=71 op=LOAD Nov 1 01:01:49.867000 audit[1982]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000360118 items=0 ppid=1676 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:49.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635336265663031623132323661323831336361626663303765363736 Nov 1 01:01:49.893997 env[1248]: time="2025-11-01T01:01:49.893966011Z" level=info msg="StartContainer for \"653bef01b1226a2813cabfc07e676a62960b901f9fa3577e92dfc12d1468faef\" returns successfully" Nov 1 01:01:50.636483 env[1248]: time="2025-11-01T01:01:50.636426077Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Nov 1 01:01:50.638512 systemd[1]: cri-containerd-653bef01b1226a2813cabfc07e676a62960b901f9fa3577e92dfc12d1468faef.scope: Deactivated successfully. Nov 1 01:01:50.642000 audit: BPF prog-id=71 op=UNLOAD Nov 1 01:01:50.667115 kubelet[1607]: I1101 01:01:50.666556 1607 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Nov 1 01:01:50.711869 kubelet[1607]: E1101 01:01:50.711837 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:50.827437 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-653bef01b1226a2813cabfc07e676a62960b901f9fa3577e92dfc12d1468faef-rootfs.mount: Deactivated successfully. Nov 1 01:01:50.846487 systemd[1]: Created slice kubepods-besteffort-pod7d1a2b41_a133_4dae_a058_ec3e3e4b4338.slice. Nov 1 01:01:50.848072 env[1248]: time="2025-11-01T01:01:50.848052960Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bdrsw,Uid:7d1a2b41-a133-4dae-a058-ec3e3e4b4338,Namespace:calico-system,Attempt:0,}" Nov 1 01:01:50.894014 kubelet[1607]: I1101 01:01:50.893744 1607 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-47k9v" podStartSLOduration=6.85121328 podStartE2EDuration="9.893732895s" podCreationTimestamp="2025-11-01 01:01:41 +0000 UTC" firstStartedPulling="2025-11-01 01:01:44.14849358 +0000 UTC m=+3.866420977" lastFinishedPulling="2025-11-01 01:01:47.191013187 +0000 UTC m=+6.908940592" observedRunningTime="2025-11-01 01:01:47.864393801 +0000 UTC m=+7.582321209" watchObservedRunningTime="2025-11-01 01:01:50.893732895 +0000 UTC m=+10.611660297" Nov 1 01:01:50.944638 env[1248]: time="2025-11-01T01:01:50.944595557Z" level=error msg="Failed to destroy network for sandbox \"f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 01:01:50.945742 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882-shm.mount: Deactivated successfully. Nov 1 01:01:50.946362 env[1248]: time="2025-11-01T01:01:50.946337781Z" level=error msg="encountered an error cleaning up failed sandbox \"f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 01:01:50.946457 env[1248]: time="2025-11-01T01:01:50.946440609Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bdrsw,Uid:7d1a2b41-a133-4dae-a058-ec3e3e4b4338,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 01:01:50.946867 kubelet[1607]: E1101 01:01:50.946628 1607 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 01:01:50.946867 kubelet[1607]: E1101 01:01:50.946674 1607 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bdrsw" Nov 1 01:01:50.946867 kubelet[1607]: E1101 01:01:50.946689 1607 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bdrsw" Nov 1 01:01:50.946952 kubelet[1607]: E1101 01:01:50.946718 1607 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-bdrsw_calico-system(7d1a2b41-a133-4dae-a058-ec3e3e4b4338)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-bdrsw_calico-system(7d1a2b41-a133-4dae-a058-ec3e3e4b4338)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bdrsw" podUID="7d1a2b41-a133-4dae-a058-ec3e3e4b4338" Nov 1 01:01:51.268876 env[1248]: time="2025-11-01T01:01:51.268801481Z" level=info msg="shim disconnected" id=653bef01b1226a2813cabfc07e676a62960b901f9fa3577e92dfc12d1468faef Nov 1 01:01:51.269004 env[1248]: time="2025-11-01T01:01:51.268993102Z" level=warning msg="cleaning up after shim disconnected" id=653bef01b1226a2813cabfc07e676a62960b901f9fa3577e92dfc12d1468faef namespace=k8s.io Nov 1 01:01:51.269055 env[1248]: time="2025-11-01T01:01:51.269044750Z" level=info msg="cleaning up dead shim" Nov 1 01:01:51.274616 env[1248]: time="2025-11-01T01:01:51.274583666Z" level=warning msg="cleanup warnings time=\"2025-11-01T01:01:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2048 runtime=io.containerd.runc.v2\n" Nov 1 01:01:51.649134 update_engine[1241]: I1101 01:01:51.648711 1241 update_attempter.cc:509] Updating boot flags... Nov 1 01:01:51.712555 kubelet[1607]: E1101 01:01:51.712500 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:51.867677 env[1248]: time="2025-11-01T01:01:51.867302586Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Nov 1 01:01:51.868152 kubelet[1607]: I1101 01:01:51.868106 1607 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882" Nov 1 01:01:51.869100 env[1248]: time="2025-11-01T01:01:51.868539023Z" level=info msg="StopPodSandbox for \"f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882\"" Nov 1 01:01:51.887797 env[1248]: time="2025-11-01T01:01:51.887751395Z" level=error msg="StopPodSandbox for \"f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882\" failed" error="failed to destroy network for sandbox \"f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 01:01:51.888158 kubelet[1607]: E1101 01:01:51.888118 1607 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882" Nov 1 01:01:51.888238 kubelet[1607]: E1101 01:01:51.888189 1607 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882"} Nov 1 01:01:51.888310 kubelet[1607]: E1101 01:01:51.888253 1607 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7d1a2b41-a133-4dae-a058-ec3e3e4b4338\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 01:01:51.888373 kubelet[1607]: E1101 01:01:51.888318 1607 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7d1a2b41-a133-4dae-a058-ec3e3e4b4338\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bdrsw" podUID="7d1a2b41-a133-4dae-a058-ec3e3e4b4338" Nov 1 01:01:52.713365 kubelet[1607]: E1101 01:01:52.713312 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:53.713713 kubelet[1607]: E1101 01:01:53.713671 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:54.714382 kubelet[1607]: E1101 01:01:54.714344 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:55.714572 kubelet[1607]: E1101 01:01:55.714535 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:56.715045 kubelet[1607]: E1101 01:01:56.714988 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:57.130415 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2987481424.mount: Deactivated successfully. Nov 1 01:01:57.149813 env[1248]: time="2025-11-01T01:01:57.149762563Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:57.152197 env[1248]: time="2025-11-01T01:01:57.152156184Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:57.153478 env[1248]: time="2025-11-01T01:01:57.153435417Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:57.154734 env[1248]: time="2025-11-01T01:01:57.154703835Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:01:57.155187 env[1248]: time="2025-11-01T01:01:57.155121503Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9\"" Nov 1 01:01:57.173075 env[1248]: time="2025-11-01T01:01:57.173034859Z" level=info msg="CreateContainer within sandbox \"5eed0379ee332e82b66a62a7e1ad486af6fd8b9fce714045f695213d7abbd07f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Nov 1 01:01:57.184926 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2525215440.mount: Deactivated successfully. Nov 1 01:01:57.188536 env[1248]: time="2025-11-01T01:01:57.188468516Z" level=info msg="CreateContainer within sandbox \"5eed0379ee332e82b66a62a7e1ad486af6fd8b9fce714045f695213d7abbd07f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"0eb736d5234d6c62114b3e863b868f944ed2ae1df0f56c14d06c7e8cfd529ac6\"" Nov 1 01:01:57.189141 env[1248]: time="2025-11-01T01:01:57.189098965Z" level=info msg="StartContainer for \"0eb736d5234d6c62114b3e863b868f944ed2ae1df0f56c14d06c7e8cfd529ac6\"" Nov 1 01:01:57.203108 systemd[1]: Started cri-containerd-0eb736d5234d6c62114b3e863b868f944ed2ae1df0f56c14d06c7e8cfd529ac6.scope. Nov 1 01:01:57.231311 kernel: kauditd_printk_skb: 34 callbacks suppressed Nov 1 01:01:57.231399 kernel: audit: type=1400 audit(1761958917.226:526): avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.226000 audit[2102]: AVC avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.226000 audit[2102]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7fc537c16858 items=0 ppid=1676 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:57.238873 kernel: audit: type=1300 audit(1761958917.226:526): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7fc537c16858 items=0 ppid=1676 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:57.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065623733366435323334643663363231313462336538363362383638 Nov 1 01:01:57.226000 audit[2102]: AVC avc: denied { bpf } for pid=2102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.248062 kernel: audit: type=1327 audit(1761958917.226:526): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065623733366435323334643663363231313462336538363362383638 Nov 1 01:01:57.248139 kernel: audit: type=1400 audit(1761958917.226:527): avc: denied { bpf } for pid=2102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.226000 audit[2102]: AVC avc: denied { bpf } for pid=2102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.250947 kernel: audit: type=1400 audit(1761958917.226:527): avc: denied { bpf } for pid=2102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.251086 kernel: audit: type=1400 audit(1761958917.226:527): avc: denied { bpf } for pid=2102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.226000 audit[2102]: AVC avc: denied { bpf } for pid=2102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.226000 audit[2102]: AVC avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.226000 audit[2102]: AVC avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.260655 kernel: audit: type=1400 audit(1761958917.226:527): avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.260726 kernel: audit: type=1400 audit(1761958917.226:527): avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.263171 env[1248]: time="2025-11-01T01:01:57.263136594Z" level=info msg="StartContainer for \"0eb736d5234d6c62114b3e863b868f944ed2ae1df0f56c14d06c7e8cfd529ac6\" returns successfully" Nov 1 01:01:57.226000 audit[2102]: AVC avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.226000 audit[2102]: AVC avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.269167 kernel: audit: type=1400 audit(1761958917.226:527): avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.269331 kernel: audit: type=1400 audit(1761958917.226:527): avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.226000 audit[2102]: AVC avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.226000 audit[2102]: AVC avc: denied { bpf } for pid=2102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.226000 audit[2102]: AVC avc: denied { bpf } for pid=2102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.226000 audit: BPF prog-id=72 op=LOAD Nov 1 01:01:57.226000 audit[2102]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000335bd8 items=0 ppid=1676 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:57.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065623733366435323334643663363231313462336538363362383638 Nov 1 01:01:57.227000 audit[2102]: AVC avc: denied { bpf } for pid=2102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.227000 audit[2102]: AVC avc: denied { bpf } for pid=2102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.227000 audit[2102]: AVC avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.227000 audit[2102]: AVC avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.227000 audit[2102]: AVC avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.227000 audit[2102]: AVC avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.227000 audit[2102]: AVC avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.227000 audit[2102]: AVC avc: denied { bpf } for pid=2102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.227000 audit[2102]: AVC avc: denied { bpf } for pid=2102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.227000 audit: BPF prog-id=73 op=LOAD Nov 1 01:01:57.227000 audit[2102]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000335c28 items=0 ppid=1676 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:57.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065623733366435323334643663363231313462336538363362383638 Nov 1 01:01:57.227000 audit: BPF prog-id=73 op=UNLOAD Nov 1 01:01:57.227000 audit: BPF prog-id=72 op=UNLOAD Nov 1 01:01:57.227000 audit[2102]: AVC avc: denied { bpf } for pid=2102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.227000 audit[2102]: AVC avc: denied { bpf } for pid=2102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.227000 audit[2102]: AVC avc: denied { bpf } for pid=2102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.227000 audit[2102]: AVC avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.227000 audit[2102]: AVC avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.227000 audit[2102]: AVC avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.227000 audit[2102]: AVC avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.227000 audit[2102]: AVC avc: denied { perfmon } for pid=2102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.227000 audit[2102]: AVC avc: denied { bpf } for pid=2102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.227000 audit[2102]: AVC avc: denied { bpf } for pid=2102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:57.227000 audit: BPF prog-id=74 op=LOAD Nov 1 01:01:57.227000 audit[2102]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c000335cb8 items=0 ppid=1676 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:57.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065623733366435323334643663363231313462336538363362383638 Nov 1 01:01:57.419360 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Nov 1 01:01:57.419473 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Nov 1 01:01:57.715565 kubelet[1607]: E1101 01:01:57.715488 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:57.991969 kubelet[1607]: I1101 01:01:57.991857 1607 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-xbd5c" podStartSLOduration=4.963818727 podStartE2EDuration="17.991841537s" podCreationTimestamp="2025-11-01 01:01:40 +0000 UTC" firstStartedPulling="2025-11-01 01:01:44.127960654 +0000 UTC m=+3.845888053" lastFinishedPulling="2025-11-01 01:01:57.155983457 +0000 UTC m=+16.873910863" observedRunningTime="2025-11-01 01:01:57.892185147 +0000 UTC m=+17.610112548" watchObservedRunningTime="2025-11-01 01:01:57.991841537 +0000 UTC m=+17.709768938" Nov 1 01:01:57.995678 systemd[1]: Created slice kubepods-besteffort-podd65d8ce9_ba98_4c9b_b729_bb9be584abbb.slice. Nov 1 01:01:58.048708 kubelet[1607]: I1101 01:01:58.048676 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-22s2w\" (UniqueName: \"kubernetes.io/projected/d65d8ce9-ba98-4c9b-b729-bb9be584abbb-kube-api-access-22s2w\") pod \"nginx-deployment-7fcdb87857-zl74r\" (UID: \"d65d8ce9-ba98-4c9b-b729-bb9be584abbb\") " pod="default/nginx-deployment-7fcdb87857-zl74r" Nov 1 01:01:58.299178 env[1248]: time="2025-11-01T01:01:58.299151088Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-zl74r,Uid:d65d8ce9-ba98-4c9b-b729-bb9be584abbb,Namespace:default,Attempt:0,}" Nov 1 01:01:58.716163 kubelet[1607]: E1101 01:01:58.716092 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:58.743000 audit[2255]: AVC avc: denied { write } for pid=2255 comm="tee" name="fd" dev="proc" ino=30081 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 01:01:58.743000 audit[2255]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff6d1da7d6 a2=241 a3=1b6 items=1 ppid=2210 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:58.743000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Nov 1 01:01:58.743000 audit: PATH item=0 name="/dev/fd/63" inode=30072 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 01:01:58.743000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 01:01:58.745000 audit[2263]: AVC avc: denied { write } for pid=2263 comm="tee" name="fd" dev="proc" ino=30085 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 01:01:58.746000 audit[2265]: AVC avc: denied { write } for pid=2265 comm="tee" name="fd" dev="proc" ino=30088 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 01:01:58.747000 audit[2243]: AVC avc: denied { write } for pid=2243 comm="tee" name="fd" dev="proc" ino=30883 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 01:01:58.747000 audit[2243]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe07ea37e6 a2=241 a3=1b6 items=1 ppid=2207 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:58.746000 audit[2265]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff7eca67e5 a2=241 a3=1b6 items=1 ppid=2211 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:58.746000 audit: CWD cwd="/etc/service/enabled/felix/log" Nov 1 01:01:58.746000 audit: PATH item=0 name="/dev/fd/63" inode=30078 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 01:01:58.746000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 01:01:58.745000 audit[2263]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3d6d57e5 a2=241 a3=1b6 items=1 ppid=2208 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:58.745000 audit: CWD cwd="/etc/service/enabled/bird6/log" Nov 1 01:01:58.745000 audit: PATH item=0 name="/dev/fd/63" inode=30077 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 01:01:58.745000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 01:01:58.757000 audit[2267]: AVC avc: denied { write } for pid=2267 comm="tee" name="fd" dev="proc" ino=30893 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 01:01:58.757000 audit[2267]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd805df7e7 a2=241 a3=1b6 items=1 ppid=2205 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:58.757000 audit: CWD cwd="/etc/service/enabled/cni/log" Nov 1 01:01:58.757000 audit: PATH item=0 name="/dev/fd/63" inode=30880 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 01:01:58.747000 audit: CWD cwd="/etc/service/enabled/bird/log" Nov 1 01:01:58.747000 audit: PATH item=0 name="/dev/fd/63" inode=30069 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 01:01:58.747000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 01:01:58.757000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 01:01:58.759000 audit[2277]: AVC avc: denied { write } for pid=2277 comm="tee" name="fd" dev="proc" ino=30897 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 01:01:58.759000 audit[2277]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec407d7d5 a2=241 a3=1b6 items=1 ppid=2203 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:58.759000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Nov 1 01:01:58.759000 audit: PATH item=0 name="/dev/fd/63" inode=30890 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 01:01:58.761000 audit[2274]: AVC avc: denied { write } for pid=2274 comm="tee" name="fd" dev="proc" ino=30901 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 01:01:58.761000 audit[2274]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff59df77e5 a2=241 a3=1b6 items=1 ppid=2212 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:58.761000 audit: CWD cwd="/etc/service/enabled/confd/log" Nov 1 01:01:58.761000 audit: PATH item=0 name="/dev/fd/63" inode=30887 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 01:01:58.761000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 01:01:58.759000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 01:01:58.936000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.936000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.936000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.936000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.936000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.936000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.936000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.936000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.936000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.936000 audit: BPF prog-id=75 op=LOAD Nov 1 01:01:58.936000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb3ac66f0 a2=98 a3=1fffffffffffffff items=0 ppid=2218 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:58.936000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 01:01:58.936000 audit: BPF prog-id=75 op=UNLOAD Nov 1 01:01:58.936000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.936000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.936000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.936000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.936000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.936000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.936000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.936000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.936000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.936000 audit: BPF prog-id=76 op=LOAD Nov 1 01:01:58.936000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb3ac65d0 a2=94 a3=3 items=0 ppid=2218 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:58.936000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 01:01:58.937000 audit: BPF prog-id=76 op=UNLOAD Nov 1 01:01:58.937000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.937000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.937000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.937000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.937000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.937000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.937000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.937000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.937000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.937000 audit: BPF prog-id=77 op=LOAD Nov 1 01:01:58.937000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb3ac6610 a2=94 a3=7ffeb3ac67f0 items=0 ppid=2218 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:58.937000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 01:01:58.937000 audit: BPF prog-id=77 op=UNLOAD Nov 1 01:01:58.937000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.937000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffeb3ac66e0 a2=50 a3=a000000085 items=0 ppid=2218 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:58.937000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 01:01:58.938000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.938000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.938000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.938000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.938000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.938000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.938000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.938000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.938000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.938000 audit: BPF prog-id=78 op=LOAD Nov 1 01:01:58.938000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdc61d86b0 a2=98 a3=3 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:58.938000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:58.940000 audit: BPF prog-id=78 op=UNLOAD Nov 1 01:01:58.940000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.940000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.940000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.940000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.940000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.940000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.940000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.940000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.940000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.940000 audit: BPF prog-id=79 op=LOAD Nov 1 01:01:58.940000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdc61d84a0 a2=94 a3=54428f items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:58.940000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:58.940000 audit: BPF prog-id=79 op=UNLOAD Nov 1 01:01:58.940000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.940000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.940000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.940000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.940000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.940000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.940000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.940000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.940000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:58.940000 audit: BPF prog-id=80 op=LOAD Nov 1 01:01:58.940000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdc61d84d0 a2=94 a3=2 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:58.940000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:58.940000 audit: BPF prog-id=80 op=UNLOAD Nov 1 01:01:59.016000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.016000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.016000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.016000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.016000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.016000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.016000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.016000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.016000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.016000 audit: BPF prog-id=81 op=LOAD Nov 1 01:01:59.016000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdc61d8390 a2=94 a3=1 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.016000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.016000 audit: BPF prog-id=81 op=UNLOAD Nov 1 01:01:59.016000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.016000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdc61d8460 a2=50 a3=7ffdc61d8540 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.016000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdc61d83a0 a2=28 a3=0 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.024000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdc61d83d0 a2=28 a3=0 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.024000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdc61d82e0 a2=28 a3=0 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.024000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdc61d83f0 a2=28 a3=0 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.024000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdc61d83d0 a2=28 a3=0 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.024000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdc61d83c0 a2=28 a3=0 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.024000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdc61d83f0 a2=28 a3=0 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.024000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdc61d83d0 a2=28 a3=0 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.024000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdc61d83f0 a2=28 a3=0 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.024000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdc61d83c0 a2=28 a3=0 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.024000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdc61d8430 a2=28 a3=0 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.024000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdc61d81e0 a2=50 a3=1 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.024000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit: BPF prog-id=82 op=LOAD Nov 1 01:01:59.024000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdc61d81e0 a2=94 a3=5 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.024000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.024000 audit: BPF prog-id=82 op=UNLOAD Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdc61d8290 a2=50 a3=1 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.024000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdc61d83b0 a2=4 a3=38 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.024000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { confidentiality } for pid=2315 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:01:59.024000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdc61d8400 a2=94 a3=6 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.024000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { confidentiality } for pid=2315 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:01:59.024000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdc61d7bb0 a2=94 a3=88 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.024000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.024000 audit[2315]: AVC avc: denied { confidentiality } for pid=2315 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:01:59.024000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdc61d7bb0 a2=94 a3=88 items=0 ppid=2218 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.024000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit: BPF prog-id=83 op=LOAD Nov 1 01:01:59.029000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd0cc5490 a2=98 a3=1999999999999999 items=0 ppid=2218 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.029000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 01:01:59.029000 audit: BPF prog-id=83 op=UNLOAD Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit: BPF prog-id=84 op=LOAD Nov 1 01:01:59.029000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd0cc5370 a2=94 a3=ffff items=0 ppid=2218 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.029000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 01:01:59.029000 audit: BPF prog-id=84 op=UNLOAD Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.029000 audit: BPF prog-id=85 op=LOAD Nov 1 01:01:59.029000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd0cc53b0 a2=94 a3=7fffd0cc5590 items=0 ppid=2218 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.029000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 01:01:59.029000 audit: BPF prog-id=85 op=UNLOAD Nov 1 01:01:59.131389 systemd[1]: run-containerd-runc-k8s.io-0eb736d5234d6c62114b3e863b868f944ed2ae1df0f56c14d06c7e8cfd529ac6-runc.XHKaMV.mount: Deactivated successfully. Nov 1 01:01:59.287657 systemd-networkd[1066]: vxlan.calico: Link UP Nov 1 01:01:59.287663 systemd-networkd[1066]: vxlan.calico: Gained carrier Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit: BPF prog-id=86 op=LOAD Nov 1 01:01:59.347000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd95f9f700 a2=98 a3=0 items=0 ppid=2218 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 01:01:59.347000 audit: BPF prog-id=86 op=UNLOAD Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit: BPF prog-id=87 op=LOAD Nov 1 01:01:59.347000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd95f9f510 a2=94 a3=54428f items=0 ppid=2218 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 01:01:59.347000 audit: BPF prog-id=87 op=UNLOAD Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit: BPF prog-id=88 op=LOAD Nov 1 01:01:59.347000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd95f9f540 a2=94 a3=2 items=0 ppid=2218 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 01:01:59.347000 audit: BPF prog-id=88 op=UNLOAD Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd95f9f410 a2=28 a3=0 items=0 ppid=2218 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd95f9f440 a2=28 a3=0 items=0 ppid=2218 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd95f9f350 a2=28 a3=0 items=0 ppid=2218 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd95f9f460 a2=28 a3=0 items=0 ppid=2218 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd95f9f440 a2=28 a3=0 items=0 ppid=2218 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd95f9f430 a2=28 a3=0 items=0 ppid=2218 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd95f9f460 a2=28 a3=0 items=0 ppid=2218 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd95f9f440 a2=28 a3=0 items=0 ppid=2218 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd95f9f460 a2=28 a3=0 items=0 ppid=2218 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd95f9f430 a2=28 a3=0 items=0 ppid=2218 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd95f9f4a0 a2=28 a3=0 items=0 ppid=2218 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.347000 audit: BPF prog-id=89 op=LOAD Nov 1 01:01:59.347000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd95f9f310 a2=94 a3=0 items=0 ppid=2218 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 01:01:59.347000 audit: BPF prog-id=89 op=UNLOAD Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd95f9f300 a2=50 a3=2800 items=0 ppid=2218 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd95f9f300 a2=50 a3=2800 items=0 ppid=2218 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit: BPF prog-id=90 op=LOAD Nov 1 01:01:59.348000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd95f9eb20 a2=94 a3=2 items=0 ppid=2218 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 01:01:59.348000 audit: BPF prog-id=90 op=UNLOAD Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.348000 audit: BPF prog-id=91 op=LOAD Nov 1 01:01:59.348000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd95f9ec20 a2=94 a3=30 items=0 ppid=2218 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit: BPF prog-id=92 op=LOAD Nov 1 01:01:59.351000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc71c930c0 a2=98 a3=0 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.351000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.351000 audit: BPF prog-id=92 op=UNLOAD Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit: BPF prog-id=93 op=LOAD Nov 1 01:01:59.351000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc71c92eb0 a2=94 a3=54428f items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.351000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.351000 audit: BPF prog-id=93 op=UNLOAD Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.351000 audit: BPF prog-id=94 op=LOAD Nov 1 01:01:59.351000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc71c92ee0 a2=94 a3=2 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.351000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.351000 audit: BPF prog-id=94 op=UNLOAD Nov 1 01:01:59.440000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.440000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.440000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.440000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.440000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.440000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.440000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.440000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.440000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.440000 audit: BPF prog-id=95 op=LOAD Nov 1 01:01:59.440000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc71c92da0 a2=94 a3=1 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.440000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.440000 audit: BPF prog-id=95 op=UNLOAD Nov 1 01:01:59.440000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.440000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc71c92e70 a2=50 a3=7ffc71c92f50 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.440000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.448000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.448000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc71c92db0 a2=28 a3=0 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.448000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.448000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc71c92de0 a2=28 a3=0 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.448000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.448000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc71c92cf0 a2=28 a3=0 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.448000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.448000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc71c92e00 a2=28 a3=0 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.448000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.448000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc71c92de0 a2=28 a3=0 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.448000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.448000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc71c92dd0 a2=28 a3=0 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.448000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.448000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc71c92e00 a2=28 a3=0 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.448000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.448000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc71c92de0 a2=28 a3=0 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.448000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.448000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc71c92e00 a2=28 a3=0 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.448000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.448000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc71c92dd0 a2=28 a3=0 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.448000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.448000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc71c92e40 a2=28 a3=0 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.448000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.448000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc71c92bf0 a2=50 a3=1 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit: BPF prog-id=96 op=LOAD Nov 1 01:01:59.449000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc71c92bf0 a2=94 a3=5 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.449000 audit: BPF prog-id=96 op=UNLOAD Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc71c92ca0 a2=50 a3=1 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc71c92dc0 a2=4 a3=38 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { confidentiality } for pid=2374 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:01:59.449000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc71c92e10 a2=94 a3=6 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { confidentiality } for pid=2374 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:01:59.449000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc71c925c0 a2=94 a3=88 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { confidentiality } for pid=2374 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:01:59.449000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc71c925c0 a2=94 a3=88 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc71c93ff0 a2=10 a3=f8f00800 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc71c93e90 a2=10 a3=3 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc71c93e30 a2=10 a3=3 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.449000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.449000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc71c93e30 a2=10 a3=7 items=0 ppid=2218 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 01:01:59.455000 audit: BPF prog-id=91 op=UNLOAD Nov 1 01:01:59.527000 audit[2407]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2407 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 01:01:59.527000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffdd1a48a0 a2=0 a3=7fffdd1a488c items=0 ppid=2218 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.527000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 01:01:59.535000 audit[2408]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2408 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 01:01:59.535000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe4976ec50 a2=0 a3=7ffe4976ec3c items=0 ppid=2218 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.535000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 01:01:59.538000 audit[2413]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2413 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 01:01:59.538000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd342070d0 a2=0 a3=7ffd342070bc items=0 ppid=2218 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.538000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 01:01:59.547000 audit[2406]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2406 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 01:01:59.547000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd557a4db0 a2=0 a3=7ffd557a4d9c items=0 ppid=2218 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.547000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 01:01:59.716196 kubelet[1607]: E1101 01:01:59.716161 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:01:59.882181 systemd-networkd[1066]: cali962bb08e50b: Link UP Nov 1 01:01:59.884015 systemd-networkd[1066]: cali962bb08e50b: Gained carrier Nov 1 01:01:59.884310 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali962bb08e50b: link becomes ready Nov 1 01:01:59.890952 systemd[1]: run-containerd-runc-k8s.io-0eb736d5234d6c62114b3e863b868f944ed2ae1df0f56c14d06c7e8cfd529ac6-runc.QkV2ZC.mount: Deactivated successfully. Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:58.526 [INFO][2185] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:59.155 [INFO][2185] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.139-k8s-nginx--deployment--7fcdb87857--zl74r-eth0 nginx-deployment-7fcdb87857- default d65d8ce9-ba98-4c9b-b729-bb9be584abbb 1355 0 2025-11-01 01:01:57 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.139 nginx-deployment-7fcdb87857-zl74r eth0 default [] [] [kns.default ksa.default.default] cali962bb08e50b [] [] }} ContainerID="23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e" Namespace="default" Pod="nginx-deployment-7fcdb87857-zl74r" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--7fcdb87857--zl74r-" Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:59.156 [INFO][2185] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e" Namespace="default" Pod="nginx-deployment-7fcdb87857-zl74r" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--7fcdb87857--zl74r-eth0" Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:59.781 [INFO][2333] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e" HandleID="k8s-pod-network.23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e" Workload="10.67.124.139-k8s-nginx--deployment--7fcdb87857--zl74r-eth0" Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:59.783 [INFO][2333] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e" HandleID="k8s-pod-network.23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e" Workload="10.67.124.139-k8s-nginx--deployment--7fcdb87857--zl74r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004e2f0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.139", "pod":"nginx-deployment-7fcdb87857-zl74r", "timestamp":"2025-11-01 01:01:59.781893555 +0000 UTC"}, Hostname:"10.67.124.139", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:59.783 [INFO][2333] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:59.784 [INFO][2333] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:59.784 [INFO][2333] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.139' Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:59.805 [INFO][2333] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e" host="10.67.124.139" Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:59.816 [INFO][2333] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.139" Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:59.819 [INFO][2333] ipam/ipam.go 511: Trying affinity for 192.168.110.0/26 host="10.67.124.139" Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:59.821 [INFO][2333] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.0/26 host="10.67.124.139" Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:59.823 [INFO][2333] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.0/26 host="10.67.124.139" Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:59.823 [INFO][2333] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.110.0/26 handle="k8s-pod-network.23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e" host="10.67.124.139" Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:59.824 [INFO][2333] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:59.828 [INFO][2333] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.110.0/26 handle="k8s-pod-network.23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e" host="10.67.124.139" Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:59.832 [INFO][2333] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.110.1/26] block=192.168.110.0/26 handle="k8s-pod-network.23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e" host="10.67.124.139" Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:59.832 [INFO][2333] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.1/26] handle="k8s-pod-network.23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e" host="10.67.124.139" Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:59.832 [INFO][2333] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 01:01:59.916743 env[1248]: 2025-11-01 01:01:59.832 [INFO][2333] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.110.1/26] IPv6=[] ContainerID="23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e" HandleID="k8s-pod-network.23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e" Workload="10.67.124.139-k8s-nginx--deployment--7fcdb87857--zl74r-eth0" Nov 1 01:01:59.917423 env[1248]: 2025-11-01 01:01:59.834 [INFO][2185] cni-plugin/k8s.go 418: Populated endpoint ContainerID="23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e" Namespace="default" Pod="nginx-deployment-7fcdb87857-zl74r" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--7fcdb87857--zl74r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-nginx--deployment--7fcdb87857--zl74r-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"d65d8ce9-ba98-4c9b-b729-bb9be584abbb", ResourceVersion:"1355", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 1, 1, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-zl74r", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali962bb08e50b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 01:01:59.917423 env[1248]: 2025-11-01 01:01:59.834 [INFO][2185] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.1/32] ContainerID="23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e" Namespace="default" Pod="nginx-deployment-7fcdb87857-zl74r" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--7fcdb87857--zl74r-eth0" Nov 1 01:01:59.917423 env[1248]: 2025-11-01 01:01:59.842 [INFO][2185] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali962bb08e50b ContainerID="23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e" Namespace="default" Pod="nginx-deployment-7fcdb87857-zl74r" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--7fcdb87857--zl74r-eth0" Nov 1 01:01:59.917423 env[1248]: 2025-11-01 01:01:59.896 [INFO][2185] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e" Namespace="default" Pod="nginx-deployment-7fcdb87857-zl74r" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--7fcdb87857--zl74r-eth0" Nov 1 01:01:59.917423 env[1248]: 2025-11-01 01:01:59.896 [INFO][2185] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e" Namespace="default" Pod="nginx-deployment-7fcdb87857-zl74r" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--7fcdb87857--zl74r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-nginx--deployment--7fcdb87857--zl74r-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"d65d8ce9-ba98-4c9b-b729-bb9be584abbb", ResourceVersion:"1355", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 1, 1, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e", Pod:"nginx-deployment-7fcdb87857-zl74r", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali962bb08e50b", MAC:"1a:bf:29:78:31:19", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 01:01:59.917423 env[1248]: 2025-11-01 01:01:59.915 [INFO][2185] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e" Namespace="default" Pod="nginx-deployment-7fcdb87857-zl74r" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--7fcdb87857--zl74r-eth0" Nov 1 01:01:59.942179 env[1248]: time="2025-11-01T01:01:59.942133582Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 01:01:59.942290 env[1248]: time="2025-11-01T01:01:59.942189174Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 01:01:59.942290 env[1248]: time="2025-11-01T01:01:59.942208045Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 01:01:59.942352 env[1248]: time="2025-11-01T01:01:59.942331210Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e pid=2461 runtime=io.containerd.runc.v2 Nov 1 01:01:59.953973 systemd[1]: Started cri-containerd-23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e.scope. Nov 1 01:01:59.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.963000 audit: BPF prog-id=97 op=LOAD Nov 1 01:01:59.964000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.964000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2461 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233616365623439373534363632363831303832333031336138363833 Nov 1 01:01:59.964000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.964000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2461 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233616365623439373534363632363831303832333031336138363833 Nov 1 01:01:59.964000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.964000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.964000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.964000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.964000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.964000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.964000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.964000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.964000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.964000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.964000 audit: BPF prog-id=98 op=LOAD Nov 1 01:01:59.964000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002cdce0 items=0 ppid=2461 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233616365623439373534363632363831303832333031336138363833 Nov 1 01:01:59.965000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.965000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.965000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.965000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.965000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.965000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.965000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.965000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.965000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.965000 audit: BPF prog-id=99 op=LOAD Nov 1 01:01:59.965000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002cdd28 items=0 ppid=2461 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233616365623439373534363632363831303832333031336138363833 Nov 1 01:01:59.965000 audit: BPF prog-id=99 op=UNLOAD Nov 1 01:01:59.965000 audit: BPF prog-id=98 op=UNLOAD Nov 1 01:01:59.965000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.965000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.965000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.965000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.965000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.965000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.965000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.965000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.965000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.965000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:01:59.965000 audit: BPF prog-id=100 op=LOAD Nov 1 01:01:59.965000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d2138 items=0 ppid=2461 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233616365623439373534363632363831303832333031336138363833 Nov 1 01:01:59.967987 systemd-resolved[1196]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Nov 1 01:01:59.948000 audit[2459]: NETFILTER_CFG table=filter:69 family=2 entries=38 op=nft_register_chain pid=2459 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 01:01:59.948000 audit[2459]: SYSCALL arch=c000003e syscall=46 success=yes exit=21324 a0=3 a1=7ffe7b6d33b0 a2=0 a3=7ffe7b6d339c items=0 ppid=2218 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:01:59.948000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 01:01:59.992337 env[1248]: time="2025-11-01T01:01:59.992311235Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-zl74r,Uid:d65d8ce9-ba98-4c9b-b729-bb9be584abbb,Namespace:default,Attempt:0,} returns sandbox id \"23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e\"" Nov 1 01:01:59.993422 env[1248]: time="2025-11-01T01:01:59.993403603Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Nov 1 01:02:00.699361 kubelet[1607]: E1101 01:02:00.699327 1607 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:00.716843 kubelet[1607]: E1101 01:02:00.716809 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:01.014431 systemd-networkd[1066]: vxlan.calico: Gained IPv6LL Nov 1 01:02:01.654442 systemd-networkd[1066]: cali962bb08e50b: Gained IPv6LL Nov 1 01:02:01.717557 kubelet[1607]: E1101 01:02:01.717529 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:02.718086 kubelet[1607]: E1101 01:02:02.718054 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:02.897209 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2457943483.mount: Deactivated successfully. Nov 1 01:02:03.718859 kubelet[1607]: E1101 01:02:03.718820 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:04.183928 env[1248]: time="2025-11-01T01:02:04.183886822Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:02:04.185104 env[1248]: time="2025-11-01T01:02:04.185073740Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:02:04.186365 env[1248]: time="2025-11-01T01:02:04.186333046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:02:04.187598 env[1248]: time="2025-11-01T01:02:04.187570620Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:02:04.188298 env[1248]: time="2025-11-01T01:02:04.188264245Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9\"" Nov 1 01:02:04.190691 env[1248]: time="2025-11-01T01:02:04.190145724Z" level=info msg="CreateContainer within sandbox \"23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Nov 1 01:02:04.201953 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2289722071.mount: Deactivated successfully. Nov 1 01:02:04.206574 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1997487804.mount: Deactivated successfully. Nov 1 01:02:04.208902 env[1248]: time="2025-11-01T01:02:04.208877312Z" level=info msg="CreateContainer within sandbox \"23aceb497546626810823013a868304e212ca3b362155e0f27db1e564f995a7e\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"dd6bbb84d61b666dd222f339ea6c3ad81e493611d94c6033df93006a660e63e7\"" Nov 1 01:02:04.209516 env[1248]: time="2025-11-01T01:02:04.209486289Z" level=info msg="StartContainer for \"dd6bbb84d61b666dd222f339ea6c3ad81e493611d94c6033df93006a660e63e7\"" Nov 1 01:02:04.222166 systemd[1]: Started cri-containerd-dd6bbb84d61b666dd222f339ea6c3ad81e493611d94c6033df93006a660e63e7.scope. Nov 1 01:02:04.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.234464 kernel: kauditd_printk_skb: 650 callbacks suppressed Nov 1 01:02:04.234506 kernel: audit: type=1400 audit(1761958924.232:660): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.239576 kernel: audit: type=1400 audit(1761958924.232:661): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.239623 kernel: audit: type=1400 audit(1761958924.236:662): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.244201 kernel: audit: type=1400 audit(1761958924.236:663): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.244240 kernel: audit: type=1400 audit(1761958924.236:664): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.246594 kernel: audit: type=1400 audit(1761958924.236:665): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.249065 kernel: audit: type=1400 audit(1761958924.236:666): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.254129 kernel: audit: type=1400 audit(1761958924.236:667): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.254163 kernel: audit: type=1400 audit(1761958924.236:668): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.256435 kernel: audit: type=1400 audit(1761958924.238:669): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.238000 audit: BPF prog-id=101 op=LOAD Nov 1 01:02:04.238000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.238000 audit[2502]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2461 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:04.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464366262623834643631623636366464323232663333396561366333 Nov 1 01:02:04.238000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.238000 audit[2502]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2461 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:04.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464366262623834643631623636366464323232663333396561366333 Nov 1 01:02:04.238000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.238000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.238000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.238000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.238000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.238000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.238000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.238000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.238000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.238000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.238000 audit: BPF prog-id=102 op=LOAD Nov 1 01:02:04.238000 audit[2502]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000210b10 items=0 ppid=2461 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:04.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464366262623834643631623636366464323232663333396561366333 Nov 1 01:02:04.240000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.240000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.240000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.240000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.240000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.240000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.240000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.240000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.240000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.240000 audit: BPF prog-id=103 op=LOAD Nov 1 01:02:04.240000 audit[2502]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000210b58 items=0 ppid=2461 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:04.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464366262623834643631623636366464323232663333396561366333 Nov 1 01:02:04.245000 audit: BPF prog-id=103 op=UNLOAD Nov 1 01:02:04.245000 audit: BPF prog-id=102 op=UNLOAD Nov 1 01:02:04.245000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.245000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.245000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.245000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.245000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.245000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.245000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.245000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.245000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.245000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:04.245000 audit: BPF prog-id=104 op=LOAD Nov 1 01:02:04.245000 audit[2502]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000210f68 items=0 ppid=2461 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:04.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464366262623834643631623636366464323232663333396561366333 Nov 1 01:02:04.269937 env[1248]: time="2025-11-01T01:02:04.269906942Z" level=info msg="StartContainer for \"dd6bbb84d61b666dd222f339ea6c3ad81e493611d94c6033df93006a660e63e7\" returns successfully" Nov 1 01:02:04.719152 kubelet[1607]: E1101 01:02:04.719125 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:04.844586 env[1248]: time="2025-11-01T01:02:04.844551698Z" level=info msg="StopPodSandbox for \"f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882\"" Nov 1 01:02:04.915174 env[1248]: 2025-11-01 01:02:04.879 [INFO][2565] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882" Nov 1 01:02:04.915174 env[1248]: 2025-11-01 01:02:04.879 [INFO][2565] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882" iface="eth0" netns="/var/run/netns/cni-a83bb10d-a6a4-5195-aa27-fea74ca52500" Nov 1 01:02:04.915174 env[1248]: 2025-11-01 01:02:04.879 [INFO][2565] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882" iface="eth0" netns="/var/run/netns/cni-a83bb10d-a6a4-5195-aa27-fea74ca52500" Nov 1 01:02:04.915174 env[1248]: 2025-11-01 01:02:04.879 [INFO][2565] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882" iface="eth0" netns="/var/run/netns/cni-a83bb10d-a6a4-5195-aa27-fea74ca52500" Nov 1 01:02:04.915174 env[1248]: 2025-11-01 01:02:04.879 [INFO][2565] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882" Nov 1 01:02:04.915174 env[1248]: 2025-11-01 01:02:04.879 [INFO][2565] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882" Nov 1 01:02:04.915174 env[1248]: 2025-11-01 01:02:04.906 [INFO][2572] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882" HandleID="k8s-pod-network.f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882" Workload="10.67.124.139-k8s-csi--node--driver--bdrsw-eth0" Nov 1 01:02:04.915174 env[1248]: 2025-11-01 01:02:04.906 [INFO][2572] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 01:02:04.915174 env[1248]: 2025-11-01 01:02:04.906 [INFO][2572] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 01:02:04.915174 env[1248]: 2025-11-01 01:02:04.911 [WARNING][2572] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882" HandleID="k8s-pod-network.f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882" Workload="10.67.124.139-k8s-csi--node--driver--bdrsw-eth0" Nov 1 01:02:04.915174 env[1248]: 2025-11-01 01:02:04.911 [INFO][2572] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882" HandleID="k8s-pod-network.f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882" Workload="10.67.124.139-k8s-csi--node--driver--bdrsw-eth0" Nov 1 01:02:04.915174 env[1248]: 2025-11-01 01:02:04.912 [INFO][2572] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 01:02:04.915174 env[1248]: 2025-11-01 01:02:04.913 [INFO][2565] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882" Nov 1 01:02:04.915739 env[1248]: time="2025-11-01T01:02:04.915717759Z" level=info msg="TearDown network for sandbox \"f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882\" successfully" Nov 1 01:02:04.915796 env[1248]: time="2025-11-01T01:02:04.915784769Z" level=info msg="StopPodSandbox for \"f9157bf38ed4b467587a382d8fee5f4ea06fac89a4071f798a1c4fcaffea2882\" returns successfully" Nov 1 01:02:04.916402 env[1248]: time="2025-11-01T01:02:04.916389423Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bdrsw,Uid:7d1a2b41-a133-4dae-a058-ec3e3e4b4338,Namespace:calico-system,Attempt:1,}" Nov 1 01:02:05.026554 systemd-networkd[1066]: cali29ecc013c95: Link UP Nov 1 01:02:05.029344 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 01:02:05.032468 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali29ecc013c95: link becomes ready Nov 1 01:02:05.032373 systemd-networkd[1066]: cali29ecc013c95: Gained carrier Nov 1 01:02:05.040821 kubelet[1607]: I1101 01:02:05.040781 1607 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-zl74r" podStartSLOduration=3.844552799 podStartE2EDuration="8.04075897s" podCreationTimestamp="2025-11-01 01:01:57 +0000 UTC" firstStartedPulling="2025-11-01 01:01:59.992981085 +0000 UTC m=+19.710908482" lastFinishedPulling="2025-11-01 01:02:04.189187253 +0000 UTC m=+23.907114653" observedRunningTime="2025-11-01 01:02:04.892923039 +0000 UTC m=+24.610850448" watchObservedRunningTime="2025-11-01 01:02:05.04075897 +0000 UTC m=+24.758686374" Nov 1 01:02:05.042326 env[1248]: 2025-11-01 01:02:04.982 [INFO][2578] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.139-k8s-csi--node--driver--bdrsw-eth0 csi-node-driver- calico-system 7d1a2b41-a133-4dae-a058-ec3e3e4b4338 1394 0 2025-11-01 01:01:40 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:857b56db8f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.67.124.139 csi-node-driver-bdrsw eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali29ecc013c95 [] [] }} ContainerID="9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444" Namespace="calico-system" Pod="csi-node-driver-bdrsw" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--bdrsw-" Nov 1 01:02:05.042326 env[1248]: 2025-11-01 01:02:04.982 [INFO][2578] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444" Namespace="calico-system" Pod="csi-node-driver-bdrsw" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--bdrsw-eth0" Nov 1 01:02:05.042326 env[1248]: 2025-11-01 01:02:05.000 [INFO][2591] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444" HandleID="k8s-pod-network.9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444" Workload="10.67.124.139-k8s-csi--node--driver--bdrsw-eth0" Nov 1 01:02:05.042326 env[1248]: 2025-11-01 01:02:05.000 [INFO][2591] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444" HandleID="k8s-pod-network.9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444" Workload="10.67.124.139-k8s-csi--node--driver--bdrsw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd200), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.124.139", "pod":"csi-node-driver-bdrsw", "timestamp":"2025-11-01 01:02:05.000070564 +0000 UTC"}, Hostname:"10.67.124.139", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 01:02:05.042326 env[1248]: 2025-11-01 01:02:05.000 [INFO][2591] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 01:02:05.042326 env[1248]: 2025-11-01 01:02:05.000 [INFO][2591] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 01:02:05.042326 env[1248]: 2025-11-01 01:02:05.000 [INFO][2591] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.139' Nov 1 01:02:05.042326 env[1248]: 2025-11-01 01:02:05.005 [INFO][2591] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444" host="10.67.124.139" Nov 1 01:02:05.042326 env[1248]: 2025-11-01 01:02:05.009 [INFO][2591] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.139" Nov 1 01:02:05.042326 env[1248]: 2025-11-01 01:02:05.012 [INFO][2591] ipam/ipam.go 511: Trying affinity for 192.168.110.0/26 host="10.67.124.139" Nov 1 01:02:05.042326 env[1248]: 2025-11-01 01:02:05.013 [INFO][2591] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.0/26 host="10.67.124.139" Nov 1 01:02:05.042326 env[1248]: 2025-11-01 01:02:05.015 [INFO][2591] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.0/26 host="10.67.124.139" Nov 1 01:02:05.042326 env[1248]: 2025-11-01 01:02:05.015 [INFO][2591] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.110.0/26 handle="k8s-pod-network.9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444" host="10.67.124.139" Nov 1 01:02:05.042326 env[1248]: 2025-11-01 01:02:05.016 [INFO][2591] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444 Nov 1 01:02:05.042326 env[1248]: 2025-11-01 01:02:05.019 [INFO][2591] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.110.0/26 handle="k8s-pod-network.9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444" host="10.67.124.139" Nov 1 01:02:05.042326 env[1248]: 2025-11-01 01:02:05.022 [INFO][2591] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.110.2/26] block=192.168.110.0/26 handle="k8s-pod-network.9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444" host="10.67.124.139" Nov 1 01:02:05.042326 env[1248]: 2025-11-01 01:02:05.022 [INFO][2591] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.2/26] handle="k8s-pod-network.9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444" host="10.67.124.139" Nov 1 01:02:05.042326 env[1248]: 2025-11-01 01:02:05.022 [INFO][2591] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 01:02:05.042326 env[1248]: 2025-11-01 01:02:05.022 [INFO][2591] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.110.2/26] IPv6=[] ContainerID="9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444" HandleID="k8s-pod-network.9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444" Workload="10.67.124.139-k8s-csi--node--driver--bdrsw-eth0" Nov 1 01:02:05.042929 env[1248]: 2025-11-01 01:02:05.023 [INFO][2578] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444" Namespace="calico-system" Pod="csi-node-driver-bdrsw" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--bdrsw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-csi--node--driver--bdrsw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7d1a2b41-a133-4dae-a058-ec3e3e4b4338", ResourceVersion:"1394", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 1, 1, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"", Pod:"csi-node-driver-bdrsw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali29ecc013c95", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 01:02:05.042929 env[1248]: 2025-11-01 01:02:05.023 [INFO][2578] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.2/32] ContainerID="9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444" Namespace="calico-system" Pod="csi-node-driver-bdrsw" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--bdrsw-eth0" Nov 1 01:02:05.042929 env[1248]: 2025-11-01 01:02:05.023 [INFO][2578] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali29ecc013c95 ContainerID="9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444" Namespace="calico-system" Pod="csi-node-driver-bdrsw" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--bdrsw-eth0" Nov 1 01:02:05.042929 env[1248]: 2025-11-01 01:02:05.033 [INFO][2578] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444" Namespace="calico-system" Pod="csi-node-driver-bdrsw" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--bdrsw-eth0" Nov 1 01:02:05.042929 env[1248]: 2025-11-01 01:02:05.034 [INFO][2578] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444" Namespace="calico-system" Pod="csi-node-driver-bdrsw" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--bdrsw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-csi--node--driver--bdrsw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7d1a2b41-a133-4dae-a058-ec3e3e4b4338", ResourceVersion:"1394", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 1, 1, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444", Pod:"csi-node-driver-bdrsw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali29ecc013c95", MAC:"ee:b1:21:84:27:77", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 01:02:05.042929 env[1248]: 2025-11-01 01:02:05.041 [INFO][2578] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444" Namespace="calico-system" Pod="csi-node-driver-bdrsw" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--bdrsw-eth0" Nov 1 01:02:05.049408 env[1248]: time="2025-11-01T01:02:05.048903482Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 01:02:05.049408 env[1248]: time="2025-11-01T01:02:05.048928168Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 01:02:05.049408 env[1248]: time="2025-11-01T01:02:05.048935091Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 01:02:05.049408 env[1248]: time="2025-11-01T01:02:05.049033918Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444 pid=2618 runtime=io.containerd.runc.v2 Nov 1 01:02:05.051000 audit[2628]: NETFILTER_CFG table=filter:70 family=2 entries=42 op=nft_register_chain pid=2628 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 01:02:05.051000 audit[2628]: SYSCALL arch=c000003e syscall=46 success=yes exit=22552 a0=3 a1=7ffe3040fa50 a2=0 a3=7ffe3040fa3c items=0 ppid=2218 pid=2628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:05.051000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 01:02:05.062436 systemd[1]: Started cri-containerd-9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444.scope. Nov 1 01:02:05.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.068000 audit: BPF prog-id=105 op=LOAD Nov 1 01:02:05.069000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.069000 audit[2629]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2618 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:05.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965326335356636666538343033346364323238323738313139636465 Nov 1 01:02:05.069000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.069000 audit[2629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2618 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:05.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965326335356636666538343033346364323238323738313139636465 Nov 1 01:02:05.069000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.069000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.069000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.069000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.069000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.069000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.069000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.069000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.069000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.069000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.069000 audit: BPF prog-id=106 op=LOAD Nov 1 01:02:05.069000 audit[2629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002209b0 items=0 ppid=2618 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:05.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965326335356636666538343033346364323238323738313139636465 Nov 1 01:02:05.070000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.070000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.070000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.070000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.070000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.070000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.070000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.070000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.070000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.070000 audit: BPF prog-id=107 op=LOAD Nov 1 01:02:05.070000 audit[2629]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002209f8 items=0 ppid=2618 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:05.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965326335356636666538343033346364323238323738313139636465 Nov 1 01:02:05.070000 audit: BPF prog-id=107 op=UNLOAD Nov 1 01:02:05.070000 audit: BPF prog-id=106 op=UNLOAD Nov 1 01:02:05.070000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.070000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.070000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.070000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.070000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.070000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.070000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.070000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.070000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.070000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:05.070000 audit: BPF prog-id=108 op=LOAD Nov 1 01:02:05.070000 audit[2629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000220e08 items=0 ppid=2618 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:05.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965326335356636666538343033346364323238323738313139636465 Nov 1 01:02:05.072621 systemd-resolved[1196]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Nov 1 01:02:05.081741 env[1248]: time="2025-11-01T01:02:05.081715576Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bdrsw,Uid:7d1a2b41-a133-4dae-a058-ec3e3e4b4338,Namespace:calico-system,Attempt:1,} returns sandbox id \"9e2c55f6fe84034cd228278119cde7ff6f5aa9cce481b423a8f4a94c061ad444\"" Nov 1 01:02:05.082957 env[1248]: time="2025-11-01T01:02:05.082927243Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 01:02:05.200380 systemd[1]: run-netns-cni\x2da83bb10d\x2da6a4\x2d5195\x2daa27\x2dfea74ca52500.mount: Deactivated successfully. Nov 1 01:02:05.421791 env[1248]: time="2025-11-01T01:02:05.421703468Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 01:02:05.422728 env[1248]: time="2025-11-01T01:02:05.422640982Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 01:02:05.424747 kubelet[1607]: E1101 01:02:05.424717 1607 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 01:02:05.424812 kubelet[1607]: E1101 01:02:05.424758 1607 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 01:02:05.424989 kubelet[1607]: E1101 01:02:05.424869 1607 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-6znxp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-bdrsw_calico-system(7d1a2b41-a133-4dae-a058-ec3e3e4b4338): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 01:02:05.426607 env[1248]: time="2025-11-01T01:02:05.426411276Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 01:02:05.719455 kubelet[1607]: E1101 01:02:05.719370 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:05.849835 env[1248]: time="2025-11-01T01:02:05.849796559Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 01:02:05.860464 env[1248]: time="2025-11-01T01:02:05.860429082Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 01:02:05.860596 kubelet[1607]: E1101 01:02:05.860560 1607 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 01:02:05.860663 kubelet[1607]: E1101 01:02:05.860602 1607 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 01:02:05.860865 kubelet[1607]: E1101 01:02:05.860684 1607 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-6znxp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-bdrsw_calico-system(7d1a2b41-a133-4dae-a058-ec3e3e4b4338): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 01:02:05.867462 kubelet[1607]: E1101 01:02:05.867419 1607 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-bdrsw" podUID="7d1a2b41-a133-4dae-a058-ec3e3e4b4338" Nov 1 01:02:05.889542 kubelet[1607]: E1101 01:02:05.889494 1607 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-bdrsw" podUID="7d1a2b41-a133-4dae-a058-ec3e3e4b4338" Nov 1 01:02:06.720464 kubelet[1607]: E1101 01:02:06.720432 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:06.892670 kubelet[1607]: E1101 01:02:06.892628 1607 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-bdrsw" podUID="7d1a2b41-a133-4dae-a058-ec3e3e4b4338" Nov 1 01:02:06.966582 systemd-networkd[1066]: cali29ecc013c95: Gained IPv6LL Nov 1 01:02:07.721089 kubelet[1607]: E1101 01:02:07.721058 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:08.722278 kubelet[1607]: E1101 01:02:08.722208 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:09.723343 kubelet[1607]: E1101 01:02:09.723310 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:10.723874 kubelet[1607]: E1101 01:02:10.723845 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:11.429000 audit[2664]: NETFILTER_CFG table=filter:71 family=2 entries=26 op=nft_register_rule pid=2664 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 01:02:11.433153 kernel: kauditd_printk_skb: 107 callbacks suppressed Nov 1 01:02:11.433201 kernel: audit: type=1325 audit(1761958931.429:697): table=filter:71 family=2 entries=26 op=nft_register_rule pid=2664 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 01:02:11.433219 kernel: audit: type=1300 audit(1761958931.429:697): arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7fff45a18cd0 a2=0 a3=7fff45a18cbc items=0 ppid=1825 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:11.429000 audit[2664]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7fff45a18cd0 a2=0 a3=7fff45a18cbc items=0 ppid=1825 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:11.429000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 01:02:11.438722 kernel: audit: type=1327 audit(1761958931.429:697): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 01:02:11.440000 audit[2664]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=2664 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 01:02:11.440000 audit[2664]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff45a18cd0 a2=0 a3=0 items=0 ppid=1825 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:11.447423 kernel: audit: type=1325 audit(1761958931.440:698): table=nat:72 family=2 entries=20 op=nft_register_rule pid=2664 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 01:02:11.447456 kernel: audit: type=1300 audit(1761958931.440:698): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff45a18cd0 a2=0 a3=0 items=0 ppid=1825 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:11.447473 kernel: audit: type=1327 audit(1761958931.440:698): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 01:02:11.440000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 01:02:11.452000 audit[2666]: NETFILTER_CFG table=filter:73 family=2 entries=38 op=nft_register_rule pid=2666 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 01:02:11.452000 audit[2666]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7fffb627c060 a2=0 a3=7fffb627c04c items=0 ppid=1825 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:11.459243 kernel: audit: type=1325 audit(1761958931.452:699): table=filter:73 family=2 entries=38 op=nft_register_rule pid=2666 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 01:02:11.459289 kernel: audit: type=1300 audit(1761958931.452:699): arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7fffb627c060 a2=0 a3=7fffb627c04c items=0 ppid=1825 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:11.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 01:02:11.461293 kernel: audit: type=1327 audit(1761958931.452:699): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 01:02:11.460000 audit[2666]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=2666 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 01:02:11.460000 audit[2666]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffb627c060 a2=0 a3=0 items=0 ppid=1825 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:11.460000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 01:02:11.464298 kernel: audit: type=1325 audit(1761958931.460:700): table=nat:74 family=2 entries=20 op=nft_register_rule pid=2666 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 01:02:11.661579 systemd[1]: Created slice kubepods-besteffort-pod6fadf281_a92a_4b6f_a3a7_76d53a64839a.slice. Nov 1 01:02:11.725300 kubelet[1607]: E1101 01:02:11.725220 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:11.726562 kubelet[1607]: I1101 01:02:11.726546 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cxtwx\" (UniqueName: \"kubernetes.io/projected/6fadf281-a92a-4b6f-a3a7-76d53a64839a-kube-api-access-cxtwx\") pod \"nfs-server-provisioner-0\" (UID: \"6fadf281-a92a-4b6f-a3a7-76d53a64839a\") " pod="default/nfs-server-provisioner-0" Nov 1 01:02:11.726655 kubelet[1607]: I1101 01:02:11.726642 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/6fadf281-a92a-4b6f-a3a7-76d53a64839a-data\") pod \"nfs-server-provisioner-0\" (UID: \"6fadf281-a92a-4b6f-a3a7-76d53a64839a\") " pod="default/nfs-server-provisioner-0" Nov 1 01:02:11.976962 env[1248]: time="2025-11-01T01:02:11.976862918Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:6fadf281-a92a-4b6f-a3a7-76d53a64839a,Namespace:default,Attempt:0,}" Nov 1 01:02:12.070273 systemd-networkd[1066]: cali60e51b789ff: Link UP Nov 1 01:02:12.072309 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 01:02:12.072349 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Nov 1 01:02:12.073371 systemd-networkd[1066]: cali60e51b789ff: Gained carrier Nov 1 01:02:12.084176 env[1248]: 2025-11-01 01:02:12.004 [INFO][2668] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.139-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 6fadf281-a92a-4b6f-a3a7-76d53a64839a 1467 0 2025-11-01 01:02:11 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.124.139 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-" Nov 1 01:02:12.084176 env[1248]: 2025-11-01 01:02:12.004 [INFO][2668] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Nov 1 01:02:12.084176 env[1248]: 2025-11-01 01:02:12.027 [INFO][2680] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce" HandleID="k8s-pod-network.105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce" Workload="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Nov 1 01:02:12.084176 env[1248]: 2025-11-01 01:02:12.027 [INFO][2680] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce" HandleID="k8s-pod-network.105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce" Workload="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5880), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.139", "pod":"nfs-server-provisioner-0", "timestamp":"2025-11-01 01:02:12.027785931 +0000 UTC"}, Hostname:"10.67.124.139", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 01:02:12.084176 env[1248]: 2025-11-01 01:02:12.027 [INFO][2680] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 01:02:12.084176 env[1248]: 2025-11-01 01:02:12.028 [INFO][2680] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 01:02:12.084176 env[1248]: 2025-11-01 01:02:12.028 [INFO][2680] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.139' Nov 1 01:02:12.084176 env[1248]: 2025-11-01 01:02:12.035 [INFO][2680] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce" host="10.67.124.139" Nov 1 01:02:12.084176 env[1248]: 2025-11-01 01:02:12.039 [INFO][2680] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.139" Nov 1 01:02:12.084176 env[1248]: 2025-11-01 01:02:12.043 [INFO][2680] ipam/ipam.go 511: Trying affinity for 192.168.110.0/26 host="10.67.124.139" Nov 1 01:02:12.084176 env[1248]: 2025-11-01 01:02:12.044 [INFO][2680] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.0/26 host="10.67.124.139" Nov 1 01:02:12.084176 env[1248]: 2025-11-01 01:02:12.046 [INFO][2680] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.0/26 host="10.67.124.139" Nov 1 01:02:12.084176 env[1248]: 2025-11-01 01:02:12.046 [INFO][2680] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.110.0/26 handle="k8s-pod-network.105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce" host="10.67.124.139" Nov 1 01:02:12.084176 env[1248]: 2025-11-01 01:02:12.047 [INFO][2680] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce Nov 1 01:02:12.084176 env[1248]: 2025-11-01 01:02:12.056 [INFO][2680] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.110.0/26 handle="k8s-pod-network.105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce" host="10.67.124.139" Nov 1 01:02:12.084176 env[1248]: 2025-11-01 01:02:12.067 [INFO][2680] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.110.3/26] block=192.168.110.0/26 handle="k8s-pod-network.105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce" host="10.67.124.139" Nov 1 01:02:12.084176 env[1248]: 2025-11-01 01:02:12.067 [INFO][2680] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.3/26] handle="k8s-pod-network.105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce" host="10.67.124.139" Nov 1 01:02:12.084176 env[1248]: 2025-11-01 01:02:12.067 [INFO][2680] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 01:02:12.084176 env[1248]: 2025-11-01 01:02:12.067 [INFO][2680] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.110.3/26] IPv6=[] ContainerID="105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce" HandleID="k8s-pod-network.105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce" Workload="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Nov 1 01:02:12.084800 env[1248]: 2025-11-01 01:02:12.068 [INFO][2668] cni-plugin/k8s.go 418: Populated endpoint ContainerID="105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"6fadf281-a92a-4b6f-a3a7-76d53a64839a", ResourceVersion:"1467", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 1, 2, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.110.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 01:02:12.084800 env[1248]: 2025-11-01 01:02:12.068 [INFO][2668] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.3/32] ContainerID="105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Nov 1 01:02:12.084800 env[1248]: 2025-11-01 01:02:12.068 [INFO][2668] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Nov 1 01:02:12.084800 env[1248]: 2025-11-01 01:02:12.073 [INFO][2668] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Nov 1 01:02:12.084932 env[1248]: 2025-11-01 01:02:12.074 [INFO][2668] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"6fadf281-a92a-4b6f-a3a7-76d53a64839a", ResourceVersion:"1467", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 1, 2, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.110.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"02:fb:5f:60:d8:3c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 01:02:12.084932 env[1248]: 2025-11-01 01:02:12.083 [INFO][2668] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Nov 1 01:02:12.090631 env[1248]: time="2025-11-01T01:02:12.090568421Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 01:02:12.090631 env[1248]: time="2025-11-01T01:02:12.090631972Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 01:02:12.090770 env[1248]: time="2025-11-01T01:02:12.090647357Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 01:02:12.090854 env[1248]: time="2025-11-01T01:02:12.090832779Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce pid=2703 runtime=io.containerd.runc.v2 Nov 1 01:02:12.102473 systemd[1]: Started cri-containerd-105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce.scope. Nov 1 01:02:12.119000 audit[2731]: NETFILTER_CFG table=filter:75 family=2 entries=40 op=nft_register_chain pid=2731 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 01:02:12.119000 audit[2731]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffeaf414470 a2=0 a3=7ffeaf41445c items=0 ppid=2218 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:12.119000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 01:02:12.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit: BPF prog-id=109 op=LOAD Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2703 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:12.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353236326462356665653135653364613962323835623438633862 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2703 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:12.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353236326462356665653135653364613962323835623438633862 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit: BPF prog-id=110 op=LOAD Nov 1 01:02:12.120000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00025da20 items=0 ppid=2703 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:12.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353236326462356665653135653364613962323835623438633862 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.120000 audit: BPF prog-id=111 op=LOAD Nov 1 01:02:12.120000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00025da68 items=0 ppid=2703 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:12.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353236326462356665653135653364613962323835623438633862 Nov 1 01:02:12.121000 audit: BPF prog-id=111 op=UNLOAD Nov 1 01:02:12.121000 audit: BPF prog-id=110 op=UNLOAD Nov 1 01:02:12.121000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.121000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.121000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.121000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.121000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.121000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.121000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.121000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.121000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.121000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:12.121000 audit: BPF prog-id=112 op=LOAD Nov 1 01:02:12.121000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00025de78 items=0 ppid=2703 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:12.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353236326462356665653135653364613962323835623438633862 Nov 1 01:02:12.123913 systemd-resolved[1196]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Nov 1 01:02:12.145935 env[1248]: time="2025-11-01T01:02:12.145904147Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:6fadf281-a92a-4b6f-a3a7-76d53a64839a,Namespace:default,Attempt:0,} returns sandbox id \"105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce\"" Nov 1 01:02:12.147172 env[1248]: time="2025-11-01T01:02:12.147151140Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Nov 1 01:02:12.726379 kubelet[1607]: E1101 01:02:12.726262 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:12.836120 systemd[1]: run-containerd-runc-k8s.io-105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce-runc.UWgafg.mount: Deactivated successfully. Nov 1 01:02:13.727209 kubelet[1607]: E1101 01:02:13.727178 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:13.814692 systemd-networkd[1066]: cali60e51b789ff: Gained IPv6LL Nov 1 01:02:14.358772 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1887567723.mount: Deactivated successfully. Nov 1 01:02:14.727650 kubelet[1607]: E1101 01:02:14.727575 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:15.727963 kubelet[1607]: E1101 01:02:15.727933 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:15.979844 env[1248]: time="2025-11-01T01:02:15.979765583Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:02:15.990177 env[1248]: time="2025-11-01T01:02:15.990150375Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:02:15.995340 env[1248]: time="2025-11-01T01:02:15.995321146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:02:15.997906 env[1248]: time="2025-11-01T01:02:15.997882052Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:02:15.998482 env[1248]: time="2025-11-01T01:02:15.998464129Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Nov 1 01:02:16.000995 env[1248]: time="2025-11-01T01:02:16.000960702Z" level=info msg="CreateContainer within sandbox \"105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Nov 1 01:02:16.008388 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount223994505.mount: Deactivated successfully. Nov 1 01:02:16.011663 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4101823933.mount: Deactivated successfully. Nov 1 01:02:16.021531 env[1248]: time="2025-11-01T01:02:16.021479127Z" level=info msg="CreateContainer within sandbox \"105262db5fee15e3da9b285b48c8be02baf5319821f1c44dc7d30b8a2b032bce\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"b847f06c547c7bc4aa040e87a3e60f1b1529379521f82b4139bcb92fc23221cf\"" Nov 1 01:02:16.022143 env[1248]: time="2025-11-01T01:02:16.022121540Z" level=info msg="StartContainer for \"b847f06c547c7bc4aa040e87a3e60f1b1529379521f82b4139bcb92fc23221cf\"" Nov 1 01:02:16.034477 systemd[1]: Started cri-containerd-b847f06c547c7bc4aa040e87a3e60f1b1529379521f82b4139bcb92fc23221cf.scope. Nov 1 01:02:16.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.043000 audit: BPF prog-id=113 op=LOAD Nov 1 01:02:16.044000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.044000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2703 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:16.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238343766303663353437633762633461613034306538376133653630 Nov 1 01:02:16.044000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.044000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2703 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:16.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238343766303663353437633762633461613034306538376133653630 Nov 1 01:02:16.044000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.044000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.044000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.044000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.044000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.044000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.044000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.044000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.044000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.044000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.044000 audit: BPF prog-id=114 op=LOAD Nov 1 01:02:16.044000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000294550 items=0 ppid=2703 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:16.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238343766303663353437633762633461613034306538376133653630 Nov 1 01:02:16.045000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.045000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.045000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.045000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.045000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.045000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.045000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.045000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.045000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.045000 audit: BPF prog-id=115 op=LOAD Nov 1 01:02:16.045000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000294598 items=0 ppid=2703 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:16.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238343766303663353437633762633461613034306538376133653630 Nov 1 01:02:16.045000 audit: BPF prog-id=115 op=UNLOAD Nov 1 01:02:16.045000 audit: BPF prog-id=114 op=UNLOAD Nov 1 01:02:16.045000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.045000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.045000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.045000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.045000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.045000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.045000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.045000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.045000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.045000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:16.045000 audit: BPF prog-id=116 op=LOAD Nov 1 01:02:16.045000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002949a8 items=0 ppid=2703 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:16.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238343766303663353437633762633461613034306538376133653630 Nov 1 01:02:16.058797 env[1248]: time="2025-11-01T01:02:16.058756730Z" level=info msg="StartContainer for \"b847f06c547c7bc4aa040e87a3e60f1b1529379521f82b4139bcb92fc23221cf\" returns successfully" Nov 1 01:02:16.083000 audit[2780]: AVC avc: denied { search } for pid=2780 comm="rpcbind" name="crypto" dev="proc" ino=32705 scontext=system_u:system_r:svirt_lxc_net_t:s0:c602,c1001 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 01:02:16.083000 audit[2780]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb2eb3d00c0 a2=0 a3=0 items=0 ppid=2762 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c602,c1001 key=(null) Nov 1 01:02:16.083000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Nov 1 01:02:16.107000 audit[2785]: AVC avc: denied { search } for pid=2785 comm="dbus-daemon" name="crypto" dev="proc" ino=32705 scontext=system_u:system_r:svirt_lxc_net_t:s0:c602,c1001 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 01:02:16.107000 audit[2785]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f51c07360c0 a2=0 a3=0 items=0 ppid=2762 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c602,c1001 key=(null) Nov 1 01:02:16.107000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Nov 1 01:02:16.109000 audit[2786]: AVC avc: denied { watch } for pid=2786 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=530398 scontext=system_u:system_r:svirt_lxc_net_t:s0:c602,c1001 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c602,c1001 tclass=dir permissive=0 Nov 1 01:02:16.109000 audit[2786]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55901949fc10 a2=2c8 a3=7fffa4b3317c items=0 ppid=2762 pid=2786 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c602,c1001 key=(null) Nov 1 01:02:16.109000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Nov 1 01:02:16.111000 audit[2787]: AVC avc: denied { read } for pid=2787 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=33543 scontext=system_u:system_r:svirt_lxc_net_t:s0:c602,c1001 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Nov 1 01:02:16.111000 audit[2787]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f9b946d0320 a1=80000 a2=d a3=7ffcd4e126e0 items=0 ppid=2762 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c602,c1001 key=(null) Nov 1 01:02:16.111000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Nov 1 01:02:16.111000 audit[2787]: AVC avc: denied { search } for pid=2787 comm="ganesha.nfsd" name="crypto" dev="proc" ino=32705 scontext=system_u:system_r:svirt_lxc_net_t:s0:c602,c1001 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 01:02:16.111000 audit[2787]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f9b93c240c0 a2=0 a3=0 items=0 ppid=2762 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c602,c1001 key=(null) Nov 1 01:02:16.111000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Nov 1 01:02:16.728874 kubelet[1607]: E1101 01:02:16.728839 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:16.944545 kubelet[1607]: I1101 01:02:16.944508 1607 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.091627124 podStartE2EDuration="5.944496979s" podCreationTimestamp="2025-11-01 01:02:11 +0000 UTC" firstStartedPulling="2025-11-01 01:02:12.146767995 +0000 UTC m=+31.864695392" lastFinishedPulling="2025-11-01 01:02:15.999637846 +0000 UTC m=+35.717565247" observedRunningTime="2025-11-01 01:02:16.944229078 +0000 UTC m=+36.662156487" watchObservedRunningTime="2025-11-01 01:02:16.944496979 +0000 UTC m=+36.662424375" Nov 1 01:02:17.218000 audit[2808]: NETFILTER_CFG table=filter:76 family=2 entries=26 op=nft_register_rule pid=2808 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 01:02:17.223231 kernel: kauditd_printk_skb: 134 callbacks suppressed Nov 1 01:02:17.223330 kernel: audit: type=1325 audit(1761958937.218:743): table=filter:76 family=2 entries=26 op=nft_register_rule pid=2808 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 01:02:17.223354 kernel: audit: type=1300 audit(1761958937.218:743): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd139bf760 a2=0 a3=7ffd139bf74c items=0 ppid=1825 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:17.218000 audit[2808]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd139bf760 a2=0 a3=7ffd139bf74c items=0 ppid=1825 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:17.218000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 01:02:17.229976 kernel: audit: type=1327 audit(1761958937.218:743): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 01:02:17.230000 audit[2808]: NETFILTER_CFG table=nat:77 family=2 entries=104 op=nft_register_chain pid=2808 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 01:02:17.230000 audit[2808]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffd139bf760 a2=0 a3=7ffd139bf74c items=0 ppid=1825 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:17.239358 kernel: audit: type=1325 audit(1761958937.230:744): table=nat:77 family=2 entries=104 op=nft_register_chain pid=2808 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 01:02:17.239426 kernel: audit: type=1300 audit(1761958937.230:744): arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffd139bf760 a2=0 a3=7ffd139bf74c items=0 ppid=1825 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:17.239453 kernel: audit: type=1327 audit(1761958937.230:744): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 01:02:17.230000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 01:02:17.729641 kubelet[1607]: E1101 01:02:17.729613 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:17.846308 env[1248]: time="2025-11-01T01:02:17.846269785Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 01:02:18.155541 env[1248]: time="2025-11-01T01:02:18.155478365Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 01:02:18.155972 env[1248]: time="2025-11-01T01:02:18.155938876Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 01:02:18.156222 kubelet[1607]: E1101 01:02:18.156191 1607 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 01:02:18.156319 kubelet[1607]: E1101 01:02:18.156250 1607 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 01:02:18.156658 kubelet[1607]: E1101 01:02:18.156383 1607 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-6znxp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-bdrsw_calico-system(7d1a2b41-a133-4dae-a058-ec3e3e4b4338): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 01:02:18.158318 env[1248]: time="2025-11-01T01:02:18.158270686Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 01:02:18.474820 env[1248]: time="2025-11-01T01:02:18.474670771Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 01:02:18.511719 env[1248]: time="2025-11-01T01:02:18.511673559Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 01:02:18.511864 kubelet[1607]: E1101 01:02:18.511839 1607 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 01:02:18.511906 kubelet[1607]: E1101 01:02:18.511871 1607 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 01:02:18.511966 kubelet[1607]: E1101 01:02:18.511940 1607 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-6znxp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-bdrsw_calico-system(7d1a2b41-a133-4dae-a058-ec3e3e4b4338): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 01:02:18.513235 kubelet[1607]: E1101 01:02:18.513198 1607 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-bdrsw" podUID="7d1a2b41-a133-4dae-a058-ec3e3e4b4338" Nov 1 01:02:18.730734 kubelet[1607]: E1101 01:02:18.730658 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:19.731416 kubelet[1607]: E1101 01:02:19.731384 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:20.698749 kubelet[1607]: E1101 01:02:20.698712 1607 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:20.732395 kubelet[1607]: E1101 01:02:20.732367 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:21.733525 kubelet[1607]: E1101 01:02:21.733465 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:22.734245 kubelet[1607]: E1101 01:02:22.734213 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:23.735131 kubelet[1607]: E1101 01:02:23.735107 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:24.736551 kubelet[1607]: E1101 01:02:24.736523 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:25.737377 kubelet[1607]: E1101 01:02:25.737350 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:26.217273 systemd[1]: Created slice kubepods-besteffort-podafcb049e_2b0f_4369_b067_cd7a31e4b365.slice. Nov 1 01:02:26.308040 kubelet[1607]: I1101 01:02:26.308016 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w2nzt\" (UniqueName: \"kubernetes.io/projected/afcb049e-2b0f-4369-b067-cd7a31e4b365-kube-api-access-w2nzt\") pod \"test-pod-1\" (UID: \"afcb049e-2b0f-4369-b067-cd7a31e4b365\") " pod="default/test-pod-1" Nov 1 01:02:26.308203 kubelet[1607]: I1101 01:02:26.308192 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-7a59e1df-4959-40c3-8abe-8189cf42376d\" (UniqueName: \"kubernetes.io/nfs/afcb049e-2b0f-4369-b067-cd7a31e4b365-pvc-7a59e1df-4959-40c3-8abe-8189cf42376d\") pod \"test-pod-1\" (UID: \"afcb049e-2b0f-4369-b067-cd7a31e4b365\") " pod="default/test-pod-1" Nov 1 01:02:26.604000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.625220 kernel: Failed to create system directory netfs Nov 1 01:02:26.625275 kernel: audit: type=1400 audit(1761958946.604:745): avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.625364 kernel: Failed to create system directory netfs Nov 1 01:02:26.625384 kernel: audit: type=1400 audit(1761958946.604:745): avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.625399 kernel: Failed to create system directory netfs Nov 1 01:02:26.625412 kernel: audit: type=1400 audit(1761958946.604:745): avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.625425 kernel: Failed to create system directory netfs Nov 1 01:02:26.625437 kernel: audit: type=1400 audit(1761958946.604:745): avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.625449 kernel: audit: type=1300 audit(1761958946.604:745): arch=c000003e syscall=175 success=yes exit=0 a0=55ee5dbce5e0 a1=153bc a2=55ee508852b0 a3=5 items=0 ppid=92 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:26.625463 kernel: audit: type=1327 audit(1761958946.604:745): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 01:02:26.604000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.604000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.604000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.604000 audit[2823]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ee5dbce5e0 a1=153bc a2=55ee508852b0 a3=5 items=0 ppid=92 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:26.604000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 01:02:26.639887 kernel: Failed to create system directory fscache Nov 1 01:02:26.639976 kernel: audit: type=1400 audit(1761958946.633:746): avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.640001 kernel: Failed to create system directory fscache Nov 1 01:02:26.633000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.643179 kernel: audit: type=1400 audit(1761958946.633:746): avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.643231 kernel: Failed to create system directory fscache Nov 1 01:02:26.633000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.646469 kernel: audit: type=1400 audit(1761958946.633:746): avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.646520 kernel: Failed to create system directory fscache Nov 1 01:02:26.633000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.649896 kernel: audit: type=1400 audit(1761958946.633:746): avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.649967 kernel: Failed to create system directory fscache Nov 1 01:02:26.633000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.633000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.633000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.633000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.651765 kernel: Failed to create system directory fscache Nov 1 01:02:26.651793 kernel: Failed to create system directory fscache Nov 1 01:02:26.651807 kernel: Failed to create system directory fscache Nov 1 01:02:26.633000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.633000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.633000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.653634 kernel: Failed to create system directory fscache Nov 1 01:02:26.653658 kernel: Failed to create system directory fscache Nov 1 01:02:26.653671 kernel: Failed to create system directory fscache Nov 1 01:02:26.633000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.633000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.654867 kernel: Failed to create system directory fscache Nov 1 01:02:26.654894 kernel: Failed to create system directory fscache Nov 1 01:02:26.633000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.633000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.656304 kernel: Failed to create system directory fscache Nov 1 01:02:26.633000 audit[2823]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ee5dde39c0 a1=4c0fc a2=55ee508852b0 a3=5 items=0 ppid=92 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:26.633000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 01:02:26.658294 kernel: FS-Cache: Loaded Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.717839 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.717876 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.717891 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.719691 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.719729 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.719743 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.721560 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.721597 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.721612 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.722787 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.722815 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.724627 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.731409 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.731465 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.731486 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.731506 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.731524 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.731540 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.731556 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.731569 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.731580 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.731592 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.731604 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.731620 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.731634 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.732596 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.732626 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.733826 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.733860 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.735682 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.735712 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.735726 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.737530 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.737560 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.737573 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.738692 kubelet[1607]: E1101 01:02:26.738674 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:26.738934 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.738953 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.740595 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.740627 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.740640 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.741810 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.741841 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.743705 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.743731 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.743745 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.745524 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.745549 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.745564 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.746732 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.746758 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.748561 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.748594 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.748612 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.749785 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.749818 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.751609 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.751638 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.751652 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.752823 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.752851 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.754649 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.754682 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.754699 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.755866 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.755894 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.760213 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.760239 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.760256 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.760267 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.760278 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.760309 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.768409 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.768455 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.768468 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.768480 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.768492 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.768504 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.768516 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.768528 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.768582 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.768596 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.768608 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.768622 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.768633 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.768643 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.769555 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.769591 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.770765 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.770791 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.772585 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.772616 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.772630 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.773802 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.773835 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.775615 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.775645 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.775660 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.776825 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.776880 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.778674 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.778701 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.778718 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.779882 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.779905 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.781707 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.781739 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.781757 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.783533 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.783565 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.783582 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.784749 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.784778 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.786583 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.786615 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.786630 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.787790 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.787817 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.789615 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.789648 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.789661 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.790841 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.790867 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.792672 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.792702 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.792714 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.793302 kernel: Failed to create system directory sunrpc Nov 1 01:02:26.706000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.800846 kernel: RPC: Registered named UNIX socket transport module. Nov 1 01:02:26.800918 kernel: RPC: Registered udp transport module. Nov 1 01:02:26.800938 kernel: RPC: Registered tcp transport module. Nov 1 01:02:26.800949 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Nov 1 01:02:26.706000 audit[2823]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ee5de2fad0 a1=1a8274 a2=55ee508852b0 a3=5 items=6 ppid=92 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:26.706000 audit: CWD cwd="/" Nov 1 01:02:26.706000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 01:02:26.706000 audit: PATH item=1 name=(null) inode=33887 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 01:02:26.706000 audit: PATH item=2 name=(null) inode=33887 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 01:02:26.706000 audit: PATH item=3 name=(null) inode=33888 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 01:02:26.706000 audit: PATH item=4 name=(null) inode=33887 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 01:02:26.706000 audit: PATH item=5 name=(null) inode=33889 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 01:02:26.706000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.894185 kernel: Failed to create system directory nfs Nov 1 01:02:26.894254 kernel: Failed to create system directory nfs Nov 1 01:02:26.894272 kernel: Failed to create system directory nfs Nov 1 01:02:26.894292 kernel: Failed to create system directory nfs Nov 1 01:02:26.894308 kernel: Failed to create system directory nfs Nov 1 01:02:26.894321 kernel: Failed to create system directory nfs Nov 1 01:02:26.894331 kernel: Failed to create system directory nfs Nov 1 01:02:26.894344 kernel: Failed to create system directory nfs Nov 1 01:02:26.894354 kernel: Failed to create system directory nfs Nov 1 01:02:26.894364 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.895301 kernel: Failed to create system directory nfs Nov 1 01:02:26.895328 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.896512 kernel: Failed to create system directory nfs Nov 1 01:02:26.896549 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.897650 kernel: Failed to create system directory nfs Nov 1 01:02:26.897683 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.898928 kernel: Failed to create system directory nfs Nov 1 01:02:26.898977 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.899552 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.900714 kernel: Failed to create system directory nfs Nov 1 01:02:26.900736 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.901865 kernel: Failed to create system directory nfs Nov 1 01:02:26.901894 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.903656 kernel: Failed to create system directory nfs Nov 1 01:02:26.903705 kernel: Failed to create system directory nfs Nov 1 01:02:26.903733 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.904788 kernel: Failed to create system directory nfs Nov 1 01:02:26.904824 kernel: Failed to create system directory nfs Nov 1 01:02:26.909112 kernel: Failed to create system directory nfs Nov 1 01:02:26.909152 kernel: Failed to create system directory nfs Nov 1 01:02:26.909196 kernel: Failed to create system directory nfs Nov 1 01:02:26.909223 kernel: Failed to create system directory nfs Nov 1 01:02:26.909247 kernel: Failed to create system directory nfs Nov 1 01:02:26.909272 kernel: Failed to create system directory nfs Nov 1 01:02:26.909303 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.909527 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.910673 kernel: Failed to create system directory nfs Nov 1 01:02:26.910702 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.911823 kernel: Failed to create system directory nfs Nov 1 01:02:26.911845 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.913585 kernel: Failed to create system directory nfs Nov 1 01:02:26.913617 kernel: Failed to create system directory nfs Nov 1 01:02:26.913632 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.914752 kernel: Failed to create system directory nfs Nov 1 01:02:26.914782 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.915330 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.916471 kernel: Failed to create system directory nfs Nov 1 01:02:26.916495 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.917659 kernel: Failed to create system directory nfs Nov 1 01:02:26.917686 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.918781 kernel: Failed to create system directory nfs Nov 1 01:02:26.918805 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.919365 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.920541 kernel: Failed to create system directory nfs Nov 1 01:02:26.920565 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.921685 kernel: Failed to create system directory nfs Nov 1 01:02:26.921709 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.922849 kernel: Failed to create system directory nfs Nov 1 01:02:26.922869 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.880000 audit[2823]: AVC avc: denied { confidentiality } for pid=2823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.924647 kernel: Failed to create system directory nfs Nov 1 01:02:26.880000 audit[2823]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ee5e050c10 a1=16eb2c a2=55ee508852b0 a3=5 items=0 ppid=92 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:26.880000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 01:02:26.938338 kernel: FS-Cache: Netfs 'nfs' registered for caching Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.998754 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.998804 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.998835 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.999319 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.000537 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.000564 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.001829 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.001851 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.003723 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.003764 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.003785 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.004319 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.005496 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.005520 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.006698 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.006727 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.007328 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.008751 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.008779 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.011047 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.011074 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.011095 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.012475 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.012503 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.013974 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.013994 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.015479 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.015514 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.017010 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.017045 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.017756 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.019984 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.020017 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.020030 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.021490 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.021524 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.022892 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.022925 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.024380 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.024414 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.025872 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.025899 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.027367 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.027395 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.028859 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.028888 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.030378 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.030414 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.031639 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.031659 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.032896 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.032917 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.033493 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.034725 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.034747 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.035322 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.036488 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.036516 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.037706 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.037731 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.038925 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.038949 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.039674 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.040895 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.040920 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.041499 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.042713 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.042738 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.043320 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.044503 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.044524 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.045699 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.045722 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.046865 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.046889 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.047459 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.048903 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.048942 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.049530 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.050789 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.050835 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.052710 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.052741 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.052756 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.053900 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.053929 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.054524 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.055742 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.055774 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.057884 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.057917 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.057960 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.058608 kernel: Failed to create system directory nfs4 Nov 1 01:02:27.061841 kernel: Failed to create system directory nfs4 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:26.983000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.153838 kernel: NFS: Registering the id_resolver key type Nov 1 01:02:27.153922 kernel: Key type id_resolver registered Nov 1 01:02:27.154471 kernel: Key type id_legacy registered Nov 1 01:02:26.983000 audit[2828]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fadf3d29010 a1=2095c4 a2=55d0b07b22b0 a3=5 items=0 ppid=92 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:26.983000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.166331 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.167646 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.167678 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.168333 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.169634 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.169655 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.170315 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.171608 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.171628 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.172309 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.173713 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.173742 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.174400 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.175720 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.175747 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.176401 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.177708 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.177729 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.178381 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.179687 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.179708 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.180377 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.181680 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.181700 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.182355 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.162000 audit[2829]: AVC avc: denied { confidentiality } for pid=2829 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 01:02:27.183294 kernel: Failed to create system directory rpcgss Nov 1 01:02:27.162000 audit[2829]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7feb5c97b010 a1=70bf4 a2=5601d7a202b0 a3=5 items=0 ppid=92 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:27.162000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Nov 1 01:02:27.228465 nfsidmap[2835]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Nov 1 01:02:27.229873 nfsidmap[2836]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Nov 1 01:02:27.237000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2499 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 01:02:27.237000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2499 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 01:02:27.237000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2499 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 01:02:27.237000 audit[1368]: AVC avc: denied { watch_reads } for pid=1368 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2499 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 01:02:27.237000 audit[1368]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55b69045e1b0 a2=10 a3=bd507de88d773454 items=0 ppid=1 pid=1368 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:27.237000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 01:02:27.237000 audit[1368]: AVC avc: denied { watch_reads } for pid=1368 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2499 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 01:02:27.237000 audit[1368]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55b69045e1b0 a2=10 a3=bd507de88d773454 items=0 ppid=1 pid=1368 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:27.237000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 01:02:27.237000 audit[1368]: AVC avc: denied { watch_reads } for pid=1368 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2499 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 01:02:27.237000 audit[1368]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55b69045e1b0 a2=10 a3=bd507de88d773454 items=0 ppid=1 pid=1368 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:27.237000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 01:02:27.420369 env[1248]: time="2025-11-01T01:02:27.420302402Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:afcb049e-2b0f-4369-b067-cd7a31e4b365,Namespace:default,Attempt:0,}" Nov 1 01:02:27.674313 systemd-networkd[1066]: cali5ec59c6bf6e: Link UP Nov 1 01:02:27.678389 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 01:02:27.678455 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Nov 1 01:02:27.677369 systemd-networkd[1066]: cali5ec59c6bf6e: Gained carrier Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.533 [INFO][2839] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.139-k8s-test--pod--1-eth0 default afcb049e-2b0f-4369-b067-cd7a31e4b365 1548 0 2025-11-01 01:02:12 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.139 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-" Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.533 [INFO][2839] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.557 [INFO][2852] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8" HandleID="k8s-pod-network.55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8" Workload="10.67.124.139-k8s-test--pod--1-eth0" Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.557 [INFO][2852] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8" HandleID="k8s-pod-network.55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8" Workload="10.67.124.139-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d58f0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.139", "pod":"test-pod-1", "timestamp":"2025-11-01 01:02:27.557894816 +0000 UTC"}, Hostname:"10.67.124.139", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.558 [INFO][2852] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.558 [INFO][2852] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.558 [INFO][2852] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.139' Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.607 [INFO][2852] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8" host="10.67.124.139" Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.635 [INFO][2852] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.139" Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.638 [INFO][2852] ipam/ipam.go 511: Trying affinity for 192.168.110.0/26 host="10.67.124.139" Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.639 [INFO][2852] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.0/26 host="10.67.124.139" Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.640 [INFO][2852] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.0/26 host="10.67.124.139" Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.640 [INFO][2852] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.110.0/26 handle="k8s-pod-network.55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8" host="10.67.124.139" Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.640 [INFO][2852] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8 Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.644 [INFO][2852] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.110.0/26 handle="k8s-pod-network.55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8" host="10.67.124.139" Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.670 [INFO][2852] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.110.4/26] block=192.168.110.0/26 handle="k8s-pod-network.55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8" host="10.67.124.139" Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.670 [INFO][2852] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.4/26] handle="k8s-pod-network.55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8" host="10.67.124.139" Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.671 [INFO][2852] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.671 [INFO][2852] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.110.4/26] IPv6=[] ContainerID="55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8" HandleID="k8s-pod-network.55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8" Workload="10.67.124.139-k8s-test--pod--1-eth0" Nov 1 01:02:27.691589 env[1248]: 2025-11-01 01:02:27.672 [INFO][2839] cni-plugin/k8s.go 418: Populated endpoint ContainerID="55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"afcb049e-2b0f-4369-b067-cd7a31e4b365", ResourceVersion:"1548", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 1, 2, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 01:02:27.692069 env[1248]: 2025-11-01 01:02:27.672 [INFO][2839] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.4/32] ContainerID="55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" Nov 1 01:02:27.692069 env[1248]: 2025-11-01 01:02:27.672 [INFO][2839] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" Nov 1 01:02:27.692069 env[1248]: 2025-11-01 01:02:27.677 [INFO][2839] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" Nov 1 01:02:27.692069 env[1248]: 2025-11-01 01:02:27.677 [INFO][2839] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"afcb049e-2b0f-4369-b067-cd7a31e4b365", ResourceVersion:"1548", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 1, 2, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"26:c2:1f:d5:1a:06", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 01:02:27.692069 env[1248]: 2025-11-01 01:02:27.689 [INFO][2839] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" Nov 1 01:02:27.703343 env[1248]: time="2025-11-01T01:02:27.703278109Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 01:02:27.707066 env[1248]: time="2025-11-01T01:02:27.703324562Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 01:02:27.707066 env[1248]: time="2025-11-01T01:02:27.703331900Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 01:02:27.707066 env[1248]: time="2025-11-01T01:02:27.703491946Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8 pid=2872 runtime=io.containerd.runc.v2 Nov 1 01:02:27.716643 systemd[1]: Started cri-containerd-55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8.scope. Nov 1 01:02:27.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.726000 audit: BPF prog-id=117 op=LOAD Nov 1 01:02:27.727000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.727000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2872 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:27.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535613734343336383039303137333566313262313266643762383662 Nov 1 01:02:27.727000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.727000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2872 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:27.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535613734343336383039303137333566313262313266643762383662 Nov 1 01:02:27.727000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.727000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.727000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.727000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.727000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.727000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.727000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.727000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.727000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.727000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.727000 audit: BPF prog-id=118 op=LOAD Nov 1 01:02:27.727000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003143e0 items=0 ppid=2872 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:27.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535613734343336383039303137333566313262313266643762383662 Nov 1 01:02:27.728000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.728000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.728000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.728000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.728000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.728000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.728000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.728000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.728000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.728000 audit: BPF prog-id=119 op=LOAD Nov 1 01:02:27.728000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000314428 items=0 ppid=2872 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:27.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535613734343336383039303137333566313262313266643762383662 Nov 1 01:02:27.728000 audit: BPF prog-id=119 op=UNLOAD Nov 1 01:02:27.728000 audit: BPF prog-id=118 op=UNLOAD Nov 1 01:02:27.728000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.728000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.728000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.728000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.728000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.728000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.728000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.728000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.728000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.728000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:27.728000 audit: BPF prog-id=120 op=LOAD Nov 1 01:02:27.728000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000314838 items=0 ppid=2872 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:27.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535613734343336383039303137333566313262313266643762383662 Nov 1 01:02:27.730771 systemd-resolved[1196]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Nov 1 01:02:27.739505 kubelet[1607]: E1101 01:02:27.739478 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:27.752000 audit[2908]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=2908 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 01:02:27.752000 audit[2908]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fffa2389310 a2=0 a3=7fffa23892fc items=0 ppid=2218 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:27.752000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 01:02:27.755751 env[1248]: time="2025-11-01T01:02:27.755721875Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:afcb049e-2b0f-4369-b067-cd7a31e4b365,Namespace:default,Attempt:0,} returns sandbox id \"55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8\"" Nov 1 01:02:27.756653 env[1248]: time="2025-11-01T01:02:27.756634481Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Nov 1 01:02:28.231214 env[1248]: time="2025-11-01T01:02:28.231158645Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:02:28.241373 env[1248]: time="2025-11-01T01:02:28.241330512Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:02:28.246027 env[1248]: time="2025-11-01T01:02:28.246000704Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:02:28.252672 env[1248]: time="2025-11-01T01:02:28.252633816Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 01:02:28.253118 env[1248]: time="2025-11-01T01:02:28.253101031Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9\"" Nov 1 01:02:28.254602 env[1248]: time="2025-11-01T01:02:28.254584361Z" level=info msg="CreateContainer within sandbox \"55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8\" for container &ContainerMetadata{Name:test,Attempt:0,}" Nov 1 01:02:28.262737 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2479957451.mount: Deactivated successfully. Nov 1 01:02:28.276310 env[1248]: time="2025-11-01T01:02:28.276267055Z" level=info msg="CreateContainer within sandbox \"55a7443680901735f12b12fd7b86b3e386e977e89e66c840f8d8db9a0bbd12b8\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"bce1ee0ed89c1e5313b9d4848ef9fd2c4fde62487fa9f9d783e0028251ebd9e0\"" Nov 1 01:02:28.276964 env[1248]: time="2025-11-01T01:02:28.276951337Z" level=info msg="StartContainer for \"bce1ee0ed89c1e5313b9d4848ef9fd2c4fde62487fa9f9d783e0028251ebd9e0\"" Nov 1 01:02:28.286201 systemd[1]: Started cri-containerd-bce1ee0ed89c1e5313b9d4848ef9fd2c4fde62487fa9f9d783e0028251ebd9e0.scope. Nov 1 01:02:28.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.295000 audit: BPF prog-id=121 op=LOAD Nov 1 01:02:28.296000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.296000 audit[2916]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2872 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:28.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263653165653065643839633165353331336239643438343865663966 Nov 1 01:02:28.296000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.296000 audit[2916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2872 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:28.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263653165653065643839633165353331336239643438343865663966 Nov 1 01:02:28.296000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.296000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.296000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.296000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.296000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.296000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.296000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.296000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.296000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.296000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.296000 audit: BPF prog-id=122 op=LOAD Nov 1 01:02:28.296000 audit[2916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003372e0 items=0 ppid=2872 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:28.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263653165653065643839633165353331336239643438343865663966 Nov 1 01:02:28.297000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.297000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.297000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.297000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.297000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.297000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.297000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.297000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.297000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.297000 audit: BPF prog-id=123 op=LOAD Nov 1 01:02:28.297000 audit[2916]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000337328 items=0 ppid=2872 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:28.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263653165653065643839633165353331336239643438343865663966 Nov 1 01:02:28.297000 audit: BPF prog-id=123 op=UNLOAD Nov 1 01:02:28.297000 audit: BPF prog-id=122 op=UNLOAD Nov 1 01:02:28.297000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.297000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.297000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.297000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.297000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.297000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.297000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.297000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.297000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.297000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 01:02:28.297000 audit: BPF prog-id=124 op=LOAD Nov 1 01:02:28.297000 audit[2916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000337738 items=0 ppid=2872 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 01:02:28.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263653165653065643839633165353331336239643438343865663966 Nov 1 01:02:28.309137 env[1248]: time="2025-11-01T01:02:28.309106444Z" level=info msg="StartContainer for \"bce1ee0ed89c1e5313b9d4848ef9fd2c4fde62487fa9f9d783e0028251ebd9e0\" returns successfully" Nov 1 01:02:28.739938 kubelet[1607]: E1101 01:02:28.739877 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:29.494519 systemd-networkd[1066]: cali5ec59c6bf6e: Gained IPv6LL Nov 1 01:02:29.740738 kubelet[1607]: E1101 01:02:29.740709 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:29.844510 kubelet[1607]: E1101 01:02:29.844485 1607 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-bdrsw" podUID="7d1a2b41-a133-4dae-a058-ec3e3e4b4338" Nov 1 01:02:29.851535 kubelet[1607]: I1101 01:02:29.851488 1607 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=17.353858559 podStartE2EDuration="17.851474464s" podCreationTimestamp="2025-11-01 01:02:12 +0000 UTC" firstStartedPulling="2025-11-01 01:02:27.756235485 +0000 UTC m=+47.474162886" lastFinishedPulling="2025-11-01 01:02:28.253851394 +0000 UTC m=+47.971778791" observedRunningTime="2025-11-01 01:02:28.9357272 +0000 UTC m=+48.653654608" watchObservedRunningTime="2025-11-01 01:02:29.851474464 +0000 UTC m=+49.569401867" Nov 1 01:02:29.893865 systemd[1]: run-containerd-runc-k8s.io-0eb736d5234d6c62114b3e863b868f944ed2ae1df0f56c14d06c7e8cfd529ac6-runc.5Y32E0.mount: Deactivated successfully. Nov 1 01:02:30.741461 kubelet[1607]: E1101 01:02:30.741423 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 01:02:31.741530 kubelet[1607]: E1101 01:02:31.741488 1607 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"