Mar 17 18:19:41.000275 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Mar 17 18:19:41.000320 kernel: Linux version 5.15.179-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Mar 17 17:11:44 -00 2025 Mar 17 18:19:41.000345 kernel: efi: EFI v2.70 by EDK II Mar 17 18:19:41.000360 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7b003a98 MEMRESERVE=0x7171cf98 Mar 17 18:19:41.000374 kernel: ACPI: Early table checksum verification disabled Mar 17 18:19:41.000387 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Mar 17 18:19:41.000404 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Mar 17 18:19:41.000418 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Mar 17 18:19:41.000432 kernel: ACPI: DSDT 0x0000000078640000 00159D (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Mar 17 18:19:41.000446 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Mar 17 18:19:41.000465 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Mar 17 18:19:41.000479 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Mar 17 18:19:41.000494 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Mar 17 18:19:41.000508 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Mar 17 18:19:41.000578 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Mar 17 18:19:41.000602 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Mar 17 18:19:41.000618 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Mar 17 18:19:41.000633 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Mar 17 18:19:41.000648 kernel: printk: bootconsole [uart0] enabled Mar 17 18:19:41.000663 kernel: NUMA: Failed to initialise from firmware Mar 17 18:19:41.000679 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Mar 17 18:19:41.000694 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Mar 17 18:19:41.000709 kernel: Zone ranges: Mar 17 18:19:41.000724 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Mar 17 18:19:41.000738 kernel: DMA32 empty Mar 17 18:19:41.000753 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Mar 17 18:19:41.000772 kernel: Movable zone start for each node Mar 17 18:19:41.000786 kernel: Early memory node ranges Mar 17 18:19:41.000801 kernel: node 0: [mem 0x0000000040000000-0x000000007862ffff] Mar 17 18:19:41.000839 kernel: node 0: [mem 0x0000000078630000-0x000000007863ffff] Mar 17 18:19:41.000857 kernel: node 0: [mem 0x0000000078640000-0x00000000786effff] Mar 17 18:19:41.000872 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Mar 17 18:19:41.000887 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Mar 17 18:19:41.000902 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Mar 17 18:19:41.000917 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Mar 17 18:19:41.000932 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Mar 17 18:19:41.000946 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Mar 17 18:19:41.000961 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Mar 17 18:19:41.000982 kernel: psci: probing for conduit method from ACPI. Mar 17 18:19:41.000997 kernel: psci: PSCIv1.0 detected in firmware. Mar 17 18:19:41.001019 kernel: psci: Using standard PSCI v0.2 function IDs Mar 17 18:19:41.001034 kernel: psci: Trusted OS migration not required Mar 17 18:19:41.001050 kernel: psci: SMC Calling Convention v1.1 Mar 17 18:19:41.001069 kernel: ACPI: SRAT not present Mar 17 18:19:41.001085 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Mar 17 18:19:41.001101 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Mar 17 18:19:41.001117 kernel: pcpu-alloc: [0] 0 [0] 1 Mar 17 18:19:41.001132 kernel: Detected PIPT I-cache on CPU0 Mar 17 18:19:41.001147 kernel: CPU features: detected: GIC system register CPU interface Mar 17 18:19:41.001163 kernel: CPU features: detected: Spectre-v2 Mar 17 18:19:41.001178 kernel: CPU features: detected: Spectre-v3a Mar 17 18:19:41.001194 kernel: CPU features: detected: Spectre-BHB Mar 17 18:19:41.001209 kernel: CPU features: kernel page table isolation forced ON by KASLR Mar 17 18:19:41.001225 kernel: CPU features: detected: Kernel page table isolation (KPTI) Mar 17 18:19:41.001244 kernel: CPU features: detected: ARM erratum 1742098 Mar 17 18:19:41.001260 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Mar 17 18:19:41.001276 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Mar 17 18:19:41.001291 kernel: Policy zone: Normal Mar 17 18:19:41.001309 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=e034db32d58fe7496a3db6ba3879dd9052cea2cf1597d65edfc7b26afc92530d Mar 17 18:19:41.001326 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Mar 17 18:19:41.001341 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Mar 17 18:19:41.001357 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Mar 17 18:19:41.001372 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Mar 17 18:19:41.001388 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Mar 17 18:19:41.001408 kernel: Memory: 3824524K/4030464K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36416K init, 777K bss, 205940K reserved, 0K cma-reserved) Mar 17 18:19:41.001425 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Mar 17 18:19:41.001440 kernel: trace event string verifier disabled Mar 17 18:19:41.001455 kernel: rcu: Preemptible hierarchical RCU implementation. Mar 17 18:19:41.001472 kernel: rcu: RCU event tracing is enabled. Mar 17 18:19:41.001488 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Mar 17 18:19:41.001504 kernel: Trampoline variant of Tasks RCU enabled. Mar 17 18:19:41.001519 kernel: Tracing variant of Tasks RCU enabled. Mar 17 18:19:41.001535 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Mar 17 18:19:41.001550 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Mar 17 18:19:41.001566 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Mar 17 18:19:41.001581 kernel: GICv3: 96 SPIs implemented Mar 17 18:19:41.001600 kernel: GICv3: 0 Extended SPIs implemented Mar 17 18:19:41.001615 kernel: GICv3: Distributor has no Range Selector support Mar 17 18:19:41.001631 kernel: Root IRQ handler: gic_handle_irq Mar 17 18:19:41.001646 kernel: GICv3: 16 PPIs implemented Mar 17 18:19:41.001661 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Mar 17 18:19:41.001676 kernel: ACPI: SRAT not present Mar 17 18:19:41.001691 kernel: ITS [mem 0x10080000-0x1009ffff] Mar 17 18:19:41.001707 kernel: ITS@0x0000000010080000: allocated 8192 Devices @400090000 (indirect, esz 8, psz 64K, shr 1) Mar 17 18:19:41.001723 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000a0000 (flat, esz 8, psz 64K, shr 1) Mar 17 18:19:41.001738 kernel: GICv3: using LPI property table @0x00000004000b0000 Mar 17 18:19:41.001753 kernel: ITS: Using hypervisor restricted LPI range [128] Mar 17 18:19:41.001773 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Mar 17 18:19:41.001789 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Mar 17 18:19:41.001805 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Mar 17 18:19:41.001841 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Mar 17 18:19:41.001859 kernel: Console: colour dummy device 80x25 Mar 17 18:19:41.001875 kernel: printk: console [tty1] enabled Mar 17 18:19:41.001892 kernel: ACPI: Core revision 20210730 Mar 17 18:19:41.001908 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Mar 17 18:19:41.001924 kernel: pid_max: default: 32768 minimum: 301 Mar 17 18:19:41.001940 kernel: LSM: Security Framework initializing Mar 17 18:19:41.001961 kernel: SELinux: Initializing. Mar 17 18:19:41.001978 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Mar 17 18:19:41.001994 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Mar 17 18:19:41.002010 kernel: rcu: Hierarchical SRCU implementation. Mar 17 18:19:41.002025 kernel: Platform MSI: ITS@0x10080000 domain created Mar 17 18:19:41.002041 kernel: PCI/MSI: ITS@0x10080000 domain created Mar 17 18:19:41.002057 kernel: Remapping and enabling EFI services. Mar 17 18:19:41.002072 kernel: smp: Bringing up secondary CPUs ... Mar 17 18:19:41.002088 kernel: Detected PIPT I-cache on CPU1 Mar 17 18:19:41.002107 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Mar 17 18:19:41.002124 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Mar 17 18:19:41.002139 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Mar 17 18:19:41.002155 kernel: smp: Brought up 1 node, 2 CPUs Mar 17 18:19:41.002171 kernel: SMP: Total of 2 processors activated. Mar 17 18:19:41.002187 kernel: CPU features: detected: 32-bit EL0 Support Mar 17 18:19:41.002203 kernel: CPU features: detected: 32-bit EL1 Support Mar 17 18:19:41.002218 kernel: CPU features: detected: CRC32 instructions Mar 17 18:19:41.002234 kernel: CPU: All CPU(s) started at EL1 Mar 17 18:19:41.002250 kernel: alternatives: patching kernel code Mar 17 18:19:41.002270 kernel: devtmpfs: initialized Mar 17 18:19:41.002286 kernel: KASLR disabled due to lack of seed Mar 17 18:19:41.002311 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Mar 17 18:19:41.002332 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Mar 17 18:19:41.002349 kernel: pinctrl core: initialized pinctrl subsystem Mar 17 18:19:41.002365 kernel: SMBIOS 3.0.0 present. Mar 17 18:19:41.002381 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Mar 17 18:19:41.002397 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Mar 17 18:19:41.002414 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Mar 17 18:19:41.002430 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Mar 17 18:19:41.002447 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Mar 17 18:19:41.002467 kernel: audit: initializing netlink subsys (disabled) Mar 17 18:19:41.002484 kernel: audit: type=2000 audit(0.260:1): state=initialized audit_enabled=0 res=1 Mar 17 18:19:41.002500 kernel: thermal_sys: Registered thermal governor 'step_wise' Mar 17 18:19:41.002517 kernel: cpuidle: using governor menu Mar 17 18:19:41.002533 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Mar 17 18:19:41.002553 kernel: ASID allocator initialised with 32768 entries Mar 17 18:19:41.002570 kernel: ACPI: bus type PCI registered Mar 17 18:19:41.002586 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Mar 17 18:19:41.002603 kernel: Serial: AMBA PL011 UART driver Mar 17 18:19:41.002619 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Mar 17 18:19:41.002636 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Mar 17 18:19:41.002653 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Mar 17 18:19:41.002669 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Mar 17 18:19:41.002685 kernel: cryptd: max_cpu_qlen set to 1000 Mar 17 18:19:41.002706 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Mar 17 18:19:41.002723 kernel: ACPI: Added _OSI(Module Device) Mar 17 18:19:41.002739 kernel: ACPI: Added _OSI(Processor Device) Mar 17 18:19:41.002756 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Mar 17 18:19:41.004882 kernel: ACPI: Added _OSI(Processor Aggregator Device) Mar 17 18:19:41.004920 kernel: ACPI: Added _OSI(Linux-Dell-Video) Mar 17 18:19:41.004938 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Mar 17 18:19:41.004954 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Mar 17 18:19:41.004971 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Mar 17 18:19:41.004997 kernel: ACPI: Interpreter enabled Mar 17 18:19:41.005014 kernel: ACPI: Using GIC for interrupt routing Mar 17 18:19:41.005030 kernel: ACPI: MCFG table detected, 1 entries Mar 17 18:19:41.005047 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Mar 17 18:19:41.005338 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Mar 17 18:19:41.005536 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Mar 17 18:19:41.005730 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Mar 17 18:19:41.005964 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Mar 17 18:19:41.006163 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Mar 17 18:19:41.006186 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Mar 17 18:19:41.006203 kernel: acpiphp: Slot [1] registered Mar 17 18:19:41.006220 kernel: acpiphp: Slot [2] registered Mar 17 18:19:41.006237 kernel: acpiphp: Slot [3] registered Mar 17 18:19:41.006253 kernel: acpiphp: Slot [4] registered Mar 17 18:19:41.006269 kernel: acpiphp: Slot [5] registered Mar 17 18:19:41.006286 kernel: acpiphp: Slot [6] registered Mar 17 18:19:41.006302 kernel: acpiphp: Slot [7] registered Mar 17 18:19:41.006322 kernel: acpiphp: Slot [8] registered Mar 17 18:19:41.006339 kernel: acpiphp: Slot [9] registered Mar 17 18:19:41.006355 kernel: acpiphp: Slot [10] registered Mar 17 18:19:41.006371 kernel: acpiphp: Slot [11] registered Mar 17 18:19:41.006387 kernel: acpiphp: Slot [12] registered Mar 17 18:19:41.006403 kernel: acpiphp: Slot [13] registered Mar 17 18:19:41.006419 kernel: acpiphp: Slot [14] registered Mar 17 18:19:41.006435 kernel: acpiphp: Slot [15] registered Mar 17 18:19:41.006452 kernel: acpiphp: Slot [16] registered Mar 17 18:19:41.006472 kernel: acpiphp: Slot [17] registered Mar 17 18:19:41.006488 kernel: acpiphp: Slot [18] registered Mar 17 18:19:41.006505 kernel: acpiphp: Slot [19] registered Mar 17 18:19:41.006521 kernel: acpiphp: Slot [20] registered Mar 17 18:19:41.006537 kernel: acpiphp: Slot [21] registered Mar 17 18:19:41.006569 kernel: acpiphp: Slot [22] registered Mar 17 18:19:41.006601 kernel: acpiphp: Slot [23] registered Mar 17 18:19:41.006618 kernel: acpiphp: Slot [24] registered Mar 17 18:19:41.006635 kernel: acpiphp: Slot [25] registered Mar 17 18:19:41.006652 kernel: acpiphp: Slot [26] registered Mar 17 18:19:41.006674 kernel: acpiphp: Slot [27] registered Mar 17 18:19:41.006691 kernel: acpiphp: Slot [28] registered Mar 17 18:19:41.006707 kernel: acpiphp: Slot [29] registered Mar 17 18:19:41.006723 kernel: acpiphp: Slot [30] registered Mar 17 18:19:41.006740 kernel: acpiphp: Slot [31] registered Mar 17 18:19:41.006756 kernel: PCI host bridge to bus 0000:00 Mar 17 18:19:41.007044 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Mar 17 18:19:41.010079 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Mar 17 18:19:41.010963 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Mar 17 18:19:41.011193 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Mar 17 18:19:41.011426 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Mar 17 18:19:41.011665 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Mar 17 18:19:41.011909 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Mar 17 18:19:41.012137 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Mar 17 18:19:41.012365 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Mar 17 18:19:41.027992 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Mar 17 18:19:41.028306 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Mar 17 18:19:41.028514 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Mar 17 18:19:41.028713 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Mar 17 18:19:41.029898 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Mar 17 18:19:41.030141 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Mar 17 18:19:41.030354 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Mar 17 18:19:41.030594 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Mar 17 18:19:41.030803 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Mar 17 18:19:41.033146 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Mar 17 18:19:41.033383 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Mar 17 18:19:41.033574 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Mar 17 18:19:41.033754 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Mar 17 18:19:41.033987 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Mar 17 18:19:41.034014 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Mar 17 18:19:41.034033 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Mar 17 18:19:41.034050 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Mar 17 18:19:41.034067 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Mar 17 18:19:41.034083 kernel: iommu: Default domain type: Translated Mar 17 18:19:41.034100 kernel: iommu: DMA domain TLB invalidation policy: strict mode Mar 17 18:19:41.034116 kernel: vgaarb: loaded Mar 17 18:19:41.034133 kernel: pps_core: LinuxPPS API ver. 1 registered Mar 17 18:19:41.034157 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Mar 17 18:19:41.034173 kernel: PTP clock support registered Mar 17 18:19:41.034190 kernel: Registered efivars operations Mar 17 18:19:41.034207 kernel: clocksource: Switched to clocksource arch_sys_counter Mar 17 18:19:41.034224 kernel: VFS: Disk quotas dquot_6.6.0 Mar 17 18:19:41.034240 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Mar 17 18:19:41.034256 kernel: pnp: PnP ACPI init Mar 17 18:19:41.034466 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Mar 17 18:19:41.034498 kernel: pnp: PnP ACPI: found 1 devices Mar 17 18:19:41.034515 kernel: NET: Registered PF_INET protocol family Mar 17 18:19:41.034532 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Mar 17 18:19:41.034549 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Mar 17 18:19:41.034566 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Mar 17 18:19:41.034583 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Mar 17 18:19:41.034628 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Mar 17 18:19:41.034646 kernel: TCP: Hash tables configured (established 32768 bind 32768) Mar 17 18:19:41.034663 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Mar 17 18:19:41.034686 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Mar 17 18:19:41.034704 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Mar 17 18:19:41.034720 kernel: PCI: CLS 0 bytes, default 64 Mar 17 18:19:41.034737 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Mar 17 18:19:41.034754 kernel: kvm [1]: HYP mode not available Mar 17 18:19:41.036922 kernel: Initialise system trusted keyrings Mar 17 18:19:41.036945 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Mar 17 18:19:41.036963 kernel: Key type asymmetric registered Mar 17 18:19:41.036980 kernel: Asymmetric key parser 'x509' registered Mar 17 18:19:41.037004 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Mar 17 18:19:41.037021 kernel: io scheduler mq-deadline registered Mar 17 18:19:41.037038 kernel: io scheduler kyber registered Mar 17 18:19:41.037054 kernel: io scheduler bfq registered Mar 17 18:19:41.037304 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Mar 17 18:19:41.037339 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Mar 17 18:19:41.037356 kernel: ACPI: button: Power Button [PWRB] Mar 17 18:19:41.037373 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1 Mar 17 18:19:41.037395 kernel: ACPI: button: Sleep Button [SLPB] Mar 17 18:19:41.037413 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Mar 17 18:19:41.037430 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Mar 17 18:19:41.037640 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Mar 17 18:19:41.037665 kernel: printk: console [ttyS0] disabled Mar 17 18:19:41.037683 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Mar 17 18:19:41.037699 kernel: printk: console [ttyS0] enabled Mar 17 18:19:41.037715 kernel: printk: bootconsole [uart0] disabled Mar 17 18:19:41.037732 kernel: thunder_xcv, ver 1.0 Mar 17 18:19:41.037754 kernel: thunder_bgx, ver 1.0 Mar 17 18:19:41.037770 kernel: nicpf, ver 1.0 Mar 17 18:19:41.037787 kernel: nicvf, ver 1.0 Mar 17 18:19:41.038056 kernel: rtc-efi rtc-efi.0: registered as rtc0 Mar 17 18:19:41.038266 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-03-17T18:19:40 UTC (1742235580) Mar 17 18:19:41.038295 kernel: hid: raw HID events driver (C) Jiri Kosina Mar 17 18:19:41.038313 kernel: NET: Registered PF_INET6 protocol family Mar 17 18:19:41.038330 kernel: Segment Routing with IPv6 Mar 17 18:19:41.038347 kernel: In-situ OAM (IOAM) with IPv6 Mar 17 18:19:41.038372 kernel: NET: Registered PF_PACKET protocol family Mar 17 18:19:41.038389 kernel: Key type dns_resolver registered Mar 17 18:19:41.038406 kernel: registered taskstats version 1 Mar 17 18:19:41.038422 kernel: Loading compiled-in X.509 certificates Mar 17 18:19:41.038439 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.179-flatcar: c6f3fb83dc6bb7052b07ec5b1ef41d12f9b3f7e4' Mar 17 18:19:41.038456 kernel: Key type .fscrypt registered Mar 17 18:19:41.038472 kernel: Key type fscrypt-provisioning registered Mar 17 18:19:41.038489 kernel: ima: No TPM chip found, activating TPM-bypass! Mar 17 18:19:41.038506 kernel: ima: Allocated hash algorithm: sha1 Mar 17 18:19:41.038527 kernel: ima: No architecture policies found Mar 17 18:19:41.038544 kernel: clk: Disabling unused clocks Mar 17 18:19:41.038560 kernel: Freeing unused kernel memory: 36416K Mar 17 18:19:41.038578 kernel: Run /init as init process Mar 17 18:19:41.038595 kernel: with arguments: Mar 17 18:19:41.038611 kernel: /init Mar 17 18:19:41.038627 kernel: with environment: Mar 17 18:19:41.038643 kernel: HOME=/ Mar 17 18:19:41.038660 kernel: TERM=linux Mar 17 18:19:41.038679 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Mar 17 18:19:41.038702 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 18:19:41.038725 systemd[1]: Detected virtualization amazon. Mar 17 18:19:41.038743 systemd[1]: Detected architecture arm64. Mar 17 18:19:41.038761 systemd[1]: Running in initrd. Mar 17 18:19:41.038779 systemd[1]: No hostname configured, using default hostname. Mar 17 18:19:41.038797 systemd[1]: Hostname set to . Mar 17 18:19:41.038865 systemd[1]: Initializing machine ID from VM UUID. Mar 17 18:19:41.038886 systemd[1]: Queued start job for default target initrd.target. Mar 17 18:19:41.038919 systemd[1]: Started systemd-ask-password-console.path. Mar 17 18:19:41.038943 systemd[1]: Reached target cryptsetup.target. Mar 17 18:19:41.038961 systemd[1]: Reached target paths.target. Mar 17 18:19:41.038979 systemd[1]: Reached target slices.target. Mar 17 18:19:41.038997 systemd[1]: Reached target swap.target. Mar 17 18:19:41.039015 systemd[1]: Reached target timers.target. Mar 17 18:19:41.039039 systemd[1]: Listening on iscsid.socket. Mar 17 18:19:41.039058 systemd[1]: Listening on iscsiuio.socket. Mar 17 18:19:41.039076 systemd[1]: Listening on systemd-journald-audit.socket. Mar 17 18:19:41.039094 systemd[1]: Listening on systemd-journald-dev-log.socket. Mar 17 18:19:41.039112 systemd[1]: Listening on systemd-journald.socket. Mar 17 18:19:41.039130 systemd[1]: Listening on systemd-networkd.socket. Mar 17 18:19:41.039147 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 18:19:41.039165 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 18:19:41.039187 systemd[1]: Reached target sockets.target. Mar 17 18:19:41.039205 systemd[1]: Starting kmod-static-nodes.service... Mar 17 18:19:41.039223 systemd[1]: Finished network-cleanup.service. Mar 17 18:19:41.039240 systemd[1]: Starting systemd-fsck-usr.service... Mar 17 18:19:41.039258 systemd[1]: Starting systemd-journald.service... Mar 17 18:19:41.039276 systemd[1]: Starting systemd-modules-load.service... Mar 17 18:19:41.039294 systemd[1]: Starting systemd-resolved.service... Mar 17 18:19:41.039311 systemd[1]: Starting systemd-vconsole-setup.service... Mar 17 18:19:41.039329 systemd[1]: Finished kmod-static-nodes.service. Mar 17 18:19:41.039351 systemd[1]: Finished systemd-fsck-usr.service. Mar 17 18:19:41.039371 kernel: audit: type=1130 audit(1742235580.991:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:41.039390 systemd[1]: Finished systemd-vconsole-setup.service. Mar 17 18:19:41.039407 systemd[1]: Starting dracut-cmdline-ask.service... Mar 17 18:19:41.039425 kernel: audit: type=1130 audit(1742235581.007:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:41.039444 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Mar 17 18:19:41.039467 systemd-journald[310]: Journal started Mar 17 18:19:41.039569 systemd-journald[310]: Runtime Journal (/run/log/journal/ec28b5e9d511385ae1c7a77371cebc9d) is 8.0M, max 75.4M, 67.4M free. Mar 17 18:19:40.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:41.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:41.003413 systemd-modules-load[311]: Inserted module 'overlay' Mar 17 18:19:41.054416 systemd[1]: Started systemd-journald.service. Mar 17 18:19:41.072703 kernel: audit: type=1130 audit(1742235581.053:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:41.072769 kernel: audit: type=1130 audit(1742235581.062:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:41.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:41.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:41.063684 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Mar 17 18:19:41.087342 systemd[1]: Finished dracut-cmdline-ask.service. Mar 17 18:19:41.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:41.104855 kernel: audit: type=1130 audit(1742235581.087:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:41.099256 systemd[1]: Starting dracut-cmdline.service... Mar 17 18:19:41.111357 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 17 18:19:41.119965 systemd-modules-load[311]: Inserted module 'br_netfilter' Mar 17 18:19:41.122002 kernel: Bridge firewalling registered Mar 17 18:19:41.126155 systemd-resolved[312]: Positive Trust Anchors: Mar 17 18:19:41.129147 systemd-resolved[312]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 18:19:41.146863 kernel: SCSI subsystem initialized Mar 17 18:19:41.147165 systemd-resolved[312]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 18:19:41.164382 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Mar 17 18:19:41.164460 kernel: device-mapper: uevent: version 1.0.3 Mar 17 18:19:41.165946 dracut-cmdline[327]: dracut-dracut-053 Mar 17 18:19:41.169983 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Mar 17 18:19:41.174359 dracut-cmdline[327]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=e034db32d58fe7496a3db6ba3879dd9052cea2cf1597d65edfc7b26afc92530d Mar 17 18:19:41.195424 systemd-modules-load[311]: Inserted module 'dm_multipath' Mar 17 18:19:41.198103 systemd[1]: Finished systemd-modules-load.service. Mar 17 18:19:41.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:41.201290 systemd[1]: Starting systemd-sysctl.service... Mar 17 18:19:41.210978 kernel: audit: type=1130 audit(1742235581.197:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:41.230444 systemd[1]: Finished systemd-sysctl.service. Mar 17 18:19:41.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:41.239852 kernel: audit: type=1130 audit(1742235581.230:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:41.333844 kernel: Loading iSCSI transport class v2.0-870. Mar 17 18:19:41.352857 kernel: iscsi: registered transport (tcp) Mar 17 18:19:41.379425 kernel: iscsi: registered transport (qla4xxx) Mar 17 18:19:41.379495 kernel: QLogic iSCSI HBA Driver Mar 17 18:19:41.561611 systemd-resolved[312]: Defaulting to hostname 'linux'. Mar 17 18:19:41.564029 kernel: random: crng init done Mar 17 18:19:41.566129 systemd[1]: Started systemd-resolved.service. Mar 17 18:19:41.578035 kernel: audit: type=1130 audit(1742235581.564:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:41.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:41.566595 systemd[1]: Reached target nss-lookup.target. Mar 17 18:19:41.595251 systemd[1]: Finished dracut-cmdline.service. Mar 17 18:19:41.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:41.604874 systemd[1]: Starting dracut-pre-udev.service... Mar 17 18:19:41.609869 kernel: audit: type=1130 audit(1742235581.596:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:41.673867 kernel: raid6: neonx8 gen() 6427 MB/s Mar 17 18:19:41.691856 kernel: raid6: neonx8 xor() 4743 MB/s Mar 17 18:19:41.709861 kernel: raid6: neonx4 gen() 6489 MB/s Mar 17 18:19:41.727864 kernel: raid6: neonx4 xor() 4896 MB/s Mar 17 18:19:41.745863 kernel: raid6: neonx2 gen() 5745 MB/s Mar 17 18:19:41.763865 kernel: raid6: neonx2 xor() 4521 MB/s Mar 17 18:19:41.781866 kernel: raid6: neonx1 gen() 4439 MB/s Mar 17 18:19:41.799863 kernel: raid6: neonx1 xor() 3652 MB/s Mar 17 18:19:41.817864 kernel: raid6: int64x8 gen() 3404 MB/s Mar 17 18:19:41.835863 kernel: raid6: int64x8 xor() 2080 MB/s Mar 17 18:19:41.853863 kernel: raid6: int64x4 gen() 3777 MB/s Mar 17 18:19:41.871864 kernel: raid6: int64x4 xor() 2183 MB/s Mar 17 18:19:41.889867 kernel: raid6: int64x2 gen() 3583 MB/s Mar 17 18:19:41.907865 kernel: raid6: int64x2 xor() 1936 MB/s Mar 17 18:19:41.925865 kernel: raid6: int64x1 gen() 2756 MB/s Mar 17 18:19:41.945052 kernel: raid6: int64x1 xor() 1445 MB/s Mar 17 18:19:41.945116 kernel: raid6: using algorithm neonx4 gen() 6489 MB/s Mar 17 18:19:41.945140 kernel: raid6: .... xor() 4896 MB/s, rmw enabled Mar 17 18:19:41.946691 kernel: raid6: using neon recovery algorithm Mar 17 18:19:41.967216 kernel: xor: measuring software checksum speed Mar 17 18:19:41.967289 kernel: 8regs : 9351 MB/sec Mar 17 18:19:41.968961 kernel: 32regs : 11084 MB/sec Mar 17 18:19:41.970781 kernel: arm64_neon : 9198 MB/sec Mar 17 18:19:41.970847 kernel: xor: using function: 32regs (11084 MB/sec) Mar 17 18:19:42.065875 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Mar 17 18:19:42.085552 systemd[1]: Finished dracut-pre-udev.service. Mar 17 18:19:42.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:42.087000 audit: BPF prog-id=7 op=LOAD Mar 17 18:19:42.087000 audit: BPF prog-id=8 op=LOAD Mar 17 18:19:42.090071 systemd[1]: Starting systemd-udevd.service... Mar 17 18:19:42.119578 systemd-udevd[509]: Using default interface naming scheme 'v252'. Mar 17 18:19:42.130135 systemd[1]: Started systemd-udevd.service. Mar 17 18:19:42.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:42.135177 systemd[1]: Starting dracut-pre-trigger.service... Mar 17 18:19:42.170215 dracut-pre-trigger[516]: rd.md=0: removing MD RAID activation Mar 17 18:19:42.235460 systemd[1]: Finished dracut-pre-trigger.service. Mar 17 18:19:42.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:42.240127 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 18:19:42.343181 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 18:19:42.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:42.480124 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Mar 17 18:19:42.480206 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Mar 17 18:19:42.507191 kernel: ena 0000:00:05.0: ENA device version: 0.10 Mar 17 18:19:42.507447 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Mar 17 18:19:42.507486 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Mar 17 18:19:42.507700 kernel: nvme nvme0: pci function 0000:00:04.0 Mar 17 18:19:42.508092 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:82:f7:de:91:9d Mar 17 18:19:42.508317 kernel: nvme nvme0: 2/0/0 default/read/poll queues Mar 17 18:19:42.515528 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Mar 17 18:19:42.515606 kernel: GPT:9289727 != 16777215 Mar 17 18:19:42.515631 kernel: GPT:Alternate GPT header not at the end of the disk. Mar 17 18:19:42.517716 kernel: GPT:9289727 != 16777215 Mar 17 18:19:42.519015 kernel: GPT: Use GNU Parted to correct GPT errors. Mar 17 18:19:42.522268 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Mar 17 18:19:42.527751 (udev-worker)[554]: Network interface NamePolicy= disabled on kernel command line. Mar 17 18:19:42.605866 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (556) Mar 17 18:19:42.684603 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Mar 17 18:19:42.710992 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Mar 17 18:19:42.715924 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Mar 17 18:19:42.740967 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Mar 17 18:19:42.755022 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 18:19:42.760112 systemd[1]: Starting disk-uuid.service... Mar 17 18:19:42.770928 disk-uuid[667]: Primary Header is updated. Mar 17 18:19:42.770928 disk-uuid[667]: Secondary Entries is updated. Mar 17 18:19:42.770928 disk-uuid[667]: Secondary Header is updated. Mar 17 18:19:42.780858 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Mar 17 18:19:42.787856 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Mar 17 18:19:42.796857 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Mar 17 18:19:43.800765 disk-uuid[668]: The operation has completed successfully. Mar 17 18:19:43.803059 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Mar 17 18:19:43.969320 systemd[1]: disk-uuid.service: Deactivated successfully. Mar 17 18:19:43.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:43.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:43.969535 systemd[1]: Finished disk-uuid.service. Mar 17 18:19:44.004674 systemd[1]: Starting verity-setup.service... Mar 17 18:19:44.029862 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Mar 17 18:19:44.122778 systemd[1]: Found device dev-mapper-usr.device. Mar 17 18:19:44.129409 systemd[1]: Mounting sysusr-usr.mount... Mar 17 18:19:44.135227 systemd[1]: Finished verity-setup.service. Mar 17 18:19:44.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:44.228839 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Mar 17 18:19:44.229486 systemd[1]: Mounted sysusr-usr.mount. Mar 17 18:19:44.232360 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Mar 17 18:19:44.236171 systemd[1]: Starting ignition-setup.service... Mar 17 18:19:44.242927 systemd[1]: Starting parse-ip-for-networkd.service... Mar 17 18:19:44.276486 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Mar 17 18:19:44.276562 kernel: BTRFS info (device nvme0n1p6): using free space tree Mar 17 18:19:44.278851 kernel: BTRFS info (device nvme0n1p6): has skinny extents Mar 17 18:19:44.289876 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Mar 17 18:19:44.308604 systemd[1]: mnt-oem.mount: Deactivated successfully. Mar 17 18:19:44.325393 systemd[1]: Finished ignition-setup.service. Mar 17 18:19:44.330284 systemd[1]: Starting ignition-fetch-offline.service... Mar 17 18:19:44.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:44.403500 systemd[1]: Finished parse-ip-for-networkd.service. Mar 17 18:19:44.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:44.406000 audit: BPF prog-id=9 op=LOAD Mar 17 18:19:44.408960 systemd[1]: Starting systemd-networkd.service... Mar 17 18:19:44.454626 systemd-networkd[1179]: lo: Link UP Mar 17 18:19:44.454650 systemd-networkd[1179]: lo: Gained carrier Mar 17 18:19:44.456433 systemd-networkd[1179]: Enumeration completed Mar 17 18:19:44.456922 systemd-networkd[1179]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 18:19:44.458606 systemd[1]: Started systemd-networkd.service. Mar 17 18:19:44.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:44.465112 systemd[1]: Reached target network.target. Mar 17 18:19:44.480769 systemd-networkd[1179]: eth0: Link UP Mar 17 18:19:44.480987 systemd-networkd[1179]: eth0: Gained carrier Mar 17 18:19:44.485013 systemd[1]: Starting iscsiuio.service... Mar 17 18:19:44.495337 systemd[1]: Started iscsiuio.service. Mar 17 18:19:44.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:44.501696 systemd[1]: Starting iscsid.service... Mar 17 18:19:44.511027 systemd-networkd[1179]: eth0: DHCPv4 address 172.31.22.27/20, gateway 172.31.16.1 acquired from 172.31.16.1 Mar 17 18:19:44.518983 iscsid[1184]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Mar 17 18:19:44.518983 iscsid[1184]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Mar 17 18:19:44.518983 iscsid[1184]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Mar 17 18:19:44.518983 iscsid[1184]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Mar 17 18:19:44.518983 iscsid[1184]: If using hardware iscsi like qla4xxx this message can be ignored. Mar 17 18:19:44.518983 iscsid[1184]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Mar 17 18:19:44.518983 iscsid[1184]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Mar 17 18:19:44.513190 systemd[1]: Started iscsid.service. Mar 17 18:19:44.547163 systemd[1]: Starting dracut-initqueue.service... Mar 17 18:19:44.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:44.571414 systemd[1]: Finished dracut-initqueue.service. Mar 17 18:19:44.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:44.573482 systemd[1]: Reached target remote-fs-pre.target. Mar 17 18:19:44.577324 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 18:19:44.580924 systemd[1]: Reached target remote-fs.target. Mar 17 18:19:44.595255 systemd[1]: Starting dracut-pre-mount.service... Mar 17 18:19:44.616229 systemd[1]: Finished dracut-pre-mount.service. Mar 17 18:19:44.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:44.731339 ignition[1119]: Ignition 2.14.0 Mar 17 18:19:44.731371 ignition[1119]: Stage: fetch-offline Mar 17 18:19:44.731744 ignition[1119]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:19:44.731806 ignition[1119]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Mar 17 18:19:44.755298 ignition[1119]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Mar 17 18:19:44.758010 ignition[1119]: Ignition finished successfully Mar 17 18:19:44.761000 systemd[1]: Finished ignition-fetch-offline.service. Mar 17 18:19:44.772666 kernel: kauditd_printk_skb: 17 callbacks suppressed Mar 17 18:19:44.773954 kernel: audit: type=1130 audit(1742235584.763:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:44.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:44.765662 systemd[1]: Starting ignition-fetch.service... Mar 17 18:19:44.780982 ignition[1203]: Ignition 2.14.0 Mar 17 18:19:44.781031 ignition[1203]: Stage: fetch Mar 17 18:19:44.781741 ignition[1203]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:19:44.782068 ignition[1203]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Mar 17 18:19:44.800598 ignition[1203]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Mar 17 18:19:44.803126 ignition[1203]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Mar 17 18:19:44.815046 ignition[1203]: INFO : PUT result: OK Mar 17 18:19:44.818999 ignition[1203]: DEBUG : parsed url from cmdline: "" Mar 17 18:19:44.818999 ignition[1203]: INFO : no config URL provided Mar 17 18:19:44.822532 ignition[1203]: INFO : reading system config file "/usr/lib/ignition/user.ign" Mar 17 18:19:44.822532 ignition[1203]: INFO : no config at "/usr/lib/ignition/user.ign" Mar 17 18:19:44.822532 ignition[1203]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Mar 17 18:19:44.822532 ignition[1203]: INFO : PUT result: OK Mar 17 18:19:44.830473 ignition[1203]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Mar 17 18:19:44.839003 ignition[1203]: INFO : GET result: OK Mar 17 18:19:44.839003 ignition[1203]: DEBUG : parsing config with SHA512: c4a8e90a7a07317cba31ac758f3a6fb6c555e4467cfa4636d73dbf44599c3faf8f1f070de30c5782953b8a235b17fb2e021a3d30e9160b6ebec94d0081c0a267 Mar 17 18:19:44.836393 ignition[1203]: fetch: fetch complete Mar 17 18:19:44.835203 unknown[1203]: fetched base config from "system" Mar 17 18:19:44.836406 ignition[1203]: fetch: fetch passed Mar 17 18:19:44.859957 kernel: audit: type=1130 audit(1742235584.849:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:44.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:44.835221 unknown[1203]: fetched base config from "system" Mar 17 18:19:44.836539 ignition[1203]: Ignition finished successfully Mar 17 18:19:44.835262 unknown[1203]: fetched user config from "aws" Mar 17 18:19:44.840013 systemd[1]: Finished ignition-fetch.service. Mar 17 18:19:44.853622 systemd[1]: Starting ignition-kargs.service... Mar 17 18:19:44.877410 ignition[1209]: Ignition 2.14.0 Mar 17 18:19:44.877425 ignition[1209]: Stage: kargs Mar 17 18:19:44.877720 ignition[1209]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:19:44.877779 ignition[1209]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Mar 17 18:19:44.894525 ignition[1209]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Mar 17 18:19:44.897049 ignition[1209]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Mar 17 18:19:44.900101 ignition[1209]: INFO : PUT result: OK Mar 17 18:19:44.904746 ignition[1209]: kargs: kargs passed Mar 17 18:19:44.906279 ignition[1209]: Ignition finished successfully Mar 17 18:19:44.909516 systemd[1]: Finished ignition-kargs.service. Mar 17 18:19:44.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:44.913894 systemd[1]: Starting ignition-disks.service... Mar 17 18:19:44.924863 kernel: audit: type=1130 audit(1742235584.911:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:44.928898 ignition[1215]: Ignition 2.14.0 Mar 17 18:19:44.929566 ignition[1215]: Stage: disks Mar 17 18:19:44.931849 ignition[1215]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:19:44.932658 ignition[1215]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Mar 17 18:19:44.944474 ignition[1215]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Mar 17 18:19:44.947054 ignition[1215]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Mar 17 18:19:44.949638 ignition[1215]: INFO : PUT result: OK Mar 17 18:19:44.954481 ignition[1215]: disks: disks passed Mar 17 18:19:44.954588 ignition[1215]: Ignition finished successfully Mar 17 18:19:44.958480 systemd[1]: Finished ignition-disks.service. Mar 17 18:19:44.961480 systemd[1]: Reached target initrd-root-device.target. Mar 17 18:19:44.971689 kernel: audit: type=1130 audit(1742235584.959:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:44.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:44.961622 systemd[1]: Reached target local-fs-pre.target. Mar 17 18:19:44.973159 systemd[1]: Reached target local-fs.target. Mar 17 18:19:44.977575 systemd[1]: Reached target sysinit.target. Mar 17 18:19:44.980335 systemd[1]: Reached target basic.target. Mar 17 18:19:44.984471 systemd[1]: Starting systemd-fsck-root.service... Mar 17 18:19:45.035878 systemd-fsck[1223]: ROOT: clean, 623/553520 files, 56021/553472 blocks Mar 17 18:19:45.044072 systemd[1]: Finished systemd-fsck-root.service. Mar 17 18:19:45.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:45.048598 systemd[1]: Mounting sysroot.mount... Mar 17 18:19:45.056466 kernel: audit: type=1130 audit(1742235585.046:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:45.071836 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Mar 17 18:19:45.072800 systemd[1]: Mounted sysroot.mount. Mar 17 18:19:45.073662 systemd[1]: Reached target initrd-root-fs.target. Mar 17 18:19:45.083197 systemd[1]: Mounting sysroot-usr.mount... Mar 17 18:19:45.086934 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Mar 17 18:19:45.087067 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Mar 17 18:19:45.087134 systemd[1]: Reached target ignition-diskful.target. Mar 17 18:19:45.105555 systemd[1]: Mounted sysroot-usr.mount. Mar 17 18:19:45.113371 systemd[1]: Starting initrd-setup-root.service... Mar 17 18:19:45.129319 initrd-setup-root[1244]: cut: /sysroot/etc/passwd: No such file or directory Mar 17 18:19:45.157950 initrd-setup-root[1252]: cut: /sysroot/etc/group: No such file or directory Mar 17 18:19:45.162231 systemd[1]: Mounting sysroot-usr-share-oem.mount... Mar 17 18:19:45.172525 initrd-setup-root[1261]: cut: /sysroot/etc/shadow: No such file or directory Mar 17 18:19:45.182123 initrd-setup-root[1269]: cut: /sysroot/etc/gshadow: No such file or directory Mar 17 18:19:45.189866 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1258) Mar 17 18:19:45.195869 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Mar 17 18:19:45.195938 kernel: BTRFS info (device nvme0n1p6): using free space tree Mar 17 18:19:45.195972 kernel: BTRFS info (device nvme0n1p6): has skinny extents Mar 17 18:19:45.231876 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Mar 17 18:19:45.242469 systemd[1]: Mounted sysroot-usr-share-oem.mount. Mar 17 18:19:45.371631 systemd[1]: Finished initrd-setup-root.service. Mar 17 18:19:45.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:45.376031 systemd[1]: Starting ignition-mount.service... Mar 17 18:19:45.385778 systemd[1]: Starting sysroot-boot.service... Mar 17 18:19:45.391232 kernel: audit: type=1130 audit(1742235585.373:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:45.397571 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Mar 17 18:19:45.397741 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Mar 17 18:19:45.431328 systemd[1]: Finished sysroot-boot.service. Mar 17 18:19:45.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:45.440934 kernel: audit: type=1130 audit(1742235585.433:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:45.471455 ignition[1309]: INFO : Ignition 2.14.0 Mar 17 18:19:45.473297 ignition[1309]: INFO : Stage: mount Mar 17 18:19:45.475046 ignition[1309]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:19:45.477524 ignition[1309]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Mar 17 18:19:45.492619 ignition[1309]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Mar 17 18:19:45.495412 ignition[1309]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Mar 17 18:19:45.497794 ignition[1309]: INFO : PUT result: OK Mar 17 18:19:45.502942 ignition[1309]: INFO : mount: mount passed Mar 17 18:19:45.504570 ignition[1309]: INFO : Ignition finished successfully Mar 17 18:19:45.507520 systemd[1]: Finished ignition-mount.service. Mar 17 18:19:45.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:45.518536 systemd[1]: Starting ignition-files.service... Mar 17 18:19:45.521644 kernel: audit: type=1130 audit(1742235585.508:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:45.527356 systemd[1]: Mounting sysroot-usr-share-oem.mount... Mar 17 18:19:45.548861 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1316) Mar 17 18:19:45.554388 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Mar 17 18:19:45.554460 kernel: BTRFS info (device nvme0n1p6): using free space tree Mar 17 18:19:45.554486 kernel: BTRFS info (device nvme0n1p6): has skinny extents Mar 17 18:19:45.569861 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Mar 17 18:19:45.575452 systemd[1]: Mounted sysroot-usr-share-oem.mount. Mar 17 18:19:45.594393 ignition[1335]: INFO : Ignition 2.14.0 Mar 17 18:19:45.594393 ignition[1335]: INFO : Stage: files Mar 17 18:19:45.597607 ignition[1335]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:19:45.597607 ignition[1335]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Mar 17 18:19:45.614720 ignition[1335]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Mar 17 18:19:45.617459 ignition[1335]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Mar 17 18:19:45.620100 ignition[1335]: INFO : PUT result: OK Mar 17 18:19:45.625092 ignition[1335]: DEBUG : files: compiled without relabeling support, skipping Mar 17 18:19:45.629725 ignition[1335]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Mar 17 18:19:45.629725 ignition[1335]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Mar 17 18:19:45.672101 ignition[1335]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Mar 17 18:19:45.675043 ignition[1335]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Mar 17 18:19:45.678503 unknown[1335]: wrote ssh authorized keys file for user: core Mar 17 18:19:45.683854 ignition[1335]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Mar 17 18:19:45.683854 ignition[1335]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Mar 17 18:19:45.683854 ignition[1335]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Mar 17 18:19:45.698356 ignition[1335]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2234924459" Mar 17 18:19:45.698356 ignition[1335]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2234924459": device or resource busy Mar 17 18:19:45.698356 ignition[1335]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2234924459", trying btrfs: device or resource busy Mar 17 18:19:45.698356 ignition[1335]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2234924459" Mar 17 18:19:45.698356 ignition[1335]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2234924459" Mar 17 18:19:45.719569 ignition[1335]: INFO : op(3): [started] unmounting "/mnt/oem2234924459" Mar 17 18:19:45.719569 ignition[1335]: INFO : op(3): [finished] unmounting "/mnt/oem2234924459" Mar 17 18:19:45.719569 ignition[1335]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Mar 17 18:19:45.719569 ignition[1335]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Mar 17 18:19:45.719569 ignition[1335]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Mar 17 18:19:45.733340 ignition[1335]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 18:19:45.733340 ignition[1335]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 18:19:45.733340 ignition[1335]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Mar 17 18:19:45.733340 ignition[1335]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Mar 17 18:19:45.733340 ignition[1335]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Mar 17 18:19:45.752752 ignition[1335]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Mar 17 18:19:45.761557 ignition[1335]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3886920059" Mar 17 18:19:45.761557 ignition[1335]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3886920059": device or resource busy Mar 17 18:19:45.761557 ignition[1335]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3886920059", trying btrfs: device or resource busy Mar 17 18:19:45.761557 ignition[1335]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3886920059" Mar 17 18:19:45.761557 ignition[1335]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3886920059" Mar 17 18:19:45.761557 ignition[1335]: INFO : op(6): [started] unmounting "/mnt/oem3886920059" Mar 17 18:19:45.761557 ignition[1335]: INFO : op(6): [finished] unmounting "/mnt/oem3886920059" Mar 17 18:19:45.761557 ignition[1335]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Mar 17 18:19:45.783944 ignition[1335]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Mar 17 18:19:45.783944 ignition[1335]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Mar 17 18:19:45.798982 ignition[1335]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2318052463" Mar 17 18:19:45.798982 ignition[1335]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2318052463": device or resource busy Mar 17 18:19:45.798982 ignition[1335]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2318052463", trying btrfs: device or resource busy Mar 17 18:19:45.798982 ignition[1335]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2318052463" Mar 17 18:19:45.810682 ignition[1335]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2318052463" Mar 17 18:19:45.810682 ignition[1335]: INFO : op(9): [started] unmounting "/mnt/oem2318052463" Mar 17 18:19:45.810682 ignition[1335]: INFO : op(9): [finished] unmounting "/mnt/oem2318052463" Mar 17 18:19:45.810682 ignition[1335]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Mar 17 18:19:45.810682 ignition[1335]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Mar 17 18:19:45.810682 ignition[1335]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Mar 17 18:19:45.837746 ignition[1335]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3065288635" Mar 17 18:19:45.837746 ignition[1335]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3065288635": device or resource busy Mar 17 18:19:45.837746 ignition[1335]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3065288635", trying btrfs: device or resource busy Mar 17 18:19:45.837746 ignition[1335]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3065288635" Mar 17 18:19:45.837746 ignition[1335]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3065288635" Mar 17 18:19:45.837746 ignition[1335]: INFO : op(c): [started] unmounting "/mnt/oem3065288635" Mar 17 18:19:45.856535 ignition[1335]: INFO : op(c): [finished] unmounting "/mnt/oem3065288635" Mar 17 18:19:45.856535 ignition[1335]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Mar 17 18:19:45.856535 ignition[1335]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Mar 17 18:19:45.856535 ignition[1335]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-arm64.raw: attempt #1 Mar 17 18:19:46.323460 ignition[1335]: INFO : GET result: OK Mar 17 18:19:46.407986 systemd-networkd[1179]: eth0: Gained IPv6LL Mar 17 18:19:46.879520 ignition[1335]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Mar 17 18:19:46.883928 ignition[1335]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Mar 17 18:19:46.886555 ignition[1335]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Mar 17 18:19:46.889193 ignition[1335]: INFO : files: op(c): [started] processing unit "amazon-ssm-agent.service" Mar 17 18:19:46.891587 ignition[1335]: INFO : files: op(c): op(d): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Mar 17 18:19:46.895511 ignition[1335]: INFO : files: op(c): op(d): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Mar 17 18:19:46.895511 ignition[1335]: INFO : files: op(c): [finished] processing unit "amazon-ssm-agent.service" Mar 17 18:19:46.895511 ignition[1335]: INFO : files: op(e): [started] processing unit "nvidia.service" Mar 17 18:19:46.895511 ignition[1335]: INFO : files: op(e): [finished] processing unit "nvidia.service" Mar 17 18:19:46.906108 ignition[1335]: INFO : files: op(f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Mar 17 18:19:46.906108 ignition[1335]: INFO : files: op(f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Mar 17 18:19:46.906108 ignition[1335]: INFO : files: op(10): [started] setting preset to enabled for "amazon-ssm-agent.service" Mar 17 18:19:46.906108 ignition[1335]: INFO : files: op(10): [finished] setting preset to enabled for "amazon-ssm-agent.service" Mar 17 18:19:46.906108 ignition[1335]: INFO : files: op(11): [started] setting preset to enabled for "nvidia.service" Mar 17 18:19:46.906108 ignition[1335]: INFO : files: op(11): [finished] setting preset to enabled for "nvidia.service" Mar 17 18:19:46.929890 ignition[1335]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Mar 17 18:19:46.929890 ignition[1335]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Mar 17 18:19:46.929890 ignition[1335]: INFO : files: files passed Mar 17 18:19:46.929890 ignition[1335]: INFO : Ignition finished successfully Mar 17 18:19:46.954015 kernel: audit: type=1130 audit(1742235586.943:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:46.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:46.935305 systemd[1]: Finished ignition-files.service. Mar 17 18:19:46.958435 systemd[1]: Starting initrd-setup-root-after-ignition.service... Mar 17 18:19:46.963115 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Mar 17 18:19:46.969344 systemd[1]: Starting ignition-quench.service... Mar 17 18:19:46.978562 systemd[1]: ignition-quench.service: Deactivated successfully. Mar 17 18:19:46.979656 systemd[1]: Finished ignition-quench.service. Mar 17 18:19:46.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:46.990091 initrd-setup-root-after-ignition[1360]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Mar 17 18:19:46.994293 kernel: audit: type=1130 audit(1742235586.983:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:46.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:46.991676 systemd[1]: Finished initrd-setup-root-after-ignition.service. Mar 17 18:19:46.998338 systemd[1]: Reached target ignition-complete.target. Mar 17 18:19:46.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.002718 systemd[1]: Starting initrd-parse-etc.service... Mar 17 18:19:47.031439 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Mar 17 18:19:47.033608 systemd[1]: Finished initrd-parse-etc.service. Mar 17 18:19:47.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.037286 systemd[1]: Reached target initrd-fs.target. Mar 17 18:19:47.040403 systemd[1]: Reached target initrd.target. Mar 17 18:19:47.043401 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Mar 17 18:19:47.047481 systemd[1]: Starting dracut-pre-pivot.service... Mar 17 18:19:47.072118 systemd[1]: Finished dracut-pre-pivot.service. Mar 17 18:19:47.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.076090 systemd[1]: Starting initrd-cleanup.service... Mar 17 18:19:47.096518 systemd[1]: Stopped target nss-lookup.target. Mar 17 18:19:47.099892 systemd[1]: Stopped target remote-cryptsetup.target. Mar 17 18:19:47.103507 systemd[1]: Stopped target timers.target. Mar 17 18:19:47.106589 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Mar 17 18:19:47.108763 systemd[1]: Stopped dracut-pre-pivot.service. Mar 17 18:19:47.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.112478 systemd[1]: Stopped target initrd.target. Mar 17 18:19:47.115630 systemd[1]: Stopped target basic.target. Mar 17 18:19:47.118672 systemd[1]: Stopped target ignition-complete.target. Mar 17 18:19:47.122240 systemd[1]: Stopped target ignition-diskful.target. Mar 17 18:19:47.125727 systemd[1]: Stopped target initrd-root-device.target. Mar 17 18:19:47.129319 systemd[1]: Stopped target remote-fs.target. Mar 17 18:19:47.132662 systemd[1]: Stopped target remote-fs-pre.target. Mar 17 18:19:47.136267 systemd[1]: Stopped target sysinit.target. Mar 17 18:19:47.139474 systemd[1]: Stopped target local-fs.target. Mar 17 18:19:47.142677 systemd[1]: Stopped target local-fs-pre.target. Mar 17 18:19:47.146098 systemd[1]: Stopped target swap.target. Mar 17 18:19:47.149102 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Mar 17 18:19:47.151269 systemd[1]: Stopped dracut-pre-mount.service. Mar 17 18:19:47.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.154626 systemd[1]: Stopped target cryptsetup.target. Mar 17 18:19:47.157756 systemd[1]: dracut-initqueue.service: Deactivated successfully. Mar 17 18:19:47.159694 systemd[1]: Stopped dracut-initqueue.service. Mar 17 18:19:47.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.163198 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Mar 17 18:19:47.165565 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Mar 17 18:19:47.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.169380 systemd[1]: ignition-files.service: Deactivated successfully. Mar 17 18:19:47.171340 systemd[1]: Stopped ignition-files.service. Mar 17 18:19:47.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.176000 systemd[1]: Stopping ignition-mount.service... Mar 17 18:19:47.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.194696 iscsid[1184]: iscsid shutting down. Mar 17 18:19:47.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.179403 systemd[1]: Stopping iscsid.service... Mar 17 18:19:47.209697 ignition[1373]: INFO : Ignition 2.14.0 Mar 17 18:19:47.209697 ignition[1373]: INFO : Stage: umount Mar 17 18:19:47.209697 ignition[1373]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:19:47.209697 ignition[1373]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Mar 17 18:19:47.185866 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Mar 17 18:19:47.186213 systemd[1]: Stopped kmod-static-nodes.service. Mar 17 18:19:47.190103 systemd[1]: Stopping sysroot-boot.service... Mar 17 18:19:47.193270 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Mar 17 18:19:47.194596 systemd[1]: Stopped systemd-udev-trigger.service. Mar 17 18:19:47.197183 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Mar 17 18:19:47.197435 systemd[1]: Stopped dracut-pre-trigger.service. Mar 17 18:19:47.220304 systemd[1]: iscsid.service: Deactivated successfully. Mar 17 18:19:47.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.220564 systemd[1]: Stopped iscsid.service. Mar 17 18:19:47.238981 systemd[1]: Stopping iscsiuio.service... Mar 17 18:19:47.242883 systemd[1]: initrd-cleanup.service: Deactivated successfully. Mar 17 18:19:47.243531 systemd[1]: Finished initrd-cleanup.service. Mar 17 18:19:47.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.254276 ignition[1373]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Mar 17 18:19:47.256797 ignition[1373]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Mar 17 18:19:47.264752 systemd[1]: iscsiuio.service: Deactivated successfully. Mar 17 18:19:47.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.264984 systemd[1]: Stopped iscsiuio.service. Mar 17 18:19:47.271012 ignition[1373]: INFO : PUT result: OK Mar 17 18:19:47.273329 systemd[1]: sysroot-boot.mount: Deactivated successfully. Mar 17 18:19:47.277698 ignition[1373]: INFO : umount: umount passed Mar 17 18:19:47.279755 ignition[1373]: INFO : Ignition finished successfully Mar 17 18:19:47.282936 systemd[1]: ignition-mount.service: Deactivated successfully. Mar 17 18:19:47.284754 systemd[1]: Stopped ignition-mount.service. Mar 17 18:19:47.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.288103 systemd[1]: ignition-disks.service: Deactivated successfully. Mar 17 18:19:47.288224 systemd[1]: Stopped ignition-disks.service. Mar 17 18:19:47.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.292596 systemd[1]: ignition-kargs.service: Deactivated successfully. Mar 17 18:19:47.292695 systemd[1]: Stopped ignition-kargs.service. Mar 17 18:19:47.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.298692 systemd[1]: ignition-fetch.service: Deactivated successfully. Mar 17 18:19:47.298796 systemd[1]: Stopped ignition-fetch.service. Mar 17 18:19:47.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.303281 systemd[1]: Stopped target network.target. Mar 17 18:19:47.306313 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Mar 17 18:19:47.306432 systemd[1]: Stopped ignition-fetch-offline.service. Mar 17 18:19:47.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.311736 systemd[1]: Stopped target paths.target. Mar 17 18:19:47.314384 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Mar 17 18:19:47.319022 systemd[1]: Stopped systemd-ask-password-console.path. Mar 17 18:19:47.322179 systemd[1]: Stopped target slices.target. Mar 17 18:19:47.323664 systemd[1]: Stopped target sockets.target. Mar 17 18:19:47.328638 systemd[1]: iscsid.socket: Deactivated successfully. Mar 17 18:19:47.328734 systemd[1]: Closed iscsid.socket. Mar 17 18:19:47.335200 systemd[1]: iscsiuio.socket: Deactivated successfully. Mar 17 18:19:47.335297 systemd[1]: Closed iscsiuio.socket. Mar 17 18:19:47.338271 systemd[1]: ignition-setup.service: Deactivated successfully. Mar 17 18:19:47.341413 systemd[1]: Stopped ignition-setup.service. Mar 17 18:19:47.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.344576 systemd[1]: Stopping systemd-networkd.service... Mar 17 18:19:47.347849 systemd[1]: Stopping systemd-resolved.service... Mar 17 18:19:47.348909 systemd-networkd[1179]: eth0: DHCPv6 lease lost Mar 17 18:19:47.354688 systemd[1]: systemd-networkd.service: Deactivated successfully. Mar 17 18:19:47.358084 systemd[1]: Stopped systemd-networkd.service. Mar 17 18:19:47.362740 systemd[1]: systemd-resolved.service: Deactivated successfully. Mar 17 18:19:47.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.363413 systemd[1]: Stopped systemd-resolved.service. Mar 17 18:19:47.366000 audit: BPF prog-id=9 op=UNLOAD Mar 17 18:19:47.366000 audit: BPF prog-id=6 op=UNLOAD Mar 17 18:19:47.368919 systemd[1]: systemd-networkd.socket: Deactivated successfully. Mar 17 18:19:47.368997 systemd[1]: Closed systemd-networkd.socket. Mar 17 18:19:47.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.373558 systemd[1]: Stopping network-cleanup.service... Mar 17 18:19:47.375075 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Mar 17 18:19:47.375195 systemd[1]: Stopped parse-ip-for-networkd.service. Mar 17 18:19:47.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.377162 systemd[1]: systemd-sysctl.service: Deactivated successfully. Mar 17 18:19:47.377275 systemd[1]: Stopped systemd-sysctl.service. Mar 17 18:19:47.382235 systemd[1]: systemd-modules-load.service: Deactivated successfully. Mar 17 18:19:47.382337 systemd[1]: Stopped systemd-modules-load.service. Mar 17 18:19:47.392424 systemd[1]: Stopping systemd-udevd.service... Mar 17 18:19:47.406351 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Mar 17 18:19:47.419788 systemd[1]: network-cleanup.service: Deactivated successfully. Mar 17 18:19:47.422385 systemd[1]: Stopped network-cleanup.service. Mar 17 18:19:47.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.427025 systemd[1]: sysroot-boot.service: Deactivated successfully. Mar 17 18:19:47.429035 systemd[1]: Stopped sysroot-boot.service. Mar 17 18:19:47.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.432378 systemd[1]: systemd-udevd.service: Deactivated successfully. Mar 17 18:19:47.434272 systemd[1]: Stopped systemd-udevd.service. Mar 17 18:19:47.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.437744 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Mar 17 18:19:47.437921 systemd[1]: Closed systemd-udevd-control.socket. Mar 17 18:19:47.443059 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Mar 17 18:19:47.443157 systemd[1]: Closed systemd-udevd-kernel.socket. Mar 17 18:19:47.446543 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Mar 17 18:19:47.449891 systemd[1]: Stopped dracut-pre-udev.service. Mar 17 18:19:47.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.452961 systemd[1]: dracut-cmdline.service: Deactivated successfully. Mar 17 18:19:47.453071 systemd[1]: Stopped dracut-cmdline.service. Mar 17 18:19:47.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.456202 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Mar 17 18:19:47.459641 systemd[1]: Stopped dracut-cmdline-ask.service. Mar 17 18:19:47.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.462775 systemd[1]: initrd-setup-root.service: Deactivated successfully. Mar 17 18:19:47.462907 systemd[1]: Stopped initrd-setup-root.service. Mar 17 18:19:47.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.469495 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Mar 17 18:19:47.485943 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Mar 17 18:19:47.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.486071 systemd[1]: Stopped systemd-vconsole-setup.service. Mar 17 18:19:47.494063 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Mar 17 18:19:47.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:47.494297 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Mar 17 18:19:47.497206 systemd[1]: Reached target initrd-switch-root.target. Mar 17 18:19:47.502237 systemd[1]: Starting initrd-switch-root.service... Mar 17 18:19:47.517788 systemd[1]: Switching root. Mar 17 18:19:47.546861 systemd-journald[310]: Journal stopped Mar 17 18:19:53.507567 systemd-journald[310]: Received SIGTERM from PID 1 (systemd). Mar 17 18:19:53.507684 kernel: SELinux: Class mctp_socket not defined in policy. Mar 17 18:19:53.507739 kernel: SELinux: Class anon_inode not defined in policy. Mar 17 18:19:53.507776 kernel: SELinux: the above unknown classes and permissions will be allowed Mar 17 18:19:53.507808 kernel: SELinux: policy capability network_peer_controls=1 Mar 17 18:19:53.507876 kernel: SELinux: policy capability open_perms=1 Mar 17 18:19:53.507908 kernel: SELinux: policy capability extended_socket_class=1 Mar 17 18:19:53.507940 kernel: SELinux: policy capability always_check_network=0 Mar 17 18:19:53.507971 kernel: SELinux: policy capability cgroup_seclabel=1 Mar 17 18:19:53.508005 kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 17 18:19:53.508035 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Mar 17 18:19:53.511374 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Mar 17 18:19:53.511428 systemd[1]: Successfully loaded SELinux policy in 124.753ms. Mar 17 18:19:53.511486 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.872ms. Mar 17 18:19:53.511526 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 18:19:53.511561 systemd[1]: Detected virtualization amazon. Mar 17 18:19:53.511600 systemd[1]: Detected architecture arm64. Mar 17 18:19:53.511633 systemd[1]: Detected first boot. Mar 17 18:19:53.511669 systemd[1]: Initializing machine ID from VM UUID. Mar 17 18:19:53.511703 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Mar 17 18:19:53.511735 systemd[1]: Populated /etc with preset unit settings. Mar 17 18:19:53.511769 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:19:53.511806 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:19:53.511935 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:19:53.511974 kernel: kauditd_printk_skb: 56 callbacks suppressed Mar 17 18:19:53.512003 kernel: audit: type=1334 audit(1742235593.108:87): prog-id=12 op=LOAD Mar 17 18:19:53.513916 kernel: audit: type=1334 audit(1742235593.111:88): prog-id=3 op=UNLOAD Mar 17 18:19:53.513972 kernel: audit: type=1334 audit(1742235593.113:89): prog-id=13 op=LOAD Mar 17 18:19:53.514003 kernel: audit: type=1334 audit(1742235593.116:90): prog-id=14 op=LOAD Mar 17 18:19:53.514032 kernel: audit: type=1334 audit(1742235593.116:91): prog-id=4 op=UNLOAD Mar 17 18:19:53.514060 kernel: audit: type=1334 audit(1742235593.116:92): prog-id=5 op=UNLOAD Mar 17 18:19:53.514088 kernel: audit: type=1334 audit(1742235593.118:93): prog-id=15 op=LOAD Mar 17 18:19:53.514126 kernel: audit: type=1334 audit(1742235593.118:94): prog-id=12 op=UNLOAD Mar 17 18:19:53.514157 kernel: audit: type=1334 audit(1742235593.120:95): prog-id=16 op=LOAD Mar 17 18:19:53.514188 kernel: audit: type=1334 audit(1742235593.123:96): prog-id=17 op=LOAD Mar 17 18:19:53.514221 systemd[1]: initrd-switch-root.service: Deactivated successfully. Mar 17 18:19:53.514253 systemd[1]: Stopped initrd-switch-root.service. Mar 17 18:19:53.514285 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Mar 17 18:19:53.514317 systemd[1]: Created slice system-addon\x2dconfig.slice. Mar 17 18:19:53.514350 systemd[1]: Created slice system-addon\x2drun.slice. Mar 17 18:19:53.514386 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Mar 17 18:19:53.514422 systemd[1]: Created slice system-getty.slice. Mar 17 18:19:53.514460 systemd[1]: Created slice system-modprobe.slice. Mar 17 18:19:53.514489 systemd[1]: Created slice system-serial\x2dgetty.slice. Mar 17 18:19:53.514519 systemd[1]: Created slice system-system\x2dcloudinit.slice. Mar 17 18:19:53.514549 systemd[1]: Created slice system-systemd\x2dfsck.slice. Mar 17 18:19:53.514578 systemd[1]: Created slice user.slice. Mar 17 18:19:53.514607 systemd[1]: Started systemd-ask-password-console.path. Mar 17 18:19:53.514641 systemd[1]: Started systemd-ask-password-wall.path. Mar 17 18:19:53.514671 systemd[1]: Set up automount boot.automount. Mar 17 18:19:53.514702 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Mar 17 18:19:53.514733 systemd[1]: Stopped target initrd-switch-root.target. Mar 17 18:19:53.514763 systemd[1]: Stopped target initrd-fs.target. Mar 17 18:19:53.514793 systemd[1]: Stopped target initrd-root-fs.target. Mar 17 18:19:53.517586 systemd[1]: Reached target integritysetup.target. Mar 17 18:19:53.517631 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 18:19:53.517666 systemd[1]: Reached target remote-fs.target. Mar 17 18:19:53.517706 systemd[1]: Reached target slices.target. Mar 17 18:19:53.517735 systemd[1]: Reached target swap.target. Mar 17 18:19:53.517765 systemd[1]: Reached target torcx.target. Mar 17 18:19:53.517798 systemd[1]: Reached target veritysetup.target. Mar 17 18:19:53.517872 systemd[1]: Listening on systemd-coredump.socket. Mar 17 18:19:53.517905 systemd[1]: Listening on systemd-initctl.socket. Mar 17 18:19:53.517937 systemd[1]: Listening on systemd-networkd.socket. Mar 17 18:19:53.517966 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 18:19:53.517996 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 18:19:53.518027 systemd[1]: Listening on systemd-userdbd.socket. Mar 17 18:19:53.518061 systemd[1]: Mounting dev-hugepages.mount... Mar 17 18:19:53.518092 systemd[1]: Mounting dev-mqueue.mount... Mar 17 18:19:53.518121 systemd[1]: Mounting media.mount... Mar 17 18:19:53.518151 systemd[1]: Mounting sys-kernel-debug.mount... Mar 17 18:19:53.518180 systemd[1]: Mounting sys-kernel-tracing.mount... Mar 17 18:19:53.518209 systemd[1]: Mounting tmp.mount... Mar 17 18:19:53.518241 systemd[1]: Starting flatcar-tmpfiles.service... Mar 17 18:19:53.518271 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:19:53.518301 systemd[1]: Starting kmod-static-nodes.service... Mar 17 18:19:53.518337 systemd[1]: Starting modprobe@configfs.service... Mar 17 18:19:53.518370 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:19:53.518399 systemd[1]: Starting modprobe@drm.service... Mar 17 18:19:53.518428 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:19:53.518457 systemd[1]: Starting modprobe@fuse.service... Mar 17 18:19:53.518486 systemd[1]: Starting modprobe@loop.service... Mar 17 18:19:53.518517 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Mar 17 18:19:53.518546 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Mar 17 18:19:53.518575 systemd[1]: Stopped systemd-fsck-root.service. Mar 17 18:19:53.518608 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Mar 17 18:19:53.518639 systemd[1]: Stopped systemd-fsck-usr.service. Mar 17 18:19:53.518668 systemd[1]: Stopped systemd-journald.service. Mar 17 18:19:53.518698 systemd[1]: Starting systemd-journald.service... Mar 17 18:19:53.518730 systemd[1]: Starting systemd-modules-load.service... Mar 17 18:19:53.518759 systemd[1]: Starting systemd-network-generator.service... Mar 17 18:19:53.518787 kernel: loop: module loaded Mar 17 18:19:53.518835 systemd[1]: Starting systemd-remount-fs.service... Mar 17 18:19:53.518871 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 18:19:53.518925 systemd[1]: verity-setup.service: Deactivated successfully. Mar 17 18:19:53.518958 systemd[1]: Stopped verity-setup.service. Mar 17 18:19:53.518988 systemd[1]: Mounted dev-hugepages.mount. Mar 17 18:19:53.519022 systemd[1]: Mounted dev-mqueue.mount. Mar 17 18:19:53.519052 systemd[1]: Mounted media.mount. Mar 17 18:19:53.519087 systemd[1]: Mounted sys-kernel-debug.mount. Mar 17 18:19:53.519116 systemd[1]: Mounted sys-kernel-tracing.mount. Mar 17 18:19:53.519145 systemd[1]: Mounted tmp.mount. Mar 17 18:19:53.519174 systemd[1]: Finished kmod-static-nodes.service. Mar 17 18:19:53.519209 systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 17 18:19:53.519239 systemd[1]: Finished modprobe@configfs.service. Mar 17 18:19:53.519268 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:19:53.519297 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:19:53.519369 kernel: fuse: init (API version 7.34) Mar 17 18:19:53.519410 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 18:19:53.519444 systemd[1]: Finished modprobe@drm.service. Mar 17 18:19:53.519474 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:19:53.519506 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:19:53.520916 systemd[1]: modprobe@fuse.service: Deactivated successfully. Mar 17 18:19:53.520964 systemd[1]: Finished modprobe@fuse.service. Mar 17 18:19:53.520998 systemd-journald[1481]: Journal started Mar 17 18:19:53.521105 systemd-journald[1481]: Runtime Journal (/run/log/journal/ec28b5e9d511385ae1c7a77371cebc9d) is 8.0M, max 75.4M, 67.4M free. Mar 17 18:19:48.383000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Mar 17 18:19:48.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 18:19:48.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 18:19:48.586000 audit: BPF prog-id=10 op=LOAD Mar 17 18:19:48.586000 audit: BPF prog-id=10 op=UNLOAD Mar 17 18:19:48.587000 audit: BPF prog-id=11 op=LOAD Mar 17 18:19:48.587000 audit: BPF prog-id=11 op=UNLOAD Mar 17 18:19:48.832000 audit[1406]: AVC avc: denied { associate } for pid=1406 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Mar 17 18:19:48.832000 audit[1406]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458b2 a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1389 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:19:48.832000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 18:19:48.837000 audit[1406]: AVC avc: denied { associate } for pid=1406 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Mar 17 18:19:48.837000 audit[1406]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145989 a2=1ed a3=0 items=2 ppid=1389 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:19:48.837000 audit: CWD cwd="/" Mar 17 18:19:48.837000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:19:48.837000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:19:48.837000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 18:19:53.108000 audit: BPF prog-id=12 op=LOAD Mar 17 18:19:53.111000 audit: BPF prog-id=3 op=UNLOAD Mar 17 18:19:53.113000 audit: BPF prog-id=13 op=LOAD Mar 17 18:19:53.116000 audit: BPF prog-id=14 op=LOAD Mar 17 18:19:53.116000 audit: BPF prog-id=4 op=UNLOAD Mar 17 18:19:53.116000 audit: BPF prog-id=5 op=UNLOAD Mar 17 18:19:53.118000 audit: BPF prog-id=15 op=LOAD Mar 17 18:19:53.118000 audit: BPF prog-id=12 op=UNLOAD Mar 17 18:19:53.120000 audit: BPF prog-id=16 op=LOAD Mar 17 18:19:53.123000 audit: BPF prog-id=17 op=LOAD Mar 17 18:19:53.123000 audit: BPF prog-id=13 op=UNLOAD Mar 17 18:19:53.123000 audit: BPF prog-id=14 op=UNLOAD Mar 17 18:19:53.128000 audit: BPF prog-id=18 op=LOAD Mar 17 18:19:53.128000 audit: BPF prog-id=15 op=UNLOAD Mar 17 18:19:53.130000 audit: BPF prog-id=19 op=LOAD Mar 17 18:19:53.133000 audit: BPF prog-id=20 op=LOAD Mar 17 18:19:53.133000 audit: BPF prog-id=16 op=UNLOAD Mar 17 18:19:53.133000 audit: BPF prog-id=17 op=UNLOAD Mar 17 18:19:53.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.141000 audit: BPF prog-id=18 op=UNLOAD Mar 17 18:19:53.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.400000 audit: BPF prog-id=21 op=LOAD Mar 17 18:19:53.400000 audit: BPF prog-id=22 op=LOAD Mar 17 18:19:53.400000 audit: BPF prog-id=23 op=LOAD Mar 17 18:19:53.401000 audit: BPF prog-id=19 op=UNLOAD Mar 17 18:19:53.401000 audit: BPF prog-id=20 op=UNLOAD Mar 17 18:19:53.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.533673 systemd[1]: Started systemd-journald.service. Mar 17 18:19:53.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.503000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Mar 17 18:19:53.503000 audit[1481]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffc39e09a0 a2=4000 a3=1 items=0 ppid=1 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:19:53.503000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Mar 17 18:19:53.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.107391 systemd[1]: Queued start job for default target multi-user.target. Mar 17 18:19:48.822994 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:19:53.107417 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. Mar 17 18:19:48.831385 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:48Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 18:19:53.135217 systemd[1]: systemd-journald.service: Deactivated successfully. Mar 17 18:19:48.831447 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:48Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 18:19:53.526542 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:19:48.831521 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:48Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Mar 17 18:19:53.526951 systemd[1]: Finished modprobe@loop.service. Mar 17 18:19:48.831549 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:48Z" level=debug msg="skipped missing lower profile" missing profile=oem Mar 17 18:19:53.529305 systemd[1]: Finished systemd-modules-load.service. Mar 17 18:19:48.831629 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:48Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Mar 17 18:19:53.531724 systemd[1]: Finished systemd-network-generator.service. Mar 17 18:19:48.831662 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:48Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Mar 17 18:19:53.534274 systemd[1]: Reached target network-pre.target. Mar 17 18:19:48.832220 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:48Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Mar 17 18:19:53.540938 systemd[1]: Mounting sys-fs-fuse-connections.mount... Mar 17 18:19:48.832332 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:48Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 18:19:53.545260 systemd[1]: Mounting sys-kernel-config.mount... Mar 17 18:19:48.832370 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:48Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 18:19:48.833367 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:48Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Mar 17 18:19:48.833463 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:48Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Mar 17 18:19:48.833514 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:48Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 Mar 17 18:19:48.833557 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:48Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Mar 17 18:19:48.833611 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:48Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 Mar 17 18:19:48.833653 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:48Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Mar 17 18:19:52.161622 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:52Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:19:53.553104 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:19:52.162287 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:52Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:19:52.162571 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:52Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:19:52.163103 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:52Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:19:52.163233 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:52Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Mar 17 18:19:52.163379 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-03-17T18:19:52Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Mar 17 18:19:53.556640 systemd[1]: Starting systemd-sysctl.service... Mar 17 18:19:53.563211 systemd[1]: Finished systemd-remount-fs.service. Mar 17 18:19:53.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.565409 systemd[1]: Mounted sys-fs-fuse-connections.mount. Mar 17 18:19:53.567405 systemd[1]: Mounted sys-kernel-config.mount. Mar 17 18:19:53.571998 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Mar 17 18:19:53.584896 systemd[1]: Starting systemd-hwdb-update.service... Mar 17 18:19:53.588712 systemd[1]: Starting systemd-journal-flush.service... Mar 17 18:19:53.590674 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:19:53.593099 systemd[1]: Starting systemd-random-seed.service... Mar 17 18:19:53.631607 systemd[1]: Finished systemd-random-seed.service. Mar 17 18:19:53.634249 systemd[1]: Reached target first-boot-complete.target. Mar 17 18:19:53.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.637229 systemd-journald[1481]: Time spent on flushing to /var/log/journal/ec28b5e9d511385ae1c7a77371cebc9d is 73.577ms for 1126 entries. Mar 17 18:19:53.637229 systemd-journald[1481]: System Journal (/var/log/journal/ec28b5e9d511385ae1c7a77371cebc9d) is 8.0M, max 195.6M, 187.6M free. Mar 17 18:19:53.724710 systemd-journald[1481]: Received client request to flush runtime journal. Mar 17 18:19:53.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.644754 systemd[1]: Finished systemd-sysctl.service. Mar 17 18:19:53.680576 systemd[1]: Finished flatcar-tmpfiles.service. Mar 17 18:19:53.684637 systemd[1]: Starting systemd-sysusers.service... Mar 17 18:19:53.726609 systemd[1]: Finished systemd-journal-flush.service. Mar 17 18:19:53.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.765068 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 18:19:53.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:53.769165 systemd[1]: Starting systemd-udev-settle.service... Mar 17 18:19:53.785168 udevadm[1525]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Mar 17 18:19:53.897542 systemd[1]: Finished systemd-sysusers.service. Mar 17 18:19:53.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:54.464618 systemd[1]: Finished systemd-hwdb-update.service. Mar 17 18:19:54.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:54.465000 audit: BPF prog-id=24 op=LOAD Mar 17 18:19:54.465000 audit: BPF prog-id=25 op=LOAD Mar 17 18:19:54.466000 audit: BPF prog-id=7 op=UNLOAD Mar 17 18:19:54.466000 audit: BPF prog-id=8 op=UNLOAD Mar 17 18:19:54.469035 systemd[1]: Starting systemd-udevd.service... Mar 17 18:19:54.507428 systemd-udevd[1526]: Using default interface naming scheme 'v252'. Mar 17 18:19:54.566394 systemd[1]: Started systemd-udevd.service. Mar 17 18:19:54.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:54.569000 audit: BPF prog-id=26 op=LOAD Mar 17 18:19:54.573083 systemd[1]: Starting systemd-networkd.service... Mar 17 18:19:54.583000 audit: BPF prog-id=27 op=LOAD Mar 17 18:19:54.583000 audit: BPF prog-id=28 op=LOAD Mar 17 18:19:54.583000 audit: BPF prog-id=29 op=LOAD Mar 17 18:19:54.586590 systemd[1]: Starting systemd-userdbd.service... Mar 17 18:19:54.678730 systemd[1]: Started systemd-userdbd.service. Mar 17 18:19:54.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:54.686034 (udev-worker)[1527]: Network interface NamePolicy= disabled on kernel command line. Mar 17 18:19:54.698569 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Mar 17 18:19:54.843551 systemd-networkd[1531]: lo: Link UP Mar 17 18:19:54.843574 systemd-networkd[1531]: lo: Gained carrier Mar 17 18:19:54.844511 systemd-networkd[1531]: Enumeration completed Mar 17 18:19:54.844731 systemd-networkd[1531]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 18:19:54.844767 systemd[1]: Started systemd-networkd.service. Mar 17 18:19:54.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:54.850774 systemd[1]: Starting systemd-networkd-wait-online.service... Mar 17 18:19:54.858721 systemd-networkd[1531]: eth0: Link UP Mar 17 18:19:54.859000 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:19:54.859301 systemd-networkd[1531]: eth0: Gained carrier Mar 17 18:19:54.878072 systemd-networkd[1531]: eth0: DHCPv4 address 172.31.22.27/20, gateway 172.31.16.1 acquired from 172.31.16.1 Mar 17 18:19:55.061586 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 18:19:55.065607 systemd[1]: Finished systemd-udev-settle.service. Mar 17 18:19:55.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:55.069797 systemd[1]: Starting lvm2-activation-early.service... Mar 17 18:19:55.136492 lvm[1645]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 18:19:55.175750 systemd[1]: Finished lvm2-activation-early.service. Mar 17 18:19:55.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:55.177723 systemd[1]: Reached target cryptsetup.target. Mar 17 18:19:55.181486 systemd[1]: Starting lvm2-activation.service... Mar 17 18:19:55.190292 lvm[1646]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 18:19:55.226551 systemd[1]: Finished lvm2-activation.service. Mar 17 18:19:55.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:55.228477 systemd[1]: Reached target local-fs-pre.target. Mar 17 18:19:55.230183 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Mar 17 18:19:55.230240 systemd[1]: Reached target local-fs.target. Mar 17 18:19:55.231932 systemd[1]: Reached target machines.target. Mar 17 18:19:55.235801 systemd[1]: Starting ldconfig.service... Mar 17 18:19:55.238962 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:19:55.239086 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:19:55.241495 systemd[1]: Starting systemd-boot-update.service... Mar 17 18:19:55.246279 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Mar 17 18:19:55.251399 systemd[1]: Starting systemd-machine-id-commit.service... Mar 17 18:19:55.255857 systemd[1]: Starting systemd-sysext.service... Mar 17 18:19:55.265923 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1648 (bootctl) Mar 17 18:19:55.268436 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Mar 17 18:19:55.294244 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Mar 17 18:19:55.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:55.301591 systemd[1]: Unmounting usr-share-oem.mount... Mar 17 18:19:55.324095 systemd[1]: usr-share-oem.mount: Deactivated successfully. Mar 17 18:19:55.324502 systemd[1]: Unmounted usr-share-oem.mount. Mar 17 18:19:55.351866 kernel: loop0: detected capacity change from 0 to 194096 Mar 17 18:19:55.424656 systemd-fsck[1658]: fsck.fat 4.2 (2021-01-31) Mar 17 18:19:55.424656 systemd-fsck[1658]: /dev/nvme0n1p1: 236 files, 117179/258078 clusters Mar 17 18:19:55.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:55.429848 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Mar 17 18:19:55.434466 systemd[1]: Mounting boot.mount... Mar 17 18:19:55.460162 systemd[1]: Mounted boot.mount. Mar 17 18:19:55.463259 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Mar 17 18:19:55.465258 systemd[1]: Finished systemd-machine-id-commit.service. Mar 17 18:19:55.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:55.492941 systemd[1]: Finished systemd-boot-update.service. Mar 17 18:19:55.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:55.536872 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Mar 17 18:19:55.561873 kernel: loop1: detected capacity change from 0 to 194096 Mar 17 18:19:55.582511 (sd-sysext)[1674]: Using extensions 'kubernetes'. Mar 17 18:19:55.584963 (sd-sysext)[1674]: Merged extensions into '/usr'. Mar 17 18:19:55.622173 systemd[1]: Mounting usr-share-oem.mount... Mar 17 18:19:55.624424 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:19:55.628338 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:19:55.633923 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:19:55.642024 systemd[1]: Starting modprobe@loop.service... Mar 17 18:19:55.643578 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:19:55.643910 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:19:55.650248 systemd[1]: Mounted usr-share-oem.mount. Mar 17 18:19:55.652668 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:19:55.653017 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:19:55.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:55.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:55.655699 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:19:55.656064 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:19:55.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:55.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:55.659095 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:19:55.659409 systemd[1]: Finished modprobe@loop.service. Mar 17 18:19:55.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:55.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:55.662142 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:19:55.662397 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:19:55.665050 systemd[1]: Finished systemd-sysext.service. Mar 17 18:19:55.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:55.669183 systemd[1]: Starting ensure-sysext.service... Mar 17 18:19:55.673137 systemd[1]: Starting systemd-tmpfiles-setup.service... Mar 17 18:19:55.691015 systemd[1]: Reloading. Mar 17 18:19:55.756423 systemd-tmpfiles[1681]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Mar 17 18:19:55.809205 systemd-tmpfiles[1681]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Mar 17 18:19:55.812131 /usr/lib/systemd/system-generators/torcx-generator[1703]: time="2025-03-17T18:19:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:19:55.813456 /usr/lib/systemd/system-generators/torcx-generator[1703]: time="2025-03-17T18:19:55Z" level=info msg="torcx already run" Mar 17 18:19:55.841513 systemd-tmpfiles[1681]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Mar 17 18:19:56.033455 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:19:56.033773 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:19:56.087447 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:19:56.280000 audit: BPF prog-id=30 op=LOAD Mar 17 18:19:56.281000 audit: BPF prog-id=26 op=UNLOAD Mar 17 18:19:56.288000 audit: BPF prog-id=31 op=LOAD Mar 17 18:19:56.288000 audit: BPF prog-id=32 op=LOAD Mar 17 18:19:56.288000 audit: BPF prog-id=24 op=UNLOAD Mar 17 18:19:56.288000 audit: BPF prog-id=25 op=UNLOAD Mar 17 18:19:56.290000 audit: BPF prog-id=33 op=LOAD Mar 17 18:19:56.291000 audit: BPF prog-id=21 op=UNLOAD Mar 17 18:19:56.292000 audit: BPF prog-id=34 op=LOAD Mar 17 18:19:56.292000 audit: BPF prog-id=35 op=LOAD Mar 17 18:19:56.292000 audit: BPF prog-id=22 op=UNLOAD Mar 17 18:19:56.292000 audit: BPF prog-id=23 op=UNLOAD Mar 17 18:19:56.296000 audit: BPF prog-id=36 op=LOAD Mar 17 18:19:56.296000 audit: BPF prog-id=27 op=UNLOAD Mar 17 18:19:56.297000 audit: BPF prog-id=37 op=LOAD Mar 17 18:19:56.297000 audit: BPF prog-id=38 op=LOAD Mar 17 18:19:56.297000 audit: BPF prog-id=28 op=UNLOAD Mar 17 18:19:56.297000 audit: BPF prog-id=29 op=UNLOAD Mar 17 18:19:56.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.306332 systemd[1]: Finished systemd-tmpfiles-setup.service. Mar 17 18:19:56.316887 systemd[1]: Starting audit-rules.service... Mar 17 18:19:56.325527 systemd[1]: Starting clean-ca-certificates.service... Mar 17 18:19:56.331130 systemd[1]: Starting systemd-journal-catalog-update.service... Mar 17 18:19:56.332000 audit: BPF prog-id=39 op=LOAD Mar 17 18:19:56.337512 systemd[1]: Starting systemd-resolved.service... Mar 17 18:19:56.338000 audit: BPF prog-id=40 op=LOAD Mar 17 18:19:56.342566 systemd[1]: Starting systemd-timesyncd.service... Mar 17 18:19:56.346633 systemd[1]: Starting systemd-update-utmp.service... Mar 17 18:19:56.378839 systemd[1]: Finished clean-ca-certificates.service. Mar 17 18:19:56.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.380909 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 18:19:56.384316 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:19:56.384000 audit[1764]: SYSTEM_BOOT pid=1764 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.388023 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:19:56.392878 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:19:56.398307 systemd[1]: Starting modprobe@loop.service... Mar 17 18:19:56.401107 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:19:56.401425 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:19:56.401695 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 18:19:56.403776 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:19:56.404162 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:19:56.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.410095 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:19:56.410398 systemd[1]: Finished modprobe@loop.service. Mar 17 18:19:56.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.417802 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:19:56.422698 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:19:56.428462 systemd[1]: Starting modprobe@loop.service... Mar 17 18:19:56.430032 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:19:56.430363 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:19:56.430649 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 18:19:56.433017 systemd[1]: Finished systemd-update-utmp.service. Mar 17 18:19:56.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.435769 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:19:56.436105 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:19:56.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.444987 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:19:56.445286 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:19:56.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.450218 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:19:56.454646 systemd[1]: Starting modprobe@drm.service... Mar 17 18:19:56.460725 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:19:56.462475 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:19:56.462829 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:19:56.463162 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 18:19:56.465277 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:19:56.465615 systemd[1]: Finished modprobe@loop.service. Mar 17 18:19:56.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.468758 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:19:56.471378 systemd[1]: Finished ensure-sysext.service. Mar 17 18:19:56.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.477451 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 18:19:56.477761 systemd[1]: Finished modprobe@drm.service. Mar 17 18:19:56.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.487108 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:19:56.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.487404 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:19:56.489407 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:19:56.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:19:56.494797 systemd[1]: Finished systemd-journal-catalog-update.service. Mar 17 18:19:56.577667 systemd-resolved[1762]: Positive Trust Anchors: Mar 17 18:19:56.577694 systemd-resolved[1762]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 18:19:56.577746 systemd-resolved[1762]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 18:19:56.584000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Mar 17 18:19:56.584000 audit[1785]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffa60fdf0 a2=420 a3=0 items=0 ppid=1758 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:19:56.584000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Mar 17 18:19:56.586187 augenrules[1785]: No rules Mar 17 18:19:56.588449 systemd[1]: Finished audit-rules.service. Mar 17 18:19:56.600210 systemd[1]: Started systemd-timesyncd.service. Mar 17 18:19:56.602093 systemd[1]: Reached target time-set.target. Mar 17 18:19:56.636655 systemd-resolved[1762]: Defaulting to hostname 'linux'. Mar 17 18:19:56.641515 systemd[1]: Started systemd-resolved.service. Mar 17 18:19:56.643311 systemd[1]: Reached target network.target. Mar 17 18:19:56.644861 systemd[1]: Reached target nss-lookup.target. Mar 17 18:19:56.716234 ldconfig[1647]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Mar 17 18:19:56.725662 systemd[1]: Finished ldconfig.service. Mar 17 18:19:56.729549 systemd[1]: Starting systemd-update-done.service... Mar 17 18:19:56.744680 systemd[1]: Finished systemd-update-done.service. Mar 17 18:19:56.746670 systemd[1]: Reached target sysinit.target. Mar 17 18:19:56.748530 systemd[1]: Started motdgen.path. Mar 17 18:19:56.750206 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Mar 17 18:19:56.752551 systemd[1]: Started logrotate.timer. Mar 17 18:19:56.754614 systemd[1]: Started mdadm.timer. Mar 17 18:19:56.755903 systemd[1]: Started systemd-tmpfiles-clean.timer. Mar 17 18:19:56.757592 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Mar 17 18:19:56.757766 systemd[1]: Reached target paths.target. Mar 17 18:19:56.759320 systemd[1]: Reached target timers.target. Mar 17 18:19:56.761576 systemd[1]: Listening on dbus.socket. Mar 17 18:19:56.765326 systemd[1]: Starting docker.socket... Mar 17 18:19:56.767120 systemd-timesyncd[1763]: Contacted time server 96.245.170.99:123 (0.flatcar.pool.ntp.org). Mar 17 18:19:56.767685 systemd-timesyncd[1763]: Initial clock synchronization to Mon 2025-03-17 18:19:57.060114 UTC. Mar 17 18:19:56.772905 systemd[1]: Listening on sshd.socket. Mar 17 18:19:56.774568 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:19:56.775557 systemd[1]: Listening on docker.socket. Mar 17 18:19:56.777228 systemd[1]: Reached target sockets.target. Mar 17 18:19:56.778759 systemd[1]: Reached target basic.target. Mar 17 18:19:56.780293 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 18:19:56.780360 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 18:19:56.782417 systemd[1]: Starting containerd.service... Mar 17 18:19:56.786429 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Mar 17 18:19:56.790499 systemd[1]: Starting dbus.service... Mar 17 18:19:56.794781 systemd[1]: Starting enable-oem-cloudinit.service... Mar 17 18:19:56.799729 systemd[1]: Starting extend-filesystems.service... Mar 17 18:19:56.801809 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Mar 17 18:19:56.805089 systemd[1]: Starting motdgen.service... Mar 17 18:19:56.810444 systemd[1]: Starting ssh-key-proc-cmdline.service... Mar 17 18:19:56.814556 systemd[1]: Starting sshd-keygen.service... Mar 17 18:19:56.823567 systemd[1]: Starting systemd-logind.service... Mar 17 18:19:56.825171 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:19:56.825310 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Mar 17 18:19:56.826213 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Mar 17 18:19:56.828111 systemd[1]: Starting update-engine.service... Mar 17 18:19:56.834317 systemd[1]: Starting update-ssh-keys-after-ignition.service... Mar 17 18:19:56.840015 systemd-networkd[1531]: eth0: Gained IPv6LL Mar 17 18:19:56.848352 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Mar 17 18:19:56.848704 systemd[1]: Finished ssh-key-proc-cmdline.service. Mar 17 18:19:56.852268 systemd[1]: Finished systemd-networkd-wait-online.service. Mar 17 18:19:56.854561 systemd[1]: Reached target network-online.target. Mar 17 18:19:56.859076 systemd[1]: Started amazon-ssm-agent.service. Mar 17 18:19:56.874102 jq[1797]: false Mar 17 18:19:56.865096 systemd[1]: Starting kubelet.service... Mar 17 18:19:56.871095 systemd[1]: Started nvidia.service. Mar 17 18:19:56.873975 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Mar 17 18:19:56.874470 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Mar 17 18:19:56.923598 jq[1805]: true Mar 17 18:19:56.964330 extend-filesystems[1798]: Found loop1 Mar 17 18:19:56.966552 extend-filesystems[1798]: Found nvme0n1 Mar 17 18:19:56.967984 extend-filesystems[1798]: Found nvme0n1p1 Mar 17 18:19:56.967984 extend-filesystems[1798]: Found nvme0n1p2 Mar 17 18:19:56.967984 extend-filesystems[1798]: Found nvme0n1p3 Mar 17 18:19:56.979662 extend-filesystems[1798]: Found usr Mar 17 18:19:56.979662 extend-filesystems[1798]: Found nvme0n1p4 Mar 17 18:19:56.991109 extend-filesystems[1798]: Found nvme0n1p6 Mar 17 18:19:56.991109 extend-filesystems[1798]: Found nvme0n1p7 Mar 17 18:19:56.991109 extend-filesystems[1798]: Found nvme0n1p9 Mar 17 18:19:56.991109 extend-filesystems[1798]: Checking size of /dev/nvme0n1p9 Mar 17 18:19:57.003695 jq[1829]: true Mar 17 18:19:56.998715 dbus-daemon[1796]: [system] SELinux support is enabled Mar 17 18:19:56.999109 systemd[1]: Started dbus.service. Mar 17 18:19:57.008194 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Mar 17 18:19:57.008307 systemd[1]: Reached target system-config.target. Mar 17 18:19:57.010614 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Mar 17 18:19:57.010651 systemd[1]: Reached target user-config.target. Mar 17 18:19:57.013689 systemd[1]: motdgen.service: Deactivated successfully. Mar 17 18:19:57.014119 systemd[1]: Finished motdgen.service. Mar 17 18:19:57.054109 dbus-daemon[1796]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1531 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Mar 17 18:19:57.063328 systemd[1]: Starting systemd-hostnamed.service... Mar 17 18:19:57.142391 extend-filesystems[1798]: Resized partition /dev/nvme0n1p9 Mar 17 18:19:57.150878 extend-filesystems[1852]: resize2fs 1.46.5 (30-Dec-2021) Mar 17 18:19:57.203895 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Mar 17 18:19:57.293244 update_engine[1804]: I0317 18:19:57.292534 1804 main.cc:92] Flatcar Update Engine starting Mar 17 18:19:57.307904 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Mar 17 18:19:57.320842 systemd[1]: Started update-engine.service. Mar 17 18:19:57.322459 update_engine[1804]: I0317 18:19:57.320935 1804 update_check_scheduler.cc:74] Next update check in 5m29s Mar 17 18:19:57.325152 extend-filesystems[1852]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Mar 17 18:19:57.325152 extend-filesystems[1852]: old_desc_blocks = 1, new_desc_blocks = 1 Mar 17 18:19:57.325152 extend-filesystems[1852]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Mar 17 18:19:57.337450 extend-filesystems[1798]: Resized filesystem in /dev/nvme0n1p9 Mar 17 18:19:57.363939 amazon-ssm-agent[1812]: 2025/03/17 18:19:57 Failed to load instance info from vault. RegistrationKey does not exist. Mar 17 18:19:57.363939 amazon-ssm-agent[1812]: Initializing new seelog logger Mar 17 18:19:57.363939 amazon-ssm-agent[1812]: New Seelog Logger Creation Complete Mar 17 18:19:57.363939 amazon-ssm-agent[1812]: 2025/03/17 18:19:57 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Mar 17 18:19:57.363939 amazon-ssm-agent[1812]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Mar 17 18:19:57.363939 amazon-ssm-agent[1812]: 2025/03/17 18:19:57 processing appconfig overrides Mar 17 18:19:57.328150 systemd[1]: Started locksmithd.service. Mar 17 18:19:57.365310 bash[1856]: Updated "/home/core/.ssh/authorized_keys" Mar 17 18:19:57.365529 env[1818]: time="2025-03-17T18:19:57.338127891Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Mar 17 18:19:57.335490 systemd[1]: extend-filesystems.service: Deactivated successfully. Mar 17 18:19:57.336001 systemd[1]: Finished extend-filesystems.service. Mar 17 18:19:57.364499 systemd[1]: Finished update-ssh-keys-after-ignition.service. Mar 17 18:19:57.494751 systemd[1]: nvidia.service: Deactivated successfully. Mar 17 18:19:57.498615 systemd-logind[1803]: Watching system buttons on /dev/input/event0 (Power Button) Mar 17 18:19:57.500519 systemd-logind[1803]: Watching system buttons on /dev/input/event1 (Sleep Button) Mar 17 18:19:57.504128 systemd-logind[1803]: New seat seat0. Mar 17 18:19:57.514312 systemd[1]: Started systemd-logind.service. Mar 17 18:19:57.572930 dbus-daemon[1796]: [system] Successfully activated service 'org.freedesktop.hostname1' Mar 17 18:19:57.573228 systemd[1]: Started systemd-hostnamed.service. Mar 17 18:19:57.576115 dbus-daemon[1796]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1842 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Mar 17 18:19:57.581670 systemd[1]: Starting polkit.service... Mar 17 18:19:57.597549 env[1818]: time="2025-03-17T18:19:57.597411027Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Mar 17 18:19:57.597865 env[1818]: time="2025-03-17T18:19:57.597800179Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:19:57.607337 env[1818]: time="2025-03-17T18:19:57.607254933Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.179-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:19:57.607337 env[1818]: time="2025-03-17T18:19:57.607329434Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:19:57.607839 env[1818]: time="2025-03-17T18:19:57.607785785Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:19:57.608017 env[1818]: time="2025-03-17T18:19:57.607912807Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Mar 17 18:19:57.608017 env[1818]: time="2025-03-17T18:19:57.607950984Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Mar 17 18:19:57.608017 env[1818]: time="2025-03-17T18:19:57.607998641Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Mar 17 18:19:57.608246 env[1818]: time="2025-03-17T18:19:57.608195176Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:19:57.608823 env[1818]: time="2025-03-17T18:19:57.608767552Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:19:57.609141 env[1818]: time="2025-03-17T18:19:57.609077102Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:19:57.609141 env[1818]: time="2025-03-17T18:19:57.609131252Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Mar 17 18:19:57.609313 env[1818]: time="2025-03-17T18:19:57.609268113Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Mar 17 18:19:57.609397 env[1818]: time="2025-03-17T18:19:57.609313232Z" level=info msg="metadata content store policy set" policy=shared Mar 17 18:19:57.619360 env[1818]: time="2025-03-17T18:19:57.619266234Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Mar 17 18:19:57.619562 env[1818]: time="2025-03-17T18:19:57.619368862Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Mar 17 18:19:57.619562 env[1818]: time="2025-03-17T18:19:57.619427925Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Mar 17 18:19:57.619716 env[1818]: time="2025-03-17T18:19:57.619567611Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Mar 17 18:19:57.619716 env[1818]: time="2025-03-17T18:19:57.619661431Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Mar 17 18:19:57.619824 env[1818]: time="2025-03-17T18:19:57.619698191Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Mar 17 18:19:57.619824 env[1818]: time="2025-03-17T18:19:57.619758386Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Mar 17 18:19:57.620652 env[1818]: time="2025-03-17T18:19:57.620563522Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Mar 17 18:19:57.620792 env[1818]: time="2025-03-17T18:19:57.620654431Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Mar 17 18:19:57.620792 env[1818]: time="2025-03-17T18:19:57.620713955Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Mar 17 18:19:57.620792 env[1818]: time="2025-03-17T18:19:57.620748998Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Mar 17 18:19:57.620996 env[1818]: time="2025-03-17T18:19:57.620846575Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Mar 17 18:19:57.621421 env[1818]: time="2025-03-17T18:19:57.621163900Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Mar 17 18:19:57.623737 env[1818]: time="2025-03-17T18:19:57.623664307Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Mar 17 18:19:57.624497 env[1818]: time="2025-03-17T18:19:57.624445620Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Mar 17 18:19:57.624599 env[1818]: time="2025-03-17T18:19:57.624540809Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Mar 17 18:19:57.625077 env[1818]: time="2025-03-17T18:19:57.625028160Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Mar 17 18:19:57.625255 env[1818]: time="2025-03-17T18:19:57.625214133Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Mar 17 18:19:57.625751 env[1818]: time="2025-03-17T18:19:57.625260297Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Mar 17 18:19:57.625885 env[1818]: time="2025-03-17T18:19:57.625762961Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Mar 17 18:19:57.625885 env[1818]: time="2025-03-17T18:19:57.625853821Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Mar 17 18:19:57.625995 env[1818]: time="2025-03-17T18:19:57.625889560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Mar 17 18:19:57.626153 env[1818]: time="2025-03-17T18:19:57.626111845Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Mar 17 18:19:57.626222 env[1818]: time="2025-03-17T18:19:57.626189805Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Mar 17 18:19:57.626282 env[1818]: time="2025-03-17T18:19:57.626226913Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Mar 17 18:19:57.626368 env[1818]: time="2025-03-17T18:19:57.626288639Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Mar 17 18:19:57.636220 env[1818]: time="2025-03-17T18:19:57.636124570Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Mar 17 18:19:57.636409 env[1818]: time="2025-03-17T18:19:57.636220866Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Mar 17 18:19:57.636409 env[1818]: time="2025-03-17T18:19:57.636282343Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Mar 17 18:19:57.636409 env[1818]: time="2025-03-17T18:19:57.636318605Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Mar 17 18:19:57.636613 env[1818]: time="2025-03-17T18:19:57.636402909Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Mar 17 18:19:57.636613 env[1818]: time="2025-03-17T18:19:57.636461288Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Mar 17 18:19:57.636613 env[1818]: time="2025-03-17T18:19:57.636499988Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Mar 17 18:19:57.636613 env[1818]: time="2025-03-17T18:19:57.636568257Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Mar 17 18:19:57.637083 env[1818]: time="2025-03-17T18:19:57.636964151Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Mar 17 18:19:57.638706 env[1818]: time="2025-03-17T18:19:57.637106773Z" level=info msg="Connect containerd service" Mar 17 18:19:57.638706 env[1818]: time="2025-03-17T18:19:57.637175539Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Mar 17 18:19:57.640005 polkitd[1886]: Started polkitd version 121 Mar 17 18:19:57.646133 env[1818]: time="2025-03-17T18:19:57.646041273Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 17 18:19:57.646809 env[1818]: time="2025-03-17T18:19:57.646747687Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Mar 17 18:19:57.646947 env[1818]: time="2025-03-17T18:19:57.646896366Z" level=info msg=serving... address=/run/containerd/containerd.sock Mar 17 18:19:57.647110 systemd[1]: Started containerd.service. Mar 17 18:19:57.649887 env[1818]: time="2025-03-17T18:19:57.649518807Z" level=info msg="containerd successfully booted in 0.392448s" Mar 17 18:19:57.651493 env[1818]: time="2025-03-17T18:19:57.650899229Z" level=info msg="Start subscribing containerd event" Mar 17 18:19:57.651493 env[1818]: time="2025-03-17T18:19:57.650993361Z" level=info msg="Start recovering state" Mar 17 18:19:57.651493 env[1818]: time="2025-03-17T18:19:57.651163934Z" level=info msg="Start event monitor" Mar 17 18:19:57.651493 env[1818]: time="2025-03-17T18:19:57.651206354Z" level=info msg="Start snapshots syncer" Mar 17 18:19:57.651493 env[1818]: time="2025-03-17T18:19:57.651231631Z" level=info msg="Start cni network conf syncer for default" Mar 17 18:19:57.651493 env[1818]: time="2025-03-17T18:19:57.651252803Z" level=info msg="Start streaming server" Mar 17 18:19:57.664606 polkitd[1886]: Loading rules from directory /etc/polkit-1/rules.d Mar 17 18:19:57.664740 polkitd[1886]: Loading rules from directory /usr/share/polkit-1/rules.d Mar 17 18:19:57.668064 polkitd[1886]: Finished loading, compiling and executing 2 rules Mar 17 18:19:57.671081 dbus-daemon[1796]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Mar 17 18:19:57.671365 systemd[1]: Started polkit.service. Mar 17 18:19:57.675092 polkitd[1886]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Mar 17 18:19:57.716630 systemd-hostnamed[1842]: Hostname set to (transient) Mar 17 18:19:57.717630 systemd-resolved[1762]: System hostname changed to 'ip-172-31-22-27'. Mar 17 18:19:57.952647 coreos-metadata[1795]: Mar 17 18:19:57.952 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Mar 17 18:19:57.955704 coreos-metadata[1795]: Mar 17 18:19:57.955 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Mar 17 18:19:57.958731 coreos-metadata[1795]: Mar 17 18:19:57.958 INFO Fetch successful Mar 17 18:19:57.958966 coreos-metadata[1795]: Mar 17 18:19:57.958 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Mar 17 18:19:57.961103 coreos-metadata[1795]: Mar 17 18:19:57.961 INFO Fetch successful Mar 17 18:19:57.964164 unknown[1795]: wrote ssh authorized keys file for user: core Mar 17 18:19:58.000885 update-ssh-keys[1956]: Updated "/home/core/.ssh/authorized_keys" Mar 17 18:19:58.001745 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO Create new startup processor Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [LongRunningPluginsManager] registered plugins: {} Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO Initializing bookkeeping folders Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO removing the completed state files Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO Initializing bookkeeping folders for long running plugins Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO Initializing healthcheck folders for long running plugins Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO Initializing locations for inventory plugin Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO Initializing default location for custom inventory Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO Initializing default location for file inventory Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO Initializing default location for role inventory Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO Init the cloudwatchlogs publisher Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [instanceID=i-0672f56500c52bf0c] Successfully loaded platform independent plugin aws:downloadContent Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [instanceID=i-0672f56500c52bf0c] Successfully loaded platform independent plugin aws:runDocument Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [instanceID=i-0672f56500c52bf0c] Successfully loaded platform independent plugin aws:runPowerShellScript Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [instanceID=i-0672f56500c52bf0c] Successfully loaded platform independent plugin aws:updateSsmAgent Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [instanceID=i-0672f56500c52bf0c] Successfully loaded platform independent plugin aws:runDockerAction Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [instanceID=i-0672f56500c52bf0c] Successfully loaded platform independent plugin aws:refreshAssociation Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [instanceID=i-0672f56500c52bf0c] Successfully loaded platform independent plugin aws:configurePackage Mar 17 18:19:58.172958 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [instanceID=i-0672f56500c52bf0c] Successfully loaded platform independent plugin aws:softwareInventory Mar 17 18:19:58.175548 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [instanceID=i-0672f56500c52bf0c] Successfully loaded platform independent plugin aws:configureDocker Mar 17 18:19:58.175548 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [instanceID=i-0672f56500c52bf0c] Successfully loaded platform dependent plugin aws:runShellScript Mar 17 18:19:58.175548 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Mar 17 18:19:58.175548 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO OS: linux, Arch: arm64 Mar 17 18:19:58.179666 amazon-ssm-agent[1812]: datastore file /var/lib/amazon/ssm/i-0672f56500c52bf0c/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Mar 17 18:19:58.270612 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [MessagingDeliveryService] Starting document processing engine... Mar 17 18:19:58.364639 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [MessagingDeliveryService] [EngineProcessor] Starting Mar 17 18:19:58.389631 locksmithd[1873]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Mar 17 18:19:58.459014 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Mar 17 18:19:58.553647 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [MessagingDeliveryService] Starting message polling Mar 17 18:19:58.648315 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [MessagingDeliveryService] Starting send replies to MDS Mar 17 18:19:58.743250 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [instanceID=i-0672f56500c52bf0c] Starting association polling Mar 17 18:19:58.838437 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Mar 17 18:19:58.933723 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [MessagingDeliveryService] [Association] Launching response handler Mar 17 18:19:59.029230 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Mar 17 18:19:59.125041 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Mar 17 18:19:59.220939 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Mar 17 18:19:59.317282 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [HealthCheck] HealthCheck reporting agent health. Mar 17 18:19:59.413716 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [MessageGatewayService] Starting session document processing engine... Mar 17 18:19:59.510275 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [MessageGatewayService] [EngineProcessor] Starting Mar 17 18:19:59.553081 systemd[1]: Started kubelet.service. Mar 17 18:19:59.607055 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Mar 17 18:19:59.694073 sshd_keygen[1824]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Mar 17 18:19:59.703990 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0672f56500c52bf0c, requestId: 4889b50c-cfb6-4c08-b453-976c72e4254a Mar 17 18:19:59.738787 systemd[1]: Finished sshd-keygen.service. Mar 17 18:19:59.743594 systemd[1]: Starting issuegen.service... Mar 17 18:19:59.756243 systemd[1]: issuegen.service: Deactivated successfully. Mar 17 18:19:59.756649 systemd[1]: Finished issuegen.service. Mar 17 18:19:59.761500 systemd[1]: Starting systemd-user-sessions.service... Mar 17 18:19:59.778600 systemd[1]: Finished systemd-user-sessions.service. Mar 17 18:19:59.783414 systemd[1]: Started getty@tty1.service. Mar 17 18:19:59.788323 systemd[1]: Started serial-getty@ttyS0.service. Mar 17 18:19:59.791518 systemd[1]: Reached target getty.target. Mar 17 18:19:59.793301 systemd[1]: Reached target multi-user.target. Mar 17 18:19:59.797894 systemd[1]: Starting systemd-update-utmp-runlevel.service... Mar 17 18:19:59.801460 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [OfflineService] Starting document processing engine... Mar 17 18:19:59.817397 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Mar 17 18:19:59.817795 systemd[1]: Finished systemd-update-utmp-runlevel.service. Mar 17 18:19:59.820093 systemd[1]: Startup finished in 1.193s (kernel) + 7.651s (initrd) + 11.574s (userspace) = 20.419s. Mar 17 18:19:59.898841 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [OfflineService] [EngineProcessor] Starting Mar 17 18:19:59.996812 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [OfflineService] [EngineProcessor] Initial processing Mar 17 18:20:00.095357 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [OfflineService] Starting message polling Mar 17 18:20:00.193844 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [OfflineService] Starting send replies to MDS Mar 17 18:20:00.292297 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [LongRunningPluginsManager] starting long running plugin manager Mar 17 18:20:00.390604 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Mar 17 18:20:00.489038 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [MessageGatewayService] listening reply. Mar 17 18:20:00.588621 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Mar 17 18:20:00.687175 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [StartupProcessor] Executing startup processor tasks Mar 17 18:20:00.786358 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Mar 17 18:20:00.868377 kubelet[1991]: E0317 18:20:00.868254 1991 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:20:00.872593 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:20:00.872948 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:20:00.873379 systemd[1]: kubelet.service: Consumed 1.456s CPU time. Mar 17 18:20:00.885440 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Mar 17 18:20:00.984688 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.7 Mar 17 18:20:01.084894 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0672f56500c52bf0c?role=subscribe&stream=input Mar 17 18:20:01.185209 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0672f56500c52bf0c?role=subscribe&stream=input Mar 17 18:20:01.285373 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [MessageGatewayService] Starting receiving message from control channel Mar 17 18:20:01.385461 amazon-ssm-agent[1812]: 2025-03-17 18:19:58 INFO [MessageGatewayService] [EngineProcessor] Initial processing Mar 17 18:20:01.485801 amazon-ssm-agent[1812]: 2025-03-17 18:19:59 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Mar 17 18:20:05.319887 systemd[1]: Created slice system-sshd.slice. Mar 17 18:20:05.322574 systemd[1]: Started sshd@0-172.31.22.27:22-139.178.89.65:58342.service. Mar 17 18:20:05.594181 sshd[2013]: Accepted publickey for core from 139.178.89.65 port 58342 ssh2: RSA SHA256:azelU3G0DadBCmAXuAehsKOCz630heU8UfFnUiqM6ac Mar 17 18:20:05.599694 sshd[2013]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:20:05.619335 systemd[1]: Created slice user-500.slice. Mar 17 18:20:05.622554 systemd[1]: Starting user-runtime-dir@500.service... Mar 17 18:20:05.629934 systemd-logind[1803]: New session 1 of user core. Mar 17 18:20:05.643920 systemd[1]: Finished user-runtime-dir@500.service. Mar 17 18:20:05.646972 systemd[1]: Starting user@500.service... Mar 17 18:20:05.654367 (systemd)[2016]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:20:05.837712 systemd[2016]: Queued start job for default target default.target. Mar 17 18:20:05.839982 systemd[2016]: Reached target paths.target. Mar 17 18:20:05.840201 systemd[2016]: Reached target sockets.target. Mar 17 18:20:05.840380 systemd[2016]: Reached target timers.target. Mar 17 18:20:05.840529 systemd[2016]: Reached target basic.target. Mar 17 18:20:05.840816 systemd[1]: Started user@500.service. Mar 17 18:20:05.842125 systemd[2016]: Reached target default.target. Mar 17 18:20:05.842383 systemd[2016]: Startup finished in 175ms. Mar 17 18:20:05.842645 systemd[1]: Started session-1.scope. Mar 17 18:20:05.989512 systemd[1]: Started sshd@1-172.31.22.27:22-139.178.89.65:58344.service. Mar 17 18:20:06.166500 sshd[2025]: Accepted publickey for core from 139.178.89.65 port 58344 ssh2: RSA SHA256:azelU3G0DadBCmAXuAehsKOCz630heU8UfFnUiqM6ac Mar 17 18:20:06.169118 sshd[2025]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:20:06.177767 systemd-logind[1803]: New session 2 of user core. Mar 17 18:20:06.178683 systemd[1]: Started session-2.scope. Mar 17 18:20:06.310660 sshd[2025]: pam_unix(sshd:session): session closed for user core Mar 17 18:20:06.316457 systemd-logind[1803]: Session 2 logged out. Waiting for processes to exit. Mar 17 18:20:06.317112 systemd[1]: sshd@1-172.31.22.27:22-139.178.89.65:58344.service: Deactivated successfully. Mar 17 18:20:06.318443 systemd[1]: session-2.scope: Deactivated successfully. Mar 17 18:20:06.319920 systemd-logind[1803]: Removed session 2. Mar 17 18:20:06.341385 systemd[1]: Started sshd@2-172.31.22.27:22-139.178.89.65:58348.service. Mar 17 18:20:06.521192 sshd[2031]: Accepted publickey for core from 139.178.89.65 port 58348 ssh2: RSA SHA256:azelU3G0DadBCmAXuAehsKOCz630heU8UfFnUiqM6ac Mar 17 18:20:06.522940 sshd[2031]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:20:06.532441 systemd[1]: Started session-3.scope. Mar 17 18:20:06.533979 systemd-logind[1803]: New session 3 of user core. Mar 17 18:20:06.658783 sshd[2031]: pam_unix(sshd:session): session closed for user core Mar 17 18:20:06.665118 systemd[1]: sshd@2-172.31.22.27:22-139.178.89.65:58348.service: Deactivated successfully. Mar 17 18:20:06.665424 systemd-logind[1803]: Session 3 logged out. Waiting for processes to exit. Mar 17 18:20:06.666445 systemd[1]: session-3.scope: Deactivated successfully. Mar 17 18:20:06.668486 systemd-logind[1803]: Removed session 3. Mar 17 18:20:06.687746 systemd[1]: Started sshd@3-172.31.22.27:22-139.178.89.65:58352.service. Mar 17 18:20:06.868992 sshd[2037]: Accepted publickey for core from 139.178.89.65 port 58352 ssh2: RSA SHA256:azelU3G0DadBCmAXuAehsKOCz630heU8UfFnUiqM6ac Mar 17 18:20:06.871871 sshd[2037]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:20:06.882286 systemd-logind[1803]: New session 4 of user core. Mar 17 18:20:06.882455 systemd[1]: Started session-4.scope. Mar 17 18:20:07.021788 sshd[2037]: pam_unix(sshd:session): session closed for user core Mar 17 18:20:07.028972 systemd-logind[1803]: Session 4 logged out. Waiting for processes to exit. Mar 17 18:20:07.029638 systemd[1]: sshd@3-172.31.22.27:22-139.178.89.65:58352.service: Deactivated successfully. Mar 17 18:20:07.032258 systemd[1]: session-4.scope: Deactivated successfully. Mar 17 18:20:07.035336 systemd-logind[1803]: Removed session 4. Mar 17 18:20:07.051310 systemd[1]: Started sshd@4-172.31.22.27:22-139.178.89.65:58366.service. Mar 17 18:20:07.233362 sshd[2043]: Accepted publickey for core from 139.178.89.65 port 58366 ssh2: RSA SHA256:azelU3G0DadBCmAXuAehsKOCz630heU8UfFnUiqM6ac Mar 17 18:20:07.235890 sshd[2043]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:20:07.243710 systemd-logind[1803]: New session 5 of user core. Mar 17 18:20:07.244661 systemd[1]: Started session-5.scope. Mar 17 18:20:07.386992 sudo[2046]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Mar 17 18:20:07.388050 sudo[2046]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:20:07.421147 dbus-daemon[1796]: avc: received setenforce notice (enforcing=1) Mar 17 18:20:07.423956 sudo[2046]: pam_unix(sudo:session): session closed for user root Mar 17 18:20:07.449602 sshd[2043]: pam_unix(sshd:session): session closed for user core Mar 17 18:20:07.455243 systemd[1]: sshd@4-172.31.22.27:22-139.178.89.65:58366.service: Deactivated successfully. Mar 17 18:20:07.456593 systemd[1]: session-5.scope: Deactivated successfully. Mar 17 18:20:07.457845 systemd-logind[1803]: Session 5 logged out. Waiting for processes to exit. Mar 17 18:20:07.460404 systemd-logind[1803]: Removed session 5. Mar 17 18:20:07.477528 systemd[1]: Started sshd@5-172.31.22.27:22-139.178.89.65:58376.service. Mar 17 18:20:07.652743 sshd[2050]: Accepted publickey for core from 139.178.89.65 port 58376 ssh2: RSA SHA256:azelU3G0DadBCmAXuAehsKOCz630heU8UfFnUiqM6ac Mar 17 18:20:07.655689 sshd[2050]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:20:07.664320 systemd[1]: Started session-6.scope. Mar 17 18:20:07.665117 systemd-logind[1803]: New session 6 of user core. Mar 17 18:20:07.773523 sudo[2054]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Mar 17 18:20:07.774141 sudo[2054]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:20:07.779967 sudo[2054]: pam_unix(sudo:session): session closed for user root Mar 17 18:20:07.789664 sudo[2053]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Mar 17 18:20:07.790733 sudo[2053]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:20:07.808603 systemd[1]: Stopping audit-rules.service... Mar 17 18:20:07.809000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 18:20:07.812417 kernel: kauditd_printk_skb: 117 callbacks suppressed Mar 17 18:20:07.812506 kernel: audit: type=1305 audit(1742235607.809:210): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 18:20:07.813315 auditctl[2057]: No rules Mar 17 18:20:07.814247 systemd[1]: audit-rules.service: Deactivated successfully. Mar 17 18:20:07.814593 systemd[1]: Stopped audit-rules.service. Mar 17 18:20:07.809000 audit[2057]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd66b2c60 a2=420 a3=0 items=0 ppid=1 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:07.827465 kernel: audit: type=1300 audit(1742235607.809:210): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd66b2c60 a2=420 a3=0 items=0 ppid=1 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:07.829066 systemd[1]: Starting audit-rules.service... Mar 17 18:20:07.809000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Mar 17 18:20:07.833869 kernel: audit: type=1327 audit(1742235607.809:210): proctitle=2F7362696E2F617564697463746C002D44 Mar 17 18:20:07.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:20:07.841503 kernel: audit: type=1131 audit(1742235607.813:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:20:07.861590 augenrules[2074]: No rules Mar 17 18:20:07.863317 systemd[1]: Finished audit-rules.service. Mar 17 18:20:07.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:20:07.872372 sudo[2053]: pam_unix(sudo:session): session closed for user root Mar 17 18:20:07.871000 audit[2053]: USER_END pid=2053 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:20:07.881202 kernel: audit: type=1130 audit(1742235607.862:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:20:07.881323 kernel: audit: type=1106 audit(1742235607.871:213): pid=2053 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:20:07.871000 audit[2053]: CRED_DISP pid=2053 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:20:07.889258 kernel: audit: type=1104 audit(1742235607.871:214): pid=2053 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:20:07.896367 sshd[2050]: pam_unix(sshd:session): session closed for user core Mar 17 18:20:07.897000 audit[2050]: USER_END pid=2050 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:20:07.898000 audit[2050]: CRED_DISP pid=2050 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:20:07.910690 systemd[1]: sshd@5-172.31.22.27:22-139.178.89.65:58376.service: Deactivated successfully. Mar 17 18:20:07.912224 systemd[1]: session-6.scope: Deactivated successfully. Mar 17 18:20:07.920040 kernel: audit: type=1106 audit(1742235607.897:215): pid=2050 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:20:07.920190 kernel: audit: type=1104 audit(1742235607.898:216): pid=2050 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:20:07.919609 systemd-logind[1803]: Session 6 logged out. Waiting for processes to exit. Mar 17 18:20:07.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.22.27:22-139.178.89.65:58376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:20:07.931644 kernel: audit: type=1131 audit(1742235607.910:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.22.27:22-139.178.89.65:58376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:20:07.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.22.27:22-139.178.89.65:58380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:20:07.929228 systemd[1]: Started sshd@6-172.31.22.27:22-139.178.89.65:58380.service. Mar 17 18:20:07.931439 systemd-logind[1803]: Removed session 6. Mar 17 18:20:08.106000 audit[2080]: USER_ACCT pid=2080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:20:08.107567 sshd[2080]: Accepted publickey for core from 139.178.89.65 port 58380 ssh2: RSA SHA256:azelU3G0DadBCmAXuAehsKOCz630heU8UfFnUiqM6ac Mar 17 18:20:08.108000 audit[2080]: CRED_ACQ pid=2080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:20:08.108000 audit[2080]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc01db860 a2=3 a3=1 items=0 ppid=1 pid=2080 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:08.108000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:20:08.110672 sshd[2080]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:20:08.119403 systemd[1]: Started session-7.scope. Mar 17 18:20:08.120404 systemd-logind[1803]: New session 7 of user core. Mar 17 18:20:08.129000 audit[2080]: USER_START pid=2080 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:20:08.132000 audit[2082]: CRED_ACQ pid=2082 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:20:08.230000 audit[2083]: USER_ACCT pid=2083 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:20:08.232042 sudo[2083]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Mar 17 18:20:08.231000 audit[2083]: CRED_REFR pid=2083 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:20:08.233341 sudo[2083]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:20:08.236000 audit[2083]: USER_START pid=2083 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:20:08.258717 systemd[1]: Starting coreos-metadata.service... Mar 17 18:20:08.427736 coreos-metadata[2087]: Mar 17 18:20:08.427 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Mar 17 18:20:08.428767 coreos-metadata[2087]: Mar 17 18:20:08.428 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Mar 17 18:20:08.429507 coreos-metadata[2087]: Mar 17 18:20:08.429 INFO Fetch successful Mar 17 18:20:08.429857 coreos-metadata[2087]: Mar 17 18:20:08.429 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Mar 17 18:20:08.430213 coreos-metadata[2087]: Mar 17 18:20:08.430 INFO Fetch successful Mar 17 18:20:08.430521 coreos-metadata[2087]: Mar 17 18:20:08.430 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Mar 17 18:20:08.430947 coreos-metadata[2087]: Mar 17 18:20:08.430 INFO Fetch successful Mar 17 18:20:08.431241 coreos-metadata[2087]: Mar 17 18:20:08.431 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Mar 17 18:20:08.431529 coreos-metadata[2087]: Mar 17 18:20:08.431 INFO Fetch successful Mar 17 18:20:08.431784 coreos-metadata[2087]: Mar 17 18:20:08.431 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Mar 17 18:20:08.432140 coreos-metadata[2087]: Mar 17 18:20:08.431 INFO Fetch successful Mar 17 18:20:08.432446 coreos-metadata[2087]: Mar 17 18:20:08.432 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Mar 17 18:20:08.432791 coreos-metadata[2087]: Mar 17 18:20:08.432 INFO Fetch successful Mar 17 18:20:08.433088 coreos-metadata[2087]: Mar 17 18:20:08.432 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Mar 17 18:20:08.433384 coreos-metadata[2087]: Mar 17 18:20:08.433 INFO Fetch successful Mar 17 18:20:08.433643 coreos-metadata[2087]: Mar 17 18:20:08.433 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Mar 17 18:20:08.433967 coreos-metadata[2087]: Mar 17 18:20:08.433 INFO Fetch successful Mar 17 18:20:08.449991 systemd[1]: Finished coreos-metadata.service. Mar 17 18:20:08.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:20:09.949024 systemd[1]: Stopped kubelet.service. Mar 17 18:20:09.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:20:09.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:20:09.950238 systemd[1]: kubelet.service: Consumed 1.456s CPU time. Mar 17 18:20:09.955127 systemd[1]: Starting kubelet.service... Mar 17 18:20:10.004490 systemd[1]: Reloading. Mar 17 18:20:10.205006 /usr/lib/systemd/system-generators/torcx-generator[2145]: time="2025-03-17T18:20:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:20:10.205095 /usr/lib/systemd/system-generators/torcx-generator[2145]: time="2025-03-17T18:20:10Z" level=info msg="torcx already run" Mar 17 18:20:10.398777 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:20:10.398837 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:20:10.438940 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:20:10.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.601000 audit: BPF prog-id=49 op=LOAD Mar 17 18:20:10.602000 audit: BPF prog-id=30 op=UNLOAD Mar 17 18:20:10.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit: BPF prog-id=50 op=LOAD Mar 17 18:20:10.607000 audit: BPF prog-id=41 op=UNLOAD Mar 17 18:20:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit: BPF prog-id=51 op=LOAD Mar 17 18:20:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.607000 audit: BPF prog-id=52 op=LOAD Mar 17 18:20:10.607000 audit: BPF prog-id=42 op=UNLOAD Mar 17 18:20:10.607000 audit: BPF prog-id=43 op=UNLOAD Mar 17 18:20:10.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.610000 audit: BPF prog-id=53 op=LOAD Mar 17 18:20:10.610000 audit: BPF prog-id=47 op=UNLOAD Mar 17 18:20:10.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.612000 audit: BPF prog-id=54 op=LOAD Mar 17 18:20:10.612000 audit: BPF prog-id=40 op=UNLOAD Mar 17 18:20:10.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.615000 audit: BPF prog-id=55 op=LOAD Mar 17 18:20:10.615000 audit: BPF prog-id=39 op=UNLOAD Mar 17 18:20:10.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.619000 audit: BPF prog-id=56 op=LOAD Mar 17 18:20:10.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.619000 audit: BPF prog-id=57 op=LOAD Mar 17 18:20:10.619000 audit: BPF prog-id=31 op=UNLOAD Mar 17 18:20:10.619000 audit: BPF prog-id=32 op=UNLOAD Mar 17 18:20:10.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.621000 audit: BPF prog-id=58 op=LOAD Mar 17 18:20:10.622000 audit: BPF prog-id=33 op=UNLOAD Mar 17 18:20:10.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.622000 audit: BPF prog-id=59 op=LOAD Mar 17 18:20:10.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.622000 audit: BPF prog-id=60 op=LOAD Mar 17 18:20:10.622000 audit: BPF prog-id=34 op=UNLOAD Mar 17 18:20:10.622000 audit: BPF prog-id=35 op=UNLOAD Mar 17 18:20:10.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.623000 audit: BPF prog-id=61 op=LOAD Mar 17 18:20:10.624000 audit: BPF prog-id=44 op=UNLOAD Mar 17 18:20:10.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.624000 audit: BPF prog-id=62 op=LOAD Mar 17 18:20:10.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.624000 audit: BPF prog-id=63 op=LOAD Mar 17 18:20:10.624000 audit: BPF prog-id=45 op=UNLOAD Mar 17 18:20:10.624000 audit: BPF prog-id=46 op=UNLOAD Mar 17 18:20:10.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit: BPF prog-id=64 op=LOAD Mar 17 18:20:10.626000 audit: BPF prog-id=36 op=UNLOAD Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit: BPF prog-id=65 op=LOAD Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:10.626000 audit: BPF prog-id=66 op=LOAD Mar 17 18:20:10.627000 audit: BPF prog-id=37 op=UNLOAD Mar 17 18:20:10.627000 audit: BPF prog-id=38 op=UNLOAD Mar 17 18:20:10.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:20:10.672021 systemd[1]: Started kubelet.service. Mar 17 18:20:10.683511 systemd[1]: Stopping kubelet.service... Mar 17 18:20:10.684370 systemd[1]: kubelet.service: Deactivated successfully. Mar 17 18:20:10.684760 systemd[1]: Stopped kubelet.service. Mar 17 18:20:10.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:20:10.688387 systemd[1]: Starting kubelet.service... Mar 17 18:20:10.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:20:10.967284 systemd[1]: Started kubelet.service. Mar 17 18:20:11.061334 kubelet[2212]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 18:20:11.061334 kubelet[2212]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Mar 17 18:20:11.061334 kubelet[2212]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 18:20:11.062059 kubelet[2212]: I0317 18:20:11.061445 2212 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Mar 17 18:20:11.818055 kubelet[2212]: I0317 18:20:11.817995 2212 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Mar 17 18:20:11.818055 kubelet[2212]: I0317 18:20:11.818043 2212 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Mar 17 18:20:11.818464 kubelet[2212]: I0317 18:20:11.818388 2212 server.go:927] "Client rotation is on, will bootstrap in background" Mar 17 18:20:11.848797 kubelet[2212]: I0317 18:20:11.848757 2212 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Mar 17 18:20:11.868701 kubelet[2212]: I0317 18:20:11.868634 2212 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Mar 17 18:20:11.869249 kubelet[2212]: I0317 18:20:11.869175 2212 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Mar 17 18:20:11.869556 kubelet[2212]: I0317 18:20:11.869242 2212 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.31.22.27","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Mar 17 18:20:11.869791 kubelet[2212]: I0317 18:20:11.869585 2212 topology_manager.go:138] "Creating topology manager with none policy" Mar 17 18:20:11.869791 kubelet[2212]: I0317 18:20:11.869613 2212 container_manager_linux.go:301] "Creating device plugin manager" Mar 17 18:20:11.870016 kubelet[2212]: I0317 18:20:11.869914 2212 state_mem.go:36] "Initialized new in-memory state store" Mar 17 18:20:11.875233 kubelet[2212]: I0317 18:20:11.875188 2212 kubelet.go:400] "Attempting to sync node with API server" Mar 17 18:20:11.875549 kubelet[2212]: I0317 18:20:11.875518 2212 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Mar 17 18:20:11.875895 kubelet[2212]: I0317 18:20:11.875865 2212 kubelet.go:312] "Adding apiserver pod source" Mar 17 18:20:11.876135 kubelet[2212]: I0317 18:20:11.876103 2212 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Mar 17 18:20:11.876359 kubelet[2212]: E0317 18:20:11.876129 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:11.876359 kubelet[2212]: E0317 18:20:11.876027 2212 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:11.877865 kubelet[2212]: I0317 18:20:11.877792 2212 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Mar 17 18:20:11.878550 kubelet[2212]: I0317 18:20:11.878513 2212 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Mar 17 18:20:11.878810 kubelet[2212]: W0317 18:20:11.878784 2212 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Mar 17 18:20:11.880350 kubelet[2212]: I0317 18:20:11.880312 2212 server.go:1264] "Started kubelet" Mar 17 18:20:11.882000 audit[2212]: AVC avc: denied { mac_admin } for pid=2212 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:11.882000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:20:11.882000 audit[2212]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009b87e0 a1=4000bd2e58 a2=40009b87b0 a3=25 items=0 ppid=1 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:11.882000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:20:11.883755 kubelet[2212]: I0317 18:20:11.883704 2212 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Mar 17 18:20:11.883000 audit[2212]: AVC avc: denied { mac_admin } for pid=2212 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:11.883000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:20:11.883000 audit[2212]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009d0140 a1=4000bd2e70 a2=40009b8870 a3=25 items=0 ppid=1 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:11.883000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:20:11.884395 kubelet[2212]: I0317 18:20:11.884353 2212 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Mar 17 18:20:11.884748 kubelet[2212]: I0317 18:20:11.884714 2212 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Mar 17 18:20:11.892492 kubelet[2212]: I0317 18:20:11.892413 2212 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Mar 17 18:20:11.894494 kubelet[2212]: I0317 18:20:11.894443 2212 server.go:455] "Adding debug handlers to kubelet server" Mar 17 18:20:11.896325 kubelet[2212]: I0317 18:20:11.896232 2212 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Mar 17 18:20:11.896687 kubelet[2212]: I0317 18:20:11.896643 2212 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Mar 17 18:20:11.910541 kubelet[2212]: I0317 18:20:11.909689 2212 volume_manager.go:291] "Starting Kubelet Volume Manager" Mar 17 18:20:11.910541 kubelet[2212]: I0317 18:20:11.910419 2212 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Mar 17 18:20:11.912871 kubelet[2212]: I0317 18:20:11.912730 2212 reconciler.go:26] "Reconciler: start to sync state" Mar 17 18:20:11.919041 kubelet[2212]: W0317 18:20:11.918973 2212 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Mar 17 18:20:11.919041 kubelet[2212]: E0317 18:20:11.919044 2212 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Mar 17 18:20:11.933586 kubelet[2212]: I0317 18:20:11.933535 2212 factory.go:221] Registration of the containerd container factory successfully Mar 17 18:20:11.933872 kubelet[2212]: I0317 18:20:11.933800 2212 factory.go:221] Registration of the systemd container factory successfully Mar 17 18:20:11.934291 kubelet[2212]: I0317 18:20:11.934241 2212 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Mar 17 18:20:11.944070 kubelet[2212]: E0317 18:20:11.944007 2212 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Mar 17 18:20:11.958315 kubelet[2212]: E0317 18:20:11.958098 2212 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.22.27.182daa0ee9278461 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.22.27,UID:172.31.22.27,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.31.22.27,},FirstTimestamp:2025-03-17 18:20:11.880195169 +0000 UTC m=+0.905806446,LastTimestamp:2025-03-17 18:20:11.880195169 +0000 UTC m=+0.905806446,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.22.27,}" Mar 17 18:20:11.961457 kubelet[2212]: E0317 18:20:11.961398 2212 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.22.27\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Mar 17 18:20:11.961952 kubelet[2212]: W0317 18:20:11.961913 2212 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "172.31.22.27" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Mar 17 18:20:11.964899 kubelet[2212]: E0317 18:20:11.964832 2212 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.22.27" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Mar 17 18:20:11.965400 kubelet[2212]: W0317 18:20:11.965366 2212 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Mar 17 18:20:11.965671 kubelet[2212]: E0317 18:20:11.965647 2212 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Mar 17 18:20:11.967000 audit[2225]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:11.967000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd34b8cb0 a2=0 a3=1 items=0 ppid=2212 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:11.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 18:20:11.971000 audit[2230]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:11.971000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=fffff6ce3db0 a2=0 a3=1 items=0 ppid=2212 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:11.971000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 18:20:11.993890 kubelet[2212]: I0317 18:20:11.993849 2212 cpu_manager.go:214] "Starting CPU manager" policy="none" Mar 17 18:20:11.994119 kubelet[2212]: I0317 18:20:11.994093 2212 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Mar 17 18:20:11.994251 kubelet[2212]: I0317 18:20:11.994230 2212 state_mem.go:36] "Initialized new in-memory state store" Mar 17 18:20:11.998100 kubelet[2212]: I0317 18:20:11.998058 2212 policy_none.go:49] "None policy: Start" Mar 17 18:20:12.000205 kubelet[2212]: I0317 18:20:12.000167 2212 memory_manager.go:170] "Starting memorymanager" policy="None" Mar 17 18:20:12.000449 kubelet[2212]: I0317 18:20:12.000425 2212 state_mem.go:35] "Initializing new in-memory state store" Mar 17 18:20:12.013635 systemd[1]: Created slice kubepods.slice. Mar 17 18:20:12.016212 kubelet[2212]: I0317 18:20:12.016141 2212 kubelet_node_status.go:73] "Attempting to register node" node="172.31.22.27" Mar 17 18:20:12.027484 kubelet[2212]: I0317 18:20:12.025333 2212 kubelet_node_status.go:76] "Successfully registered node" node="172.31.22.27" Mar 17 18:20:12.027208 systemd[1]: Created slice kubepods-burstable.slice. Mar 17 18:20:11.996000 audit[2232]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:11.996000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffea9c59c0 a2=0 a3=1 items=0 ppid=2212 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:11.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:20:12.037099 systemd[1]: Created slice kubepods-besteffort.slice. Mar 17 18:20:12.045724 kubelet[2212]: I0317 18:20:12.045674 2212 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Mar 17 18:20:12.044000 audit[2212]: AVC avc: denied { mac_admin } for pid=2212 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:12.044000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:20:12.044000 audit[2212]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009b9260 a1=4000d16be8 a2=40009b9230 a3=25 items=0 ppid=1 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:12.044000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:20:12.048412 kubelet[2212]: I0317 18:20:12.048198 2212 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Mar 17 18:20:12.047000 audit[2237]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:12.047000 audit[2237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff82c7ae0 a2=0 a3=1 items=0 ppid=2212 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:12.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:20:12.049024 kubelet[2212]: I0317 18:20:12.048704 2212 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Mar 17 18:20:12.049024 kubelet[2212]: I0317 18:20:12.048942 2212 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Mar 17 18:20:12.053982 kubelet[2212]: E0317 18:20:12.053931 2212 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.22.27\" not found" Mar 17 18:20:12.085842 kubelet[2212]: E0317 18:20:12.085661 2212 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.27\" not found" Mar 17 18:20:12.186754 kubelet[2212]: E0317 18:20:12.186669 2212 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.27\" not found" Mar 17 18:20:12.199000 audit[2242]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:12.199000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd812d540 a2=0 a3=1 items=0 ppid=2212 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:12.199000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Mar 17 18:20:12.201756 kubelet[2212]: I0317 18:20:12.201673 2212 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Mar 17 18:20:12.203000 audit[2243]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:12.203000 audit[2243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe5144ff0 a2=0 a3=1 items=0 ppid=2212 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:12.203000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 18:20:12.204000 audit[2244]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:12.204000 audit[2244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffa313c30 a2=0 a3=1 items=0 ppid=2212 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:12.204000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 18:20:12.206328 kubelet[2212]: I0317 18:20:12.206270 2212 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Mar 17 18:20:12.206468 kubelet[2212]: I0317 18:20:12.206353 2212 status_manager.go:217] "Starting to sync pod status with apiserver" Mar 17 18:20:12.206468 kubelet[2212]: I0317 18:20:12.206387 2212 kubelet.go:2337] "Starting kubelet main sync loop" Mar 17 18:20:12.206601 kubelet[2212]: E0317 18:20:12.206467 2212 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Mar 17 18:20:12.209000 audit[2245]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:12.209000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff23e9700 a2=0 a3=1 items=0 ppid=2212 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:12.209000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 18:20:12.211000 audit[2246]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:12.211000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffda22b660 a2=0 a3=1 items=0 ppid=2212 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:12.211000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 18:20:12.212000 audit[2247]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:12.212000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff7916470 a2=0 a3=1 items=0 ppid=2212 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:12.212000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 18:20:12.214000 audit[2248]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:12.214000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe90b7b30 a2=0 a3=1 items=0 ppid=2212 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:12.214000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 18:20:12.216000 audit[2249]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:12.216000 audit[2249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff49327a0 a2=0 a3=1 items=0 ppid=2212 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:12.216000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 18:20:12.287829 kubelet[2212]: E0317 18:20:12.287759 2212 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.27\" not found" Mar 17 18:20:12.388625 kubelet[2212]: E0317 18:20:12.388473 2212 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.27\" not found" Mar 17 18:20:12.489594 kubelet[2212]: E0317 18:20:12.489250 2212 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.27\" not found" Mar 17 18:20:12.504925 sudo[2083]: pam_unix(sudo:session): session closed for user root Mar 17 18:20:12.504000 audit[2083]: USER_END pid=2083 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:20:12.505000 audit[2083]: CRED_DISP pid=2083 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:20:12.529526 sshd[2080]: pam_unix(sshd:session): session closed for user core Mar 17 18:20:12.531000 audit[2080]: USER_END pid=2080 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:20:12.531000 audit[2080]: CRED_DISP pid=2080 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:20:12.535440 systemd-logind[1803]: Session 7 logged out. Waiting for processes to exit. Mar 17 18:20:12.536699 systemd[1]: sshd@6-172.31.22.27:22-139.178.89.65:58380.service: Deactivated successfully. Mar 17 18:20:12.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.22.27:22-139.178.89.65:58380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:20:12.538127 systemd[1]: session-7.scope: Deactivated successfully. Mar 17 18:20:12.539727 systemd-logind[1803]: Removed session 7. Mar 17 18:20:12.590116 kubelet[2212]: E0317 18:20:12.590041 2212 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.27\" not found" Mar 17 18:20:12.691270 kubelet[2212]: E0317 18:20:12.691115 2212 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.27\" not found" Mar 17 18:20:12.791287 kubelet[2212]: E0317 18:20:12.791210 2212 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.27\" not found" Mar 17 18:20:12.829070 kubelet[2212]: I0317 18:20:12.829021 2212 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Mar 17 18:20:12.829283 kubelet[2212]: W0317 18:20:12.829251 2212 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Mar 17 18:20:12.877085 kubelet[2212]: E0317 18:20:12.877024 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:12.891690 kubelet[2212]: E0317 18:20:12.891629 2212 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.27\" not found" Mar 17 18:20:12.993382 kubelet[2212]: I0317 18:20:12.993343 2212 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Mar 17 18:20:12.994321 env[1818]: time="2025-03-17T18:20:12.994117168Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Mar 17 18:20:12.995338 kubelet[2212]: I0317 18:20:12.995296 2212 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Mar 17 18:20:13.877998 kubelet[2212]: E0317 18:20:13.877954 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:13.878597 kubelet[2212]: I0317 18:20:13.878158 2212 apiserver.go:52] "Watching apiserver" Mar 17 18:20:13.885841 kubelet[2212]: I0317 18:20:13.885767 2212 topology_manager.go:215] "Topology Admit Handler" podUID="1fa6188c-dfe7-4170-b540-a8d1cbef1414" podNamespace="kube-system" podName="kube-proxy-qq9x2" Mar 17 18:20:13.886162 kubelet[2212]: I0317 18:20:13.886133 2212 topology_manager.go:215] "Topology Admit Handler" podUID="6cc9f538-0833-471a-981c-934995c8722c" podNamespace="calico-system" podName="calico-node-ln2qr" Mar 17 18:20:13.886408 kubelet[2212]: I0317 18:20:13.886380 2212 topology_manager.go:215] "Topology Admit Handler" podUID="18cae42e-0875-42b2-8913-ac2b39fe24a2" podNamespace="calico-system" podName="csi-node-driver-9k7db" Mar 17 18:20:13.886808 kubelet[2212]: E0317 18:20:13.886770 2212 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9k7db" podUID="18cae42e-0875-42b2-8913-ac2b39fe24a2" Mar 17 18:20:13.896996 systemd[1]: Created slice kubepods-besteffort-pod6cc9f538_0833_471a_981c_934995c8722c.slice. Mar 17 18:20:13.912138 kubelet[2212]: I0317 18:20:13.911943 2212 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Mar 17 18:20:13.916952 systemd[1]: Created slice kubepods-besteffort-pod1fa6188c_dfe7_4170_b540_a8d1cbef1414.slice. Mar 17 18:20:13.924833 kubelet[2212]: I0317 18:20:13.924739 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gq5bv\" (UniqueName: \"kubernetes.io/projected/6cc9f538-0833-471a-981c-934995c8722c-kube-api-access-gq5bv\") pod \"calico-node-ln2qr\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " pod="calico-system/calico-node-ln2qr" Mar 17 18:20:13.925134 kubelet[2212]: I0317 18:20:13.925102 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-lib-modules\") pod \"calico-node-ln2qr\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " pod="calico-system/calico-node-ln2qr" Mar 17 18:20:13.925298 kubelet[2212]: I0317 18:20:13.925272 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-var-lib-calico\") pod \"calico-node-ln2qr\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " pod="calico-system/calico-node-ln2qr" Mar 17 18:20:13.925443 kubelet[2212]: I0317 18:20:13.925417 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-cni-bin-dir\") pod \"calico-node-ln2qr\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " pod="calico-system/calico-node-ln2qr" Mar 17 18:20:13.925576 kubelet[2212]: I0317 18:20:13.925550 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-cni-net-dir\") pod \"calico-node-ln2qr\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " pod="calico-system/calico-node-ln2qr" Mar 17 18:20:13.925724 kubelet[2212]: I0317 18:20:13.925695 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-flexvol-driver-host\") pod \"calico-node-ln2qr\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " pod="calico-system/calico-node-ln2qr" Mar 17 18:20:13.926048 kubelet[2212]: I0317 18:20:13.926020 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-xtables-lock\") pod \"calico-node-ln2qr\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " pod="calico-system/calico-node-ln2qr" Mar 17 18:20:13.926203 kubelet[2212]: I0317 18:20:13.926177 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-cni-log-dir\") pod \"calico-node-ln2qr\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " pod="calico-system/calico-node-ln2qr" Mar 17 18:20:13.926372 kubelet[2212]: I0317 18:20:13.926323 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1fa6188c-dfe7-4170-b540-a8d1cbef1414-xtables-lock\") pod \"kube-proxy-qq9x2\" (UID: \"1fa6188c-dfe7-4170-b540-a8d1cbef1414\") " pod="kube-system/kube-proxy-qq9x2" Mar 17 18:20:13.926537 kubelet[2212]: I0317 18:20:13.926512 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/18cae42e-0875-42b2-8913-ac2b39fe24a2-kubelet-dir\") pod \"csi-node-driver-9k7db\" (UID: \"18cae42e-0875-42b2-8913-ac2b39fe24a2\") " pod="calico-system/csi-node-driver-9k7db" Mar 17 18:20:13.926701 kubelet[2212]: I0317 18:20:13.926676 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/18cae42e-0875-42b2-8913-ac2b39fe24a2-socket-dir\") pod \"csi-node-driver-9k7db\" (UID: \"18cae42e-0875-42b2-8913-ac2b39fe24a2\") " pod="calico-system/csi-node-driver-9k7db" Mar 17 18:20:13.926878 kubelet[2212]: I0317 18:20:13.926851 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/18cae42e-0875-42b2-8913-ac2b39fe24a2-registration-dir\") pod \"csi-node-driver-9k7db\" (UID: \"18cae42e-0875-42b2-8913-ac2b39fe24a2\") " pod="calico-system/csi-node-driver-9k7db" Mar 17 18:20:13.927023 kubelet[2212]: I0317 18:20:13.926998 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g9jhv\" (UniqueName: \"kubernetes.io/projected/1fa6188c-dfe7-4170-b540-a8d1cbef1414-kube-api-access-g9jhv\") pod \"kube-proxy-qq9x2\" (UID: \"1fa6188c-dfe7-4170-b540-a8d1cbef1414\") " pod="kube-system/kube-proxy-qq9x2" Mar 17 18:20:13.927166 kubelet[2212]: I0317 18:20:13.927140 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c9cc8\" (UniqueName: \"kubernetes.io/projected/18cae42e-0875-42b2-8913-ac2b39fe24a2-kube-api-access-c9cc8\") pod \"csi-node-driver-9k7db\" (UID: \"18cae42e-0875-42b2-8913-ac2b39fe24a2\") " pod="calico-system/csi-node-driver-9k7db" Mar 17 18:20:13.927306 kubelet[2212]: I0317 18:20:13.927281 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/1fa6188c-dfe7-4170-b540-a8d1cbef1414-kube-proxy\") pod \"kube-proxy-qq9x2\" (UID: \"1fa6188c-dfe7-4170-b540-a8d1cbef1414\") " pod="kube-system/kube-proxy-qq9x2" Mar 17 18:20:13.927462 kubelet[2212]: I0317 18:20:13.927437 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1fa6188c-dfe7-4170-b540-a8d1cbef1414-lib-modules\") pod \"kube-proxy-qq9x2\" (UID: \"1fa6188c-dfe7-4170-b540-a8d1cbef1414\") " pod="kube-system/kube-proxy-qq9x2" Mar 17 18:20:13.927601 kubelet[2212]: I0317 18:20:13.927577 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-policysync\") pod \"calico-node-ln2qr\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " pod="calico-system/calico-node-ln2qr" Mar 17 18:20:13.927747 kubelet[2212]: I0317 18:20:13.927722 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6cc9f538-0833-471a-981c-934995c8722c-tigera-ca-bundle\") pod \"calico-node-ln2qr\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " pod="calico-system/calico-node-ln2qr" Mar 17 18:20:13.927941 kubelet[2212]: I0317 18:20:13.927915 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6cc9f538-0833-471a-981c-934995c8722c-node-certs\") pod \"calico-node-ln2qr\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " pod="calico-system/calico-node-ln2qr" Mar 17 18:20:13.928098 kubelet[2212]: I0317 18:20:13.928072 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-var-run-calico\") pod \"calico-node-ln2qr\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " pod="calico-system/calico-node-ln2qr" Mar 17 18:20:13.928259 kubelet[2212]: I0317 18:20:13.928230 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/18cae42e-0875-42b2-8913-ac2b39fe24a2-varrun\") pod \"csi-node-driver-9k7db\" (UID: \"18cae42e-0875-42b2-8913-ac2b39fe24a2\") " pod="calico-system/csi-node-driver-9k7db" Mar 17 18:20:14.034562 kubelet[2212]: E0317 18:20:14.034517 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:20:14.034756 kubelet[2212]: W0317 18:20:14.034726 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:20:14.035002 kubelet[2212]: E0317 18:20:14.034960 2212 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:20:14.035621 kubelet[2212]: E0317 18:20:14.035591 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:20:14.035801 kubelet[2212]: W0317 18:20:14.035773 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:20:14.036015 kubelet[2212]: E0317 18:20:14.035973 2212 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:20:14.043105 kubelet[2212]: E0317 18:20:14.043071 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:20:14.044528 kubelet[2212]: W0317 18:20:14.044470 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:20:14.044964 kubelet[2212]: E0317 18:20:14.044927 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:20:14.044964 kubelet[2212]: W0317 18:20:14.044956 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:20:14.045284 kubelet[2212]: E0317 18:20:14.045230 2212 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:20:14.045439 kubelet[2212]: E0317 18:20:14.045317 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:20:14.045648 kubelet[2212]: W0317 18:20:14.045618 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:20:14.045908 kubelet[2212]: E0317 18:20:14.045329 2212 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:20:14.045908 kubelet[2212]: E0317 18:20:14.045900 2212 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:20:14.046641 kubelet[2212]: E0317 18:20:14.046609 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:20:14.046810 kubelet[2212]: W0317 18:20:14.046782 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:20:14.047024 kubelet[2212]: E0317 18:20:14.046983 2212 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:20:14.048223 kubelet[2212]: E0317 18:20:14.048184 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:20:14.048414 kubelet[2212]: W0317 18:20:14.048385 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:20:14.048649 kubelet[2212]: E0317 18:20:14.048610 2212 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:20:14.055500 kubelet[2212]: E0317 18:20:14.055466 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:20:14.055703 kubelet[2212]: W0317 18:20:14.055662 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:20:14.057257 kubelet[2212]: E0317 18:20:14.057230 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:20:14.057586 kubelet[2212]: W0317 18:20:14.057452 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:20:14.057848 kubelet[2212]: E0317 18:20:14.056102 2212 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:20:14.058005 kubelet[2212]: E0317 18:20:14.057811 2212 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:20:14.058561 kubelet[2212]: E0317 18:20:14.058534 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:20:14.058734 kubelet[2212]: W0317 18:20:14.058689 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:20:14.058925 kubelet[2212]: E0317 18:20:14.058898 2212 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:20:14.072503 kubelet[2212]: E0317 18:20:14.072467 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:20:14.072725 kubelet[2212]: W0317 18:20:14.072692 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:20:14.078448 kubelet[2212]: E0317 18:20:14.078403 2212 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:20:14.082051 kubelet[2212]: E0317 18:20:14.081998 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:20:14.082051 kubelet[2212]: W0317 18:20:14.082041 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:20:14.082245 kubelet[2212]: E0317 18:20:14.082077 2212 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:20:14.089744 kubelet[2212]: E0317 18:20:14.089690 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:20:14.089744 kubelet[2212]: W0317 18:20:14.089728 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:20:14.089965 kubelet[2212]: E0317 18:20:14.089761 2212 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:20:14.215249 env[1818]: time="2025-03-17T18:20:14.215175083Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ln2qr,Uid:6cc9f538-0833-471a-981c-934995c8722c,Namespace:calico-system,Attempt:0,}" Mar 17 18:20:14.223926 env[1818]: time="2025-03-17T18:20:14.223862775Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qq9x2,Uid:1fa6188c-dfe7-4170-b540-a8d1cbef1414,Namespace:kube-system,Attempt:0,}" Mar 17 18:20:14.790868 env[1818]: time="2025-03-17T18:20:14.790782301Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:14.795049 env[1818]: time="2025-03-17T18:20:14.794993816Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:14.799557 env[1818]: time="2025-03-17T18:20:14.799507827Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:14.803688 env[1818]: time="2025-03-17T18:20:14.803641131Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:14.833448 env[1818]: time="2025-03-17T18:20:14.833310449Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:20:14.833593 env[1818]: time="2025-03-17T18:20:14.833461366Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:20:14.833593 env[1818]: time="2025-03-17T18:20:14.833527568Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:20:14.835050 env[1818]: time="2025-03-17T18:20:14.833944785Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef pid=2276 runtime=io.containerd.runc.v2 Mar 17 18:20:14.861531 systemd[1]: Started cri-containerd-40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef.scope. Mar 17 18:20:14.879241 kubelet[2212]: E0317 18:20:14.879185 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:14.896042 kernel: kauditd_printk_skb: 276 callbacks suppressed Mar 17 18:20:14.896212 kernel: audit: type=1400 audit(1742235614.885:459): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.903044 kernel: audit: type=1400 audit(1742235614.886:460): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.910015 kernel: audit: type=1400 audit(1742235614.886:461): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.917083 kernel: audit: type=1400 audit(1742235614.886:462): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.924558 kernel: audit: type=1400 audit(1742235614.886:463): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.941307 kernel: audit: type=1400 audit(1742235614.886:464): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.941445 kernel: audit: type=1400 audit(1742235614.886:465): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.948531 kernel: audit: type=1400 audit(1742235614.886:466): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.959989 env[1818]: time="2025-03-17T18:20:14.959919466Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ln2qr,Uid:6cc9f538-0833-471a-981c-934995c8722c,Namespace:calico-system,Attempt:0,} returns sandbox id \"40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef\"" Mar 17 18:20:14.964849 env[1818]: time="2025-03-17T18:20:14.964781241Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Mar 17 18:20:14.966173 kernel: audit: type=1400 audit(1742235614.886:467): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.966293 kernel: audit: type=1400 audit(1742235614.886:468): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.886000 audit: BPF prog-id=67 op=LOAD Mar 17 18:20:14.891000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.891000 audit[2286]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2276 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:14.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430656463313732313538623039646234336365326432386636633965 Mar 17 18:20:14.891000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.891000 audit[2286]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2276 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:14.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430656463313732313538623039646234336365326432386636633965 Mar 17 18:20:14.891000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.891000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.891000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.891000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.891000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.891000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.891000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.891000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.891000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.891000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.891000 audit: BPF prog-id=68 op=LOAD Mar 17 18:20:14.891000 audit[2286]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2276 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:14.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430656463313732313538623039646234336365326432386636633965 Mar 17 18:20:14.895000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.895000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.895000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.895000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.895000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.895000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.895000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.895000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.895000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.895000 audit: BPF prog-id=69 op=LOAD Mar 17 18:20:14.895000 audit[2286]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2276 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:14.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430656463313732313538623039646234336365326432386636633965 Mar 17 18:20:14.895000 audit: BPF prog-id=69 op=UNLOAD Mar 17 18:20:14.895000 audit: BPF prog-id=68 op=UNLOAD Mar 17 18:20:14.895000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.895000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.895000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.895000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.895000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.895000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.895000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.895000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.895000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.895000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:14.895000 audit: BPF prog-id=70 op=LOAD Mar 17 18:20:14.895000 audit[2286]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2276 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:14.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430656463313732313538623039646234336365326432386636633965 Mar 17 18:20:15.042695 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2697772068.mount: Deactivated successfully. Mar 17 18:20:15.423388 env[1818]: time="2025-03-17T18:20:15.423243382Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:15.426029 env[1818]: time="2025-03-17T18:20:15.425963643Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:15.428869 env[1818]: time="2025-03-17T18:20:15.428790781Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:15.432155 env[1818]: time="2025-03-17T18:20:15.432082207Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:15.465972 env[1818]: time="2025-03-17T18:20:15.465852833Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:20:15.466299 env[1818]: time="2025-03-17T18:20:15.466230652Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:20:15.466484 env[1818]: time="2025-03-17T18:20:15.466429681Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:20:15.466953 env[1818]: time="2025-03-17T18:20:15.466884459Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c6cbb0c98165ab09e84f8353e9a567fe00525fcea87b9bec00d7c8341f6f141c pid=2315 runtime=io.containerd.runc.v2 Mar 17 18:20:15.509577 systemd[1]: run-containerd-runc-k8s.io-c6cbb0c98165ab09e84f8353e9a567fe00525fcea87b9bec00d7c8341f6f141c-runc.anLqyX.mount: Deactivated successfully. Mar 17 18:20:15.514360 systemd[1]: Started cri-containerd-c6cbb0c98165ab09e84f8353e9a567fe00525fcea87b9bec00d7c8341f6f141c.scope. Mar 17 18:20:15.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.533000 audit: BPF prog-id=71 op=LOAD Mar 17 18:20:15.535000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.535000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2315 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:15.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336636262306339383136356162303965383466383335336539613536 Mar 17 18:20:15.535000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.535000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2315 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:15.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336636262306339383136356162303965383466383335336539613536 Mar 17 18:20:15.536000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.536000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.536000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.536000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.536000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.536000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.536000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.536000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.536000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.536000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.536000 audit: BPF prog-id=72 op=LOAD Mar 17 18:20:15.536000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2315 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:15.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336636262306339383136356162303965383466383335336539613536 Mar 17 18:20:15.538000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.538000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.538000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.538000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.538000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.538000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.538000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.538000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.538000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.538000 audit: BPF prog-id=73 op=LOAD Mar 17 18:20:15.538000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2315 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:15.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336636262306339383136356162303965383466383335336539613536 Mar 17 18:20:15.539000 audit: BPF prog-id=73 op=UNLOAD Mar 17 18:20:15.539000 audit: BPF prog-id=72 op=UNLOAD Mar 17 18:20:15.539000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.539000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.539000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.539000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.539000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.539000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.539000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.539000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.539000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.539000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:15.539000 audit: BPF prog-id=74 op=LOAD Mar 17 18:20:15.539000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2315 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:15.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336636262306339383136356162303965383466383335336539613536 Mar 17 18:20:15.567279 env[1818]: time="2025-03-17T18:20:15.567207729Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qq9x2,Uid:1fa6188c-dfe7-4170-b540-a8d1cbef1414,Namespace:kube-system,Attempt:0,} returns sandbox id \"c6cbb0c98165ab09e84f8353e9a567fe00525fcea87b9bec00d7c8341f6f141c\"" Mar 17 18:20:15.880300 kubelet[2212]: E0317 18:20:15.880241 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:16.209733 kubelet[2212]: E0317 18:20:16.209182 2212 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9k7db" podUID="18cae42e-0875-42b2-8913-ac2b39fe24a2" Mar 17 18:20:16.602563 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount171201601.mount: Deactivated successfully. Mar 17 18:20:16.813579 env[1818]: time="2025-03-17T18:20:16.813516694Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:16.816557 env[1818]: time="2025-03-17T18:20:16.816483280Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:16.819716 env[1818]: time="2025-03-17T18:20:16.819647620Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:16.824072 env[1818]: time="2025-03-17T18:20:16.823999011Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:16.825659 env[1818]: time="2025-03-17T18:20:16.825581140Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348\"" Mar 17 18:20:16.829269 env[1818]: time="2025-03-17T18:20:16.829215198Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.11\"" Mar 17 18:20:16.832660 env[1818]: time="2025-03-17T18:20:16.832594841Z" level=info msg="CreateContainer within sandbox \"40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Mar 17 18:20:16.858483 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount374944165.mount: Deactivated successfully. Mar 17 18:20:16.867584 env[1818]: time="2025-03-17T18:20:16.867484075Z" level=info msg="CreateContainer within sandbox \"40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc\"" Mar 17 18:20:16.869256 env[1818]: time="2025-03-17T18:20:16.869185853Z" level=info msg="StartContainer for \"af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc\"" Mar 17 18:20:16.887896 kubelet[2212]: E0317 18:20:16.886877 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:16.913371 systemd[1]: Started cri-containerd-af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc.scope. Mar 17 18:20:16.960000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.960000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2276 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:16.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166376562343137643263306131366639303437366262363930646234 Mar 17 18:20:16.960000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.960000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.960000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.960000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.960000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.960000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.960000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.960000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.960000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.960000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.960000 audit: BPF prog-id=75 op=LOAD Mar 17 18:20:16.960000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2276 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:16.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166376562343137643263306131366639303437366262363930646234 Mar 17 18:20:16.962000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.962000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.962000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.962000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.962000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.962000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.962000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.962000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.962000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.962000 audit: BPF prog-id=76 op=LOAD Mar 17 18:20:16.962000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2276 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:16.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166376562343137643263306131366639303437366262363930646234 Mar 17 18:20:16.964000 audit: BPF prog-id=76 op=UNLOAD Mar 17 18:20:16.964000 audit: BPF prog-id=75 op=UNLOAD Mar 17 18:20:16.964000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.964000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.964000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.964000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.964000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.964000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.964000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.964000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.964000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.964000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:16.964000 audit: BPF prog-id=77 op=LOAD Mar 17 18:20:16.964000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2276 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:16.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166376562343137643263306131366639303437366262363930646234 Mar 17 18:20:16.996617 env[1818]: time="2025-03-17T18:20:16.995302772Z" level=info msg="StartContainer for \"af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc\" returns successfully" Mar 17 18:20:17.026499 systemd[1]: cri-containerd-af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc.scope: Deactivated successfully. Mar 17 18:20:17.028000 audit: BPF prog-id=77 op=UNLOAD Mar 17 18:20:17.111013 env[1818]: time="2025-03-17T18:20:17.109210800Z" level=info msg="shim disconnected" id=af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc Mar 17 18:20:17.111013 env[1818]: time="2025-03-17T18:20:17.109288396Z" level=warning msg="cleaning up after shim disconnected" id=af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc namespace=k8s.io Mar 17 18:20:17.111013 env[1818]: time="2025-03-17T18:20:17.109312168Z" level=info msg="cleaning up dead shim" Mar 17 18:20:17.127205 env[1818]: time="2025-03-17T18:20:17.127129767Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:20:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2394 runtime=io.containerd.runc.v2\n" Mar 17 18:20:17.517946 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc-rootfs.mount: Deactivated successfully. Mar 17 18:20:17.888021 kubelet[2212]: E0317 18:20:17.887720 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:18.203695 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2846472957.mount: Deactivated successfully. Mar 17 18:20:18.208651 kubelet[2212]: E0317 18:20:18.207829 2212 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9k7db" podUID="18cae42e-0875-42b2-8913-ac2b39fe24a2" Mar 17 18:20:18.888964 kubelet[2212]: E0317 18:20:18.888877 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:19.051433 env[1818]: time="2025-03-17T18:20:19.051362370Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:19.055138 env[1818]: time="2025-03-17T18:20:19.055076247Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fe83790bf8a35411788b67fe5f0ce35309056c40530484d516af2ca01375220c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:19.058920 env[1818]: time="2025-03-17T18:20:19.058205695Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:19.062801 env[1818]: time="2025-03-17T18:20:19.062703732Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.11\" returns image reference \"sha256:fe83790bf8a35411788b67fe5f0ce35309056c40530484d516af2ca01375220c\"" Mar 17 18:20:19.062992 env[1818]: time="2025-03-17T18:20:19.062846292Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea4da798040a18ed3f302e8d5f67307c7275a2a53bcf3d51bcec223acda84a55,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:19.066985 env[1818]: time="2025-03-17T18:20:19.066930439Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Mar 17 18:20:19.068718 env[1818]: time="2025-03-17T18:20:19.068665894Z" level=info msg="CreateContainer within sandbox \"c6cbb0c98165ab09e84f8353e9a567fe00525fcea87b9bec00d7c8341f6f141c\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Mar 17 18:20:19.104018 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1365261990.mount: Deactivated successfully. Mar 17 18:20:19.109558 env[1818]: time="2025-03-17T18:20:19.109482122Z" level=info msg="CreateContainer within sandbox \"c6cbb0c98165ab09e84f8353e9a567fe00525fcea87b9bec00d7c8341f6f141c\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9137beee0dc0391f95e4e5c2af4141c9f977cffca81cb0980d2c572d4126fdc5\"" Mar 17 18:20:19.110948 env[1818]: time="2025-03-17T18:20:19.110893682Z" level=info msg="StartContainer for \"9137beee0dc0391f95e4e5c2af4141c9f977cffca81cb0980d2c572d4126fdc5\"" Mar 17 18:20:19.148184 systemd[1]: Started cri-containerd-9137beee0dc0391f95e4e5c2af4141c9f977cffca81cb0980d2c572d4126fdc5.scope. Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit[2419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2315 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931333762656565306463303339316639356534653563326166343134 Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit: BPF prog-id=78 op=LOAD Mar 17 18:20:19.196000 audit[2419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2315 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931333762656565306463303339316639356534653563326166343134 Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.196000 audit: BPF prog-id=79 op=LOAD Mar 17 18:20:19.196000 audit[2419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2315 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931333762656565306463303339316639356534653563326166343134 Mar 17 18:20:19.197000 audit: BPF prog-id=79 op=UNLOAD Mar 17 18:20:19.197000 audit: BPF prog-id=78 op=UNLOAD Mar 17 18:20:19.197000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.197000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.197000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.197000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.197000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.197000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.197000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.197000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.197000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.197000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:19.197000 audit: BPF prog-id=80 op=LOAD Mar 17 18:20:19.197000 audit[2419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2315 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931333762656565306463303339316639356534653563326166343134 Mar 17 18:20:19.227509 env[1818]: time="2025-03-17T18:20:19.227396833Z" level=info msg="StartContainer for \"9137beee0dc0391f95e4e5c2af4141c9f977cffca81cb0980d2c572d4126fdc5\" returns successfully" Mar 17 18:20:19.386000 audit[2471]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2471 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.386000 audit[2471]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd1c8e740 a2=0 a3=1 items=0 ppid=2430 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.386000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 18:20:19.388000 audit[2472]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.388000 audit[2472]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc9734e30 a2=0 a3=1 items=0 ppid=2430 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.388000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 18:20:19.388000 audit[2473]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.388000 audit[2473]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdfb1a690 a2=0 a3=1 items=0 ppid=2430 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.388000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 18:20:19.391000 audit[2474]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=2474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.391000 audit[2474]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdf0e9d10 a2=0 a3=1 items=0 ppid=2430 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.391000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 18:20:19.391000 audit[2475]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=2475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.391000 audit[2475]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeb7d1470 a2=0 a3=1 items=0 ppid=2430 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.391000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 18:20:19.395000 audit[2476]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.395000 audit[2476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdb79cc20 a2=0 a3=1 items=0 ppid=2430 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.395000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 18:20:19.494000 audit[2477]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2477 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.494000 audit[2477]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffde335b0 a2=0 a3=1 items=0 ppid=2430 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.494000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 18:20:19.503000 audit[2479]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.503000 audit[2479]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff5d9dc40 a2=0 a3=1 items=0 ppid=2430 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.503000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Mar 17 18:20:19.512000 audit[2482]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2482 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.512000 audit[2482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdedfb570 a2=0 a3=1 items=0 ppid=2430 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.512000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Mar 17 18:20:19.515000 audit[2483]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.515000 audit[2483]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffb568c70 a2=0 a3=1 items=0 ppid=2430 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.515000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 18:20:19.521000 audit[2485]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2485 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.521000 audit[2485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc7d3cb80 a2=0 a3=1 items=0 ppid=2430 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.521000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 18:20:19.525000 audit[2486]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2486 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.525000 audit[2486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe9aa4f60 a2=0 a3=1 items=0 ppid=2430 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.525000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 18:20:19.532000 audit[2488]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2488 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.532000 audit[2488]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcbeaf700 a2=0 a3=1 items=0 ppid=2430 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.532000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 18:20:19.540000 audit[2491]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2491 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.540000 audit[2491]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe2ce9c10 a2=0 a3=1 items=0 ppid=2430 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.540000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Mar 17 18:20:19.543000 audit[2492]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2492 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.543000 audit[2492]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe070b1f0 a2=0 a3=1 items=0 ppid=2430 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.543000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 18:20:19.549000 audit[2494]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2494 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.549000 audit[2494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff60138e0 a2=0 a3=1 items=0 ppid=2430 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.549000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 18:20:19.551000 audit[2495]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2495 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.551000 audit[2495]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcff41c40 a2=0 a3=1 items=0 ppid=2430 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.551000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 18:20:19.557000 audit[2497]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2497 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.557000 audit[2497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffc8cee90 a2=0 a3=1 items=0 ppid=2430 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.557000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:20:19.565000 audit[2500]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2500 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.565000 audit[2500]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe82a1920 a2=0 a3=1 items=0 ppid=2430 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.565000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:20:19.575000 audit[2503]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2503 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.575000 audit[2503]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff4442170 a2=0 a3=1 items=0 ppid=2430 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.575000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 18:20:19.578000 audit[2504]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2504 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.578000 audit[2504]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd9c1c690 a2=0 a3=1 items=0 ppid=2430 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.578000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 18:20:19.582000 audit[2506]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2506 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.582000 audit[2506]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffca0cf750 a2=0 a3=1 items=0 ppid=2430 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.582000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:20:19.617000 audit[2512]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2512 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.617000 audit[2512]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc0795f10 a2=0 a3=1 items=0 ppid=2430 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.617000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:20:19.620000 audit[2513]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2513 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.620000 audit[2513]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd6696e90 a2=0 a3=1 items=0 ppid=2430 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.620000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 18:20:19.625000 audit[2515]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2515 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:20:19.625000 audit[2515]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe704ccf0 a2=0 a3=1 items=0 ppid=2430 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.625000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 18:20:19.658000 audit[2521]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=2521 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:19.658000 audit[2521]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff41b86d0 a2=0 a3=1 items=0 ppid=2430 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.658000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:19.688000 audit[2521]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=2521 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:19.688000 audit[2521]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9084 a0=3 a1=fffff41b86d0 a2=0 a3=1 items=0 ppid=2430 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.688000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:19.691000 audit[2527]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2527 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.691000 audit[2527]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe872f5c0 a2=0 a3=1 items=0 ppid=2430 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.691000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 18:20:19.697000 audit[2529]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2529 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.697000 audit[2529]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe474deb0 a2=0 a3=1 items=0 ppid=2430 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.697000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Mar 17 18:20:19.704000 audit[2532]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2532 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.704000 audit[2532]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc999c240 a2=0 a3=1 items=0 ppid=2430 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.704000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Mar 17 18:20:19.707000 audit[2533]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2533 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.707000 audit[2533]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd2bb40c0 a2=0 a3=1 items=0 ppid=2430 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.707000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 18:20:19.713000 audit[2535]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2535 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.713000 audit[2535]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffef4d2670 a2=0 a3=1 items=0 ppid=2430 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.713000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 18:20:19.715000 audit[2536]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2536 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.715000 audit[2536]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc741dc30 a2=0 a3=1 items=0 ppid=2430 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.715000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 18:20:19.721000 audit[2538]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2538 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.721000 audit[2538]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc5595490 a2=0 a3=1 items=0 ppid=2430 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.721000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Mar 17 18:20:19.729000 audit[2541]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2541 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.729000 audit[2541]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc67bec90 a2=0 a3=1 items=0 ppid=2430 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.729000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 18:20:19.732000 audit[2542]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2542 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.732000 audit[2542]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe5992b90 a2=0 a3=1 items=0 ppid=2430 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.732000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 18:20:19.737000 audit[2544]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2544 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.737000 audit[2544]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff7274c20 a2=0 a3=1 items=0 ppid=2430 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.737000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 18:20:19.740000 audit[2545]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2545 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.740000 audit[2545]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffb25a100 a2=0 a3=1 items=0 ppid=2430 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.740000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 18:20:19.746000 audit[2547]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2547 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.746000 audit[2547]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdcfccc10 a2=0 a3=1 items=0 ppid=2430 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.746000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:20:19.756000 audit[2550]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2550 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.756000 audit[2550]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff7563a00 a2=0 a3=1 items=0 ppid=2430 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 18:20:19.766000 audit[2553]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2553 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.766000 audit[2553]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffebfd9aa0 a2=0 a3=1 items=0 ppid=2430 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.766000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Mar 17 18:20:19.771000 audit[2554]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2554 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.771000 audit[2554]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff33c41a0 a2=0 a3=1 items=0 ppid=2430 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.771000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 18:20:19.777000 audit[2556]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2556 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.777000 audit[2556]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe0d6e5f0 a2=0 a3=1 items=0 ppid=2430 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.777000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:20:19.786000 audit[2559]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2559 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.786000 audit[2559]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff9ad0c80 a2=0 a3=1 items=0 ppid=2430 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.786000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:20:19.789000 audit[2560]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2560 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.789000 audit[2560]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeb4e3d90 a2=0 a3=1 items=0 ppid=2430 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.789000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 18:20:19.794000 audit[2562]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2562 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.794000 audit[2562]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff0caf5f0 a2=0 a3=1 items=0 ppid=2430 pid=2562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.794000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 18:20:19.796000 audit[2563]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2563 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.796000 audit[2563]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffefb7ed30 a2=0 a3=1 items=0 ppid=2430 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.796000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 18:20:19.802000 audit[2565]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2565 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.802000 audit[2565]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc6de36a0 a2=0 a3=1 items=0 ppid=2430 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.802000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:20:19.810000 audit[2568]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2568 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:20:19.810000 audit[2568]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc2f424f0 a2=0 a3=1 items=0 ppid=2430 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.810000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:20:19.816000 audit[2570]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2570 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 18:20:19.816000 audit[2570]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffc9ffd9d0 a2=0 a3=1 items=0 ppid=2430 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.816000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:19.817000 audit[2570]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2570 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 18:20:19.817000 audit[2570]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffc9ffd9d0 a2=0 a3=1 items=0 ppid=2430 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:19.817000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:19.889780 kubelet[2212]: E0317 18:20:19.889718 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:20.209875 kubelet[2212]: E0317 18:20:20.207062 2212 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9k7db" podUID="18cae42e-0875-42b2-8913-ac2b39fe24a2" Mar 17 18:20:20.890601 kubelet[2212]: E0317 18:20:20.890515 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:21.723000 audit[2572]: NETFILTER_CFG table=filter:65 family=2 entries=16 op=nft_register_rule pid=2572 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:21.726211 kernel: kauditd_printk_skb: 344 callbacks suppressed Mar 17 18:20:21.726319 kernel: audit: type=1325 audit(1742235621.723:559): table=filter:65 family=2 entries=16 op=nft_register_rule pid=2572 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:21.723000 audit[2572]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffe5a9d9a0 a2=0 a3=1 items=0 ppid=2430 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:21.741739 kernel: audit: type=1300 audit(1742235621.723:559): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffe5a9d9a0 a2=0 a3=1 items=0 ppid=2430 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:21.723000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:21.748310 kernel: audit: type=1327 audit(1742235621.723:559): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:21.743000 audit[2572]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=2572 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:21.754298 kernel: audit: type=1325 audit(1742235621.743:560): table=nat:66 family=2 entries=14 op=nft_register_rule pid=2572 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:21.743000 audit[2572]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffe5a9d9a0 a2=0 a3=1 items=0 ppid=2430 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:21.765077 kernel: audit: type=1300 audit(1742235621.743:560): arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffe5a9d9a0 a2=0 a3=1 items=0 ppid=2430 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:21.770847 kernel: audit: type=1327 audit(1742235621.743:560): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:21.743000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:21.775000 audit[2574]: NETFILTER_CFG table=filter:67 family=2 entries=13 op=nft_register_rule pid=2574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:21.775000 audit[2574]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc6c6c180 a2=0 a3=1 items=0 ppid=2430 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:21.796771 kernel: audit: type=1325 audit(1742235621.775:561): table=filter:67 family=2 entries=13 op=nft_register_rule pid=2574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:21.796884 kernel: audit: type=1300 audit(1742235621.775:561): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc6c6c180 a2=0 a3=1 items=0 ppid=2430 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:21.775000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:21.802780 kernel: audit: type=1327 audit(1742235621.775:561): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:21.803000 audit[2574]: NETFILTER_CFG table=nat:68 family=2 entries=35 op=nft_register_chain pid=2574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:21.803000 audit[2574]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffc6c6c180 a2=0 a3=1 items=0 ppid=2430 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:21.803000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:21.813851 kernel: audit: type=1325 audit(1742235621.803:562): table=nat:68 family=2 entries=35 op=nft_register_chain pid=2574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:21.891785 kubelet[2212]: E0317 18:20:21.891703 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:22.210101 kubelet[2212]: E0317 18:20:22.207666 2212 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9k7db" podUID="18cae42e-0875-42b2-8913-ac2b39fe24a2" Mar 17 18:20:22.773000 audit[2578]: NETFILTER_CFG table=filter:69 family=2 entries=10 op=nft_register_rule pid=2578 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:22.773000 audit[2578]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffb6fe380 a2=0 a3=1 items=0 ppid=2430 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:22.773000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:22.786000 audit[2578]: NETFILTER_CFG table=nat:70 family=2 entries=56 op=nft_register_chain pid=2578 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:22.786000 audit[2578]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=fffffb6fe380 a2=0 a3=1 items=0 ppid=2430 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:22.786000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:22.892530 kubelet[2212]: E0317 18:20:22.892460 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:23.892732 kubelet[2212]: E0317 18:20:23.892657 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:24.208548 kubelet[2212]: E0317 18:20:24.207939 2212 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9k7db" podUID="18cae42e-0875-42b2-8913-ac2b39fe24a2" Mar 17 18:20:24.838204 env[1818]: time="2025-03-17T18:20:24.838138767Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:24.843610 env[1818]: time="2025-03-17T18:20:24.843532926Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:24.846545 env[1818]: time="2025-03-17T18:20:24.846473884Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:24.850333 env[1818]: time="2025-03-17T18:20:24.850271101Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:24.851490 env[1818]: time="2025-03-17T18:20:24.851406075Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f\"" Mar 17 18:20:24.856699 env[1818]: time="2025-03-17T18:20:24.856631621Z" level=info msg="CreateContainer within sandbox \"40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Mar 17 18:20:24.879476 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2232013182.mount: Deactivated successfully. Mar 17 18:20:24.889500 env[1818]: time="2025-03-17T18:20:24.889405268Z" level=info msg="CreateContainer within sandbox \"40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971\"" Mar 17 18:20:24.890602 env[1818]: time="2025-03-17T18:20:24.890549574Z" level=info msg="StartContainer for \"892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971\"" Mar 17 18:20:24.893746 kubelet[2212]: E0317 18:20:24.893678 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:24.931613 systemd[1]: Started cri-containerd-892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971.scope. Mar 17 18:20:24.941393 systemd[1]: run-containerd-runc-k8s.io-892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971-runc.Gohobg.mount: Deactivated successfully. Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit[2588]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2276 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:24.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839326332653066656165346436353236646131643131666433643732 Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit: BPF prog-id=81 op=LOAD Mar 17 18:20:24.978000 audit[2588]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2276 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:24.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839326332653066656165346436353236646131643131666433643732 Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.978000 audit: BPF prog-id=82 op=LOAD Mar 17 18:20:24.978000 audit[2588]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2276 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:24.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839326332653066656165346436353236646131643131666433643732 Mar 17 18:20:24.979000 audit: BPF prog-id=82 op=UNLOAD Mar 17 18:20:24.979000 audit: BPF prog-id=81 op=UNLOAD Mar 17 18:20:24.979000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.979000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.979000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.979000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.979000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.979000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.979000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.979000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.979000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.979000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:24.979000 audit: BPF prog-id=83 op=LOAD Mar 17 18:20:24.979000 audit[2588]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2276 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:24.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839326332653066656165346436353236646131643131666433643732 Mar 17 18:20:25.010660 env[1818]: time="2025-03-17T18:20:25.010573537Z" level=info msg="StartContainer for \"892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971\" returns successfully" Mar 17 18:20:25.299157 kubelet[2212]: I0317 18:20:25.299039 2212 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-qq9x2" podStartSLOduration=9.802837325 podStartE2EDuration="13.298972516s" podCreationTimestamp="2025-03-17 18:20:12 +0000 UTC" firstStartedPulling="2025-03-17 18:20:15.569536108 +0000 UTC m=+4.595147384" lastFinishedPulling="2025-03-17 18:20:19.065671311 +0000 UTC m=+8.091282575" observedRunningTime="2025-03-17 18:20:19.29529368 +0000 UTC m=+8.320904980" watchObservedRunningTime="2025-03-17 18:20:25.298972516 +0000 UTC m=+14.324583816" Mar 17 18:20:25.894515 kubelet[2212]: E0317 18:20:25.894441 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:26.013898 env[1818]: time="2025-03-17T18:20:26.013784777Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 17 18:20:26.019786 systemd[1]: cri-containerd-892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971.scope: Deactivated successfully. Mar 17 18:20:26.023000 audit: BPF prog-id=83 op=UNLOAD Mar 17 18:20:26.055246 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971-rootfs.mount: Deactivated successfully. Mar 17 18:20:26.079792 kubelet[2212]: I0317 18:20:26.079699 2212 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Mar 17 18:20:26.219980 systemd[1]: Created slice kubepods-besteffort-pod18cae42e_0875_42b2_8913_ac2b39fe24a2.slice. Mar 17 18:20:26.224280 env[1818]: time="2025-03-17T18:20:26.224226103Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9k7db,Uid:18cae42e-0875-42b2-8913-ac2b39fe24a2,Namespace:calico-system,Attempt:0,}" Mar 17 18:20:26.644291 env[1818]: time="2025-03-17T18:20:26.644098772Z" level=error msg="Failed to destroy network for sandbox \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:20:26.647515 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521-shm.mount: Deactivated successfully. Mar 17 18:20:26.649287 env[1818]: time="2025-03-17T18:20:26.649200019Z" level=error msg="encountered an error cleaning up failed sandbox \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:20:26.649405 env[1818]: time="2025-03-17T18:20:26.649317108Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9k7db,Uid:18cae42e-0875-42b2-8913-ac2b39fe24a2,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:20:26.650457 kubelet[2212]: E0317 18:20:26.649652 2212 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:20:26.650457 kubelet[2212]: E0317 18:20:26.649772 2212 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9k7db" Mar 17 18:20:26.650457 kubelet[2212]: E0317 18:20:26.649882 2212 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9k7db" Mar 17 18:20:26.650797 kubelet[2212]: E0317 18:20:26.650366 2212 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-9k7db_calico-system(18cae42e-0875-42b2-8913-ac2b39fe24a2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-9k7db_calico-system(18cae42e-0875-42b2-8913-ac2b39fe24a2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9k7db" podUID="18cae42e-0875-42b2-8913-ac2b39fe24a2" Mar 17 18:20:26.895340 kubelet[2212]: E0317 18:20:26.895094 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:27.259792 kubelet[2212]: I0317 18:20:27.259144 2212 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Mar 17 18:20:27.261138 env[1818]: time="2025-03-17T18:20:27.261084521Z" level=info msg="StopPodSandbox for \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\"" Mar 17 18:20:27.316226 env[1818]: time="2025-03-17T18:20:27.316148385Z" level=error msg="StopPodSandbox for \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\" failed" error="failed to destroy network for sandbox \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:20:27.317197 kubelet[2212]: E0317 18:20:27.316836 2212 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Mar 17 18:20:27.317197 kubelet[2212]: E0317 18:20:27.316936 2212 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521"} Mar 17 18:20:27.317197 kubelet[2212]: E0317 18:20:27.317045 2212 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"18cae42e-0875-42b2-8913-ac2b39fe24a2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:20:27.317197 kubelet[2212]: E0317 18:20:27.317108 2212 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"18cae42e-0875-42b2-8913-ac2b39fe24a2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9k7db" podUID="18cae42e-0875-42b2-8913-ac2b39fe24a2" Mar 17 18:20:27.520292 env[1818]: time="2025-03-17T18:20:27.520125333Z" level=info msg="shim disconnected" id=892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971 Mar 17 18:20:27.520613 env[1818]: time="2025-03-17T18:20:27.520566027Z" level=warning msg="cleaning up after shim disconnected" id=892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971 namespace=k8s.io Mar 17 18:20:27.520782 env[1818]: time="2025-03-17T18:20:27.520747383Z" level=info msg="cleaning up dead shim" Mar 17 18:20:27.535905 env[1818]: time="2025-03-17T18:20:27.535848472Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:20:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2681 runtime=io.containerd.runc.v2\n" Mar 17 18:20:27.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:20:27.743263 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Mar 17 18:20:27.745752 kernel: kauditd_printk_skb: 52 callbacks suppressed Mar 17 18:20:27.745898 kernel: audit: type=1131 audit(1742235627.742:572): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:20:27.783000 audit: BPF prog-id=63 op=UNLOAD Mar 17 18:20:27.783000 audit: BPF prog-id=62 op=UNLOAD Mar 17 18:20:27.789222 kernel: audit: type=1334 audit(1742235627.783:573): prog-id=63 op=UNLOAD Mar 17 18:20:27.789347 kernel: audit: type=1334 audit(1742235627.783:574): prog-id=62 op=UNLOAD Mar 17 18:20:27.789399 kernel: audit: type=1334 audit(1742235627.783:575): prog-id=61 op=UNLOAD Mar 17 18:20:27.783000 audit: BPF prog-id=61 op=UNLOAD Mar 17 18:20:27.895841 kubelet[2212]: E0317 18:20:27.895701 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:28.265646 env[1818]: time="2025-03-17T18:20:28.265578504Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Mar 17 18:20:28.896808 kubelet[2212]: E0317 18:20:28.896736 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:29.897329 kubelet[2212]: E0317 18:20:29.897244 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:29.973579 amazon-ssm-agent[1812]: 2025-03-17 18:20:29 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Mar 17 18:20:30.624193 kubelet[2212]: I0317 18:20:30.624138 2212 topology_manager.go:215] "Topology Admit Handler" podUID="5c6b8b2f-3eca-4f8a-8bcd-689f12cf1fb7" podNamespace="default" podName="nginx-deployment-85f456d6dd-tx8sb" Mar 17 18:20:30.634082 systemd[1]: Created slice kubepods-besteffort-pod5c6b8b2f_3eca_4f8a_8bcd_689f12cf1fb7.slice. Mar 17 18:20:30.639202 kubelet[2212]: W0317 18:20:30.639152 2212 reflector.go:547] object-"default"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:172.31.22.27" cannot list resource "configmaps" in API group "" in the namespace "default": no relationship found between node '172.31.22.27' and this object Mar 17 18:20:30.641002 kubelet[2212]: E0317 18:20:30.640962 2212 reflector.go:150] object-"default"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:172.31.22.27" cannot list resource "configmaps" in API group "" in the namespace "default": no relationship found between node '172.31.22.27' and this object Mar 17 18:20:30.644505 kubelet[2212]: I0317 18:20:30.644453 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n49mv\" (UniqueName: \"kubernetes.io/projected/5c6b8b2f-3eca-4f8a-8bcd-689f12cf1fb7-kube-api-access-n49mv\") pod \"nginx-deployment-85f456d6dd-tx8sb\" (UID: \"5c6b8b2f-3eca-4f8a-8bcd-689f12cf1fb7\") " pod="default/nginx-deployment-85f456d6dd-tx8sb" Mar 17 18:20:30.897692 kubelet[2212]: E0317 18:20:30.897563 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:31.543023 env[1818]: time="2025-03-17T18:20:31.542966713Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-tx8sb,Uid:5c6b8b2f-3eca-4f8a-8bcd-689f12cf1fb7,Namespace:default,Attempt:0,}" Mar 17 18:20:31.681495 env[1818]: time="2025-03-17T18:20:31.681409779Z" level=error msg="Failed to destroy network for sandbox \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:20:31.687832 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535-shm.mount: Deactivated successfully. Mar 17 18:20:31.691031 env[1818]: time="2025-03-17T18:20:31.690957778Z" level=error msg="encountered an error cleaning up failed sandbox \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:20:31.691239 env[1818]: time="2025-03-17T18:20:31.691188384Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-tx8sb,Uid:5c6b8b2f-3eca-4f8a-8bcd-689f12cf1fb7,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:20:31.691860 kubelet[2212]: E0317 18:20:31.691623 2212 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:20:31.691860 kubelet[2212]: E0317 18:20:31.691707 2212 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-tx8sb" Mar 17 18:20:31.691860 kubelet[2212]: E0317 18:20:31.691743 2212 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-tx8sb" Mar 17 18:20:31.692408 kubelet[2212]: E0317 18:20:31.691804 2212 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-tx8sb_default(5c6b8b2f-3eca-4f8a-8bcd-689f12cf1fb7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-tx8sb_default(5c6b8b2f-3eca-4f8a-8bcd-689f12cf1fb7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-tx8sb" podUID="5c6b8b2f-3eca-4f8a-8bcd-689f12cf1fb7" Mar 17 18:20:31.876997 kubelet[2212]: E0317 18:20:31.876868 2212 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:31.899288 kubelet[2212]: E0317 18:20:31.899222 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:32.272858 kubelet[2212]: I0317 18:20:32.272545 2212 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Mar 17 18:20:32.273991 env[1818]: time="2025-03-17T18:20:32.273937376Z" level=info msg="StopPodSandbox for \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\"" Mar 17 18:20:32.342489 env[1818]: time="2025-03-17T18:20:32.342390910Z" level=error msg="StopPodSandbox for \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\" failed" error="failed to destroy network for sandbox \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:20:32.343126 kubelet[2212]: E0317 18:20:32.342866 2212 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Mar 17 18:20:32.343126 kubelet[2212]: E0317 18:20:32.342934 2212 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535"} Mar 17 18:20:32.343126 kubelet[2212]: E0317 18:20:32.342998 2212 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5c6b8b2f-3eca-4f8a-8bcd-689f12cf1fb7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:20:32.343126 kubelet[2212]: E0317 18:20:32.343040 2212 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5c6b8b2f-3eca-4f8a-8bcd-689f12cf1fb7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-tx8sb" podUID="5c6b8b2f-3eca-4f8a-8bcd-689f12cf1fb7" Mar 17 18:20:32.831000 audit[2753]: NETFILTER_CFG table=filter:71 family=2 entries=10 op=nft_register_rule pid=2753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:32.831000 audit[2753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc44881a0 a2=0 a3=1 items=0 ppid=2430 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:32.848014 kernel: audit: type=1325 audit(1742235632.831:576): table=filter:71 family=2 entries=10 op=nft_register_rule pid=2753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:32.848158 kernel: audit: type=1300 audit(1742235632.831:576): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc44881a0 a2=0 a3=1 items=0 ppid=2430 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:32.831000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:32.853220 kernel: audit: type=1327 audit(1742235632.831:576): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:32.854000 audit[2753]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=2753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:32.854000 audit[2753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc44881a0 a2=0 a3=1 items=0 ppid=2430 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:32.861954 kernel: audit: type=1325 audit(1742235632.854:577): table=nat:72 family=2 entries=20 op=nft_register_rule pid=2753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:32.854000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:32.877662 kernel: audit: type=1300 audit(1742235632.854:577): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc44881a0 a2=0 a3=1 items=0 ppid=2430 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:32.877766 kernel: audit: type=1327 audit(1742235632.854:577): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:32.888000 audit[2755]: NETFILTER_CFG table=filter:73 family=2 entries=10 op=nft_register_rule pid=2755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:32.888000 audit[2755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe920e3d0 a2=0 a3=1 items=0 ppid=2430 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:32.895854 kernel: audit: type=1325 audit(1742235632.888:578): table=filter:73 family=2 entries=10 op=nft_register_rule pid=2755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:32.906257 kubelet[2212]: E0317 18:20:32.900128 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:32.888000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:32.911877 kernel: audit: type=1300 audit(1742235632.888:578): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe920e3d0 a2=0 a3=1 items=0 ppid=2430 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:32.912108 kernel: audit: type=1327 audit(1742235632.888:578): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:32.913000 audit[2755]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=2755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:32.913000 audit[2755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe920e3d0 a2=0 a3=1 items=0 ppid=2430 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:32.919964 kernel: audit: type=1325 audit(1742235632.913:579): table=nat:74 family=2 entries=20 op=nft_register_rule pid=2755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:32.913000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:33.900987 kubelet[2212]: E0317 18:20:33.900890 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:34.902012 kubelet[2212]: E0317 18:20:34.901935 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:34.937000 audit[2757]: NETFILTER_CFG table=filter:75 family=2 entries=9 op=nft_register_rule pid=2757 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:34.937000 audit[2757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc3dccb20 a2=0 a3=1 items=0 ppid=2430 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:34.937000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:34.942000 audit[2757]: NETFILTER_CFG table=nat:76 family=2 entries=27 op=nft_register_chain pid=2757 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:34.942000 audit[2757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffc3dccb20 a2=0 a3=1 items=0 ppid=2430 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:34.942000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:35.337000 audit[2759]: NETFILTER_CFG table=filter:77 family=2 entries=8 op=nft_register_rule pid=2759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:35.337000 audit[2759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff6191e40 a2=0 a3=1 items=0 ppid=2430 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:35.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:35.344000 audit[2759]: NETFILTER_CFG table=nat:78 family=2 entries=34 op=nft_register_chain pid=2759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:35.344000 audit[2759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffff6191e40 a2=0 a3=1 items=0 ppid=2430 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:35.344000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:35.903012 kubelet[2212]: E0317 18:20:35.902944 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:36.545783 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3041264083.mount: Deactivated successfully. Mar 17 18:20:36.636482 env[1818]: time="2025-03-17T18:20:36.636392248Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:36.640970 env[1818]: time="2025-03-17T18:20:36.640902736Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:36.644788 env[1818]: time="2025-03-17T18:20:36.644717946Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:36.648330 env[1818]: time="2025-03-17T18:20:36.648255984Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:36.649586 env[1818]: time="2025-03-17T18:20:36.649524519Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758\"" Mar 17 18:20:36.679539 env[1818]: time="2025-03-17T18:20:36.679475537Z" level=info msg="CreateContainer within sandbox \"40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Mar 17 18:20:36.709633 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount304616531.mount: Deactivated successfully. Mar 17 18:20:36.728429 env[1818]: time="2025-03-17T18:20:36.728358755Z" level=info msg="CreateContainer within sandbox \"40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c\"" Mar 17 18:20:36.729899 env[1818]: time="2025-03-17T18:20:36.729799119Z" level=info msg="StartContainer for \"2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c\"" Mar 17 18:20:36.762794 systemd[1]: Started cri-containerd-2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c.scope. Mar 17 18:20:36.805000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.805000 audit[2772]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2276 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:36.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261626261363838666334613265363836326134613032366364343261 Mar 17 18:20:36.807000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.807000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.807000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.807000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.807000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.807000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.807000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.807000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.807000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.807000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.807000 audit: BPF prog-id=84 op=LOAD Mar 17 18:20:36.807000 audit[2772]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2276 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:36.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261626261363838666334613265363836326134613032366364343261 Mar 17 18:20:36.809000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.809000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.809000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.809000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.809000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.809000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.809000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.809000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.809000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.809000 audit: BPF prog-id=85 op=LOAD Mar 17 18:20:36.809000 audit[2772]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2276 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:36.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261626261363838666334613265363836326134613032366364343261 Mar 17 18:20:36.811000 audit: BPF prog-id=85 op=UNLOAD Mar 17 18:20:36.811000 audit: BPF prog-id=84 op=UNLOAD Mar 17 18:20:36.811000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.811000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.811000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.811000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.811000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.811000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.811000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.811000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.811000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.811000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:36.811000 audit: BPF prog-id=86 op=LOAD Mar 17 18:20:36.811000 audit[2772]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2276 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:36.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261626261363838666334613265363836326134613032366364343261 Mar 17 18:20:36.843700 env[1818]: time="2025-03-17T18:20:36.843608621Z" level=info msg="StartContainer for \"2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c\" returns successfully" Mar 17 18:20:36.903211 kubelet[2212]: E0317 18:20:36.903158 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:36.972456 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Mar 17 18:20:36.972669 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Mar 17 18:20:37.904119 kubelet[2212]: E0317 18:20:37.904038 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:38.474245 kernel: kauditd_printk_skb: 57 callbacks suppressed Mar 17 18:20:38.474409 kernel: audit: type=1400 audit(1742235638.464:590): avc: denied { write } for pid=2875 comm="tee" name="fd" dev="proc" ino=15777 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:20:38.464000 audit[2875]: AVC avc: denied { write } for pid=2875 comm="tee" name="fd" dev="proc" ino=15777 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:20:38.472000 audit[2883]: AVC avc: denied { write } for pid=2883 comm="tee" name="fd" dev="proc" ino=15284 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:20:38.483288 kernel: audit: type=1400 audit(1742235638.472:591): avc: denied { write } for pid=2883 comm="tee" name="fd" dev="proc" ino=15284 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:20:38.472000 audit[2883]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe657aa1d a2=241 a3=1b6 items=1 ppid=2839 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:38.497673 kernel: audit: type=1300 audit(1742235638.472:591): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe657aa1d a2=241 a3=1b6 items=1 ppid=2839 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:38.472000 audit: CWD cwd="/etc/service/enabled/confd/log" Mar 17 18:20:38.472000 audit: PATH item=0 name="/dev/fd/63" inode=15273 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:20:38.512611 kernel: audit: type=1307 audit(1742235638.472:591): cwd="/etc/service/enabled/confd/log" Mar 17 18:20:38.512745 kernel: audit: type=1302 audit(1742235638.472:591): item=0 name="/dev/fd/63" inode=15273 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:20:38.472000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:20:38.475000 audit[2892]: AVC avc: denied { write } for pid=2892 comm="tee" name="fd" dev="proc" ino=15288 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:20:38.529831 kernel: audit: type=1327 audit(1742235638.472:591): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:20:38.529942 kernel: audit: type=1400 audit(1742235638.475:592): avc: denied { write } for pid=2892 comm="tee" name="fd" dev="proc" ino=15288 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:20:38.475000 audit[2892]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff4962a1d a2=241 a3=1b6 items=1 ppid=2842 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:38.541053 kernel: audit: type=1300 audit(1742235638.475:592): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff4962a1d a2=241 a3=1b6 items=1 ppid=2842 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:38.475000 audit: CWD cwd="/etc/service/enabled/felix/log" Mar 17 18:20:38.544446 kernel: audit: type=1307 audit(1742235638.475:592): cwd="/etc/service/enabled/felix/log" Mar 17 18:20:38.475000 audit: PATH item=0 name="/dev/fd/63" inode=15281 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:20:38.552406 kernel: audit: type=1302 audit(1742235638.475:592): item=0 name="/dev/fd/63" inode=15281 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:20:38.475000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:20:38.486000 audit[2886]: AVC avc: denied { write } for pid=2886 comm="tee" name="fd" dev="proc" ino=15292 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:20:38.486000 audit[2886]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffce47fa0e a2=241 a3=1b6 items=1 ppid=2836 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:38.486000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Mar 17 18:20:38.486000 audit: PATH item=0 name="/dev/fd/63" inode=15772 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:20:38.486000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:20:38.500000 audit[2900]: AVC avc: denied { write } for pid=2900 comm="tee" name="fd" dev="proc" ino=15296 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:20:38.500000 audit[2900]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe7190a1f a2=241 a3=1b6 items=1 ppid=2847 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:38.500000 audit: CWD cwd="/etc/service/enabled/cni/log" Mar 17 18:20:38.500000 audit: PATH item=0 name="/dev/fd/63" inode=15782 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:20:38.500000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:20:38.504000 audit[2869]: AVC avc: denied { write } for pid=2869 comm="tee" name="fd" dev="proc" ino=15786 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:20:38.504000 audit[2869]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd68a7a0d a2=241 a3=1b6 items=1 ppid=2838 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:38.504000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Mar 17 18:20:38.504000 audit: PATH item=0 name="/dev/fd/63" inode=15271 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:20:38.504000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:20:38.464000 audit[2875]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe1284a1e a2=241 a3=1b6 items=1 ppid=2834 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:38.464000 audit: CWD cwd="/etc/service/enabled/bird/log" Mar 17 18:20:38.464000 audit: PATH item=0 name="/dev/fd/63" inode=15769 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:20:38.464000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:20:38.521000 audit[2903]: AVC avc: denied { write } for pid=2903 comm="tee" name="fd" dev="proc" ino=15300 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:20:38.521000 audit[2903]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc04c2a1d a2=241 a3=1b6 items=1 ppid=2849 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:38.521000 audit: CWD cwd="/etc/service/enabled/bird6/log" Mar 17 18:20:38.521000 audit: PATH item=0 name="/dev/fd/63" inode=15785 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:20:38.521000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:20:38.864000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.864000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.864000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.864000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.864000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.864000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.864000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.864000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.864000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.864000 audit: BPF prog-id=87 op=LOAD Mar 17 18:20:38.864000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe1786a48 a2=98 a3=ffffe1786a38 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:38.864000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:38.865000 audit: BPF prog-id=87 op=UNLOAD Mar 17 18:20:38.865000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.865000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.865000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.865000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.865000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.865000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.865000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.865000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.865000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.865000 audit: BPF prog-id=88 op=LOAD Mar 17 18:20:38.865000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe17866d8 a2=74 a3=95 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:38.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:38.865000 audit: BPF prog-id=88 op=UNLOAD Mar 17 18:20:38.865000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.865000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.865000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.865000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.865000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.865000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.865000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.865000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.865000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:38.865000 audit: BPF prog-id=89 op=LOAD Mar 17 18:20:38.865000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe1786738 a2=94 a3=2 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:38.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:38.866000 audit: BPF prog-id=89 op=UNLOAD Mar 17 18:20:38.904881 kubelet[2212]: E0317 18:20:38.904776 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:39.033000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.033000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.033000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.033000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.033000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.033000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.033000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.033000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.033000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.033000 audit: BPF prog-id=90 op=LOAD Mar 17 18:20:39.033000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe17866f8 a2=40 a3=ffffe1786728 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.033000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.033000 audit: BPF prog-id=90 op=UNLOAD Mar 17 18:20:39.033000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.033000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffe1786810 a2=50 a3=0 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.033000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.049000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.049000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe1786768 a2=28 a3=ffffe1786898 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.049000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.049000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.049000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe1786798 a2=28 a3=ffffe17868c8 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.049000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.049000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.049000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe1786648 a2=28 a3=ffffe1786778 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.049000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.049000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.049000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe17867b8 a2=28 a3=ffffe17868e8 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.049000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.049000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.049000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe1786798 a2=28 a3=ffffe17868c8 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.049000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.049000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.049000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe1786788 a2=28 a3=ffffe17868b8 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.049000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.049000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.049000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe17867b8 a2=28 a3=ffffe17868e8 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.049000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe1786798 a2=28 a3=ffffe17868c8 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.050000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe17867b8 a2=28 a3=ffffe17868e8 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.050000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe1786788 a2=28 a3=ffffe17868b8 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.050000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe1786808 a2=28 a3=ffffe1786948 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.050000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe1786540 a2=50 a3=0 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.050000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit: BPF prog-id=91 op=LOAD Mar 17 18:20:39.050000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe1786548 a2=94 a3=5 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.050000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.050000 audit: BPF prog-id=91 op=UNLOAD Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe1786650 a2=50 a3=0 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.050000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffe1786798 a2=4 a3=3 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.050000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.050000 audit[2946]: AVC avc: denied { confidentiality } for pid=2946 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:20:39.050000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe1786778 a2=94 a3=6 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.050000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { confidentiality } for pid=2946 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:20:39.051000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe1785f48 a2=94 a3=83 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.051000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.051000 audit[2946]: AVC avc: denied { confidentiality } for pid=2946 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:20:39.051000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe1785f48 a2=94 a3=83 items=0 ppid=2848 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.051000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit: BPF prog-id=92 op=LOAD Mar 17 18:20:39.070000 audit[2949]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd5c65ea8 a2=98 a3=ffffd5c65e98 items=0 ppid=2848 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.070000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:20:39.070000 audit: BPF prog-id=92 op=UNLOAD Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit: BPF prog-id=93 op=LOAD Mar 17 18:20:39.070000 audit[2949]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd5c65d58 a2=74 a3=95 items=0 ppid=2848 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.070000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:20:39.070000 audit: BPF prog-id=93 op=UNLOAD Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.070000 audit: BPF prog-id=94 op=LOAD Mar 17 18:20:39.070000 audit[2949]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd5c65d88 a2=40 a3=ffffd5c65db8 items=0 ppid=2848 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.070000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:20:39.071000 audit: BPF prog-id=94 op=UNLOAD Mar 17 18:20:39.178000 systemd-networkd[1531]: vxlan.calico: Link UP Mar 17 18:20:39.178015 systemd-networkd[1531]: vxlan.calico: Gained carrier Mar 17 18:20:39.179513 (udev-worker)[2803]: Network interface NamePolicy= disabled on kernel command line. Mar 17 18:20:39.234929 (udev-worker)[2968]: Network interface NamePolicy= disabled on kernel command line. Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit: BPF prog-id=95 op=LOAD Mar 17 18:20:39.236000 audit[2977]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe64489e8 a2=98 a3=ffffe64489d8 items=0 ppid=2848 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.236000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:20:39.236000 audit: BPF prog-id=95 op=UNLOAD Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit: BPF prog-id=96 op=LOAD Mar 17 18:20:39.236000 audit[2977]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe64486c8 a2=74 a3=95 items=0 ppid=2848 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.236000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:20:39.236000 audit: BPF prog-id=96 op=UNLOAD Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit: BPF prog-id=97 op=LOAD Mar 17 18:20:39.236000 audit[2977]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe6448728 a2=94 a3=2 items=0 ppid=2848 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.236000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:20:39.236000 audit: BPF prog-id=97 op=UNLOAD Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe6448758 a2=28 a3=ffffe6448888 items=0 ppid=2848 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.236000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6448788 a2=28 a3=ffffe64488b8 items=0 ppid=2848 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.236000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6448638 a2=28 a3=ffffe6448768 items=0 ppid=2848 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.236000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe64487a8 a2=28 a3=ffffe64488d8 items=0 ppid=2848 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.236000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe6448788 a2=28 a3=ffffe64488b8 items=0 ppid=2848 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.236000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:20:39.236000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.236000 audit[2977]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe6448778 a2=28 a3=ffffe64488a8 items=0 ppid=2848 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.236000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:20:39.237000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.237000 audit[2977]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe64487a8 a2=28 a3=ffffe64488d8 items=0 ppid=2848 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.237000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:20:39.237000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.237000 audit[2977]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6448788 a2=28 a3=ffffe64488b8 items=0 ppid=2848 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.237000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:20:39.237000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.237000 audit[2977]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe64487a8 a2=28 a3=ffffe64488d8 items=0 ppid=2848 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.237000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:20:39.237000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.237000 audit[2977]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6448778 a2=28 a3=ffffe64488a8 items=0 ppid=2848 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.237000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:20:39.237000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.237000 audit[2977]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe64487f8 a2=28 a3=ffffe6448938 items=0 ppid=2848 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.237000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:20:39.237000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.237000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.237000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.237000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.237000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.237000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.237000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.237000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.237000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.237000 audit: BPF prog-id=98 op=LOAD Mar 17 18:20:39.237000 audit[2977]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe6448618 a2=40 a3=ffffe6448648 items=0 ppid=2848 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.237000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:20:39.237000 audit: BPF prog-id=98 op=UNLOAD Mar 17 18:20:39.238000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.238000 audit[2977]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffe6448640 a2=50 a3=0 items=0 ppid=2848 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:20:39.238000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.238000 audit[2977]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffe6448640 a2=50 a3=0 items=0 ppid=2848 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:20:39.239000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.239000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.239000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.239000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.239000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.239000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.239000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.239000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.239000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.239000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.239000 audit: BPF prog-id=99 op=LOAD Mar 17 18:20:39.239000 audit[2977]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe6447da8 a2=94 a3=2 items=0 ppid=2848 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.239000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:20:39.240000 audit: BPF prog-id=99 op=UNLOAD Mar 17 18:20:39.240000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.240000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.240000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.240000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.240000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.240000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.240000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.240000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.240000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.240000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.240000 audit: BPF prog-id=100 op=LOAD Mar 17 18:20:39.240000 audit[2977]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe6447f38 a2=94 a3=2d items=0 ppid=2848 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.240000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit: BPF prog-id=101 op=LOAD Mar 17 18:20:39.250000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc777bd38 a2=98 a3=ffffc777bd28 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.250000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.250000 audit: BPF prog-id=101 op=UNLOAD Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit: BPF prog-id=102 op=LOAD Mar 17 18:20:39.250000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc777b9c8 a2=74 a3=95 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.250000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.250000 audit: BPF prog-id=102 op=UNLOAD Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.250000 audit: BPF prog-id=103 op=LOAD Mar 17 18:20:39.250000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc777ba28 a2=94 a3=2 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.250000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.251000 audit: BPF prog-id=103 op=UNLOAD Mar 17 18:20:39.432000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.432000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.432000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.432000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.432000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.432000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.432000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.432000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.432000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.432000 audit: BPF prog-id=104 op=LOAD Mar 17 18:20:39.432000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc777b9e8 a2=40 a3=ffffc777ba18 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.432000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.435000 audit: BPF prog-id=104 op=UNLOAD Mar 17 18:20:39.435000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.435000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc777bb00 a2=50 a3=0 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.435000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.451000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.451000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc777ba58 a2=28 a3=ffffc777bb88 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.451000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.452000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.452000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc777ba88 a2=28 a3=ffffc777bbb8 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.452000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.452000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.452000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc777b938 a2=28 a3=ffffc777ba68 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.452000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.452000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.452000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc777baa8 a2=28 a3=ffffc777bbd8 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.452000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.453000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.453000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc777ba88 a2=28 a3=ffffc777bbb8 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.453000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.453000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.453000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc777ba78 a2=28 a3=ffffc777bba8 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.453000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.454000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.454000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc777baa8 a2=28 a3=ffffc777bbd8 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.454000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.454000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc777ba88 a2=28 a3=ffffc777bbb8 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.454000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.454000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc777baa8 a2=28 a3=ffffc777bbd8 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.454000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.454000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc777ba78 a2=28 a3=ffffc777bba8 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.455000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.455000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc777baf8 a2=28 a3=ffffc777bc38 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.456000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.456000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc777b830 a2=50 a3=0 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.456000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.456000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.456000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.456000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.456000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.456000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.456000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.456000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.456000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.456000 audit: BPF prog-id=105 op=LOAD Mar 17 18:20:39.456000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc777b838 a2=94 a3=5 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.457000 audit: BPF prog-id=105 op=UNLOAD Mar 17 18:20:39.457000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.457000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc777b940 a2=50 a3=0 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.457000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.458000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.458000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc777ba88 a2=4 a3=3 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.458000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.458000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.458000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.458000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.458000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.458000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.458000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.458000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.458000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.458000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.458000 audit[2979]: AVC avc: denied { confidentiality } for pid=2979 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:20:39.458000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc777ba68 a2=94 a3=6 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.460000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.460000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.460000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.460000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.460000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.460000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.460000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.460000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.460000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.460000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.460000 audit[2979]: AVC avc: denied { confidentiality } for pid=2979 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:20:39.460000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc777b238 a2=94 a3=83 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.460000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.461000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.461000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.461000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.461000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.461000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.461000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.461000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.461000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.461000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.461000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.461000 audit[2979]: AVC avc: denied { confidentiality } for pid=2979 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:20:39.461000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc777b238 a2=94 a3=83 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.461000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.463000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.463000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc777cc78 a2=10 a3=ffffc777cd68 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.463000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.464000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.464000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc777cb38 a2=10 a3=ffffc777cc28 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.464000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.465000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.465000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc777caa8 a2=10 a3=ffffc777cc28 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.465000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.465000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:39.465000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc777caa8 a2=10 a3=ffffc777cc28 items=0 ppid=2848 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.465000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:20:39.474000 audit: BPF prog-id=100 op=UNLOAD Mar 17 18:20:39.572000 audit[3004]: NETFILTER_CFG table=mangle:79 family=2 entries=16 op=nft_register_chain pid=3004 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:20:39.572000 audit[3004]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc71a58c0 a2=0 a3=ffffbc6c9fa8 items=0 ppid=2848 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.572000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:20:39.588000 audit[3005]: NETFILTER_CFG table=nat:80 family=2 entries=15 op=nft_register_chain pid=3005 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:20:39.588000 audit[3005]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=fffffd2cac10 a2=0 a3=ffffb35e6fa8 items=0 ppid=2848 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.588000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:20:39.598000 audit[3003]: NETFILTER_CFG table=raw:81 family=2 entries=21 op=nft_register_chain pid=3003 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:20:39.598000 audit[3003]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=fffff1740eb0 a2=0 a3=ffff837d6fa8 items=0 ppid=2848 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.598000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:20:39.600000 audit[3008]: NETFILTER_CFG table=filter:82 family=2 entries=39 op=nft_register_chain pid=3008 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:20:39.600000 audit[3008]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffc92b42d0 a2=0 a3=ffffb005bfa8 items=0 ppid=2848 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:39.600000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:20:39.906035 kubelet[2212]: E0317 18:20:39.905942 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:40.208540 env[1818]: time="2025-03-17T18:20:40.208445446Z" level=info msg="StopPodSandbox for \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\"" Mar 17 18:20:40.291876 kubelet[2212]: I0317 18:20:40.291105 2212 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-ln2qr" podStartSLOduration=6.602827213 podStartE2EDuration="28.291080748s" podCreationTimestamp="2025-03-17 18:20:12 +0000 UTC" firstStartedPulling="2025-03-17 18:20:14.963382611 +0000 UTC m=+3.988993887" lastFinishedPulling="2025-03-17 18:20:36.651636158 +0000 UTC m=+25.677247422" observedRunningTime="2025-03-17 18:20:37.330410424 +0000 UTC m=+26.356021712" watchObservedRunningTime="2025-03-17 18:20:40.291080748 +0000 UTC m=+29.316692036" Mar 17 18:20:40.361774 env[1818]: 2025-03-17 18:20:40.292 [INFO][3029] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Mar 17 18:20:40.361774 env[1818]: 2025-03-17 18:20:40.292 [INFO][3029] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" iface="eth0" netns="/var/run/netns/cni-3e468380-71b9-6608-7930-b5eec0d52bc7" Mar 17 18:20:40.361774 env[1818]: 2025-03-17 18:20:40.292 [INFO][3029] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" iface="eth0" netns="/var/run/netns/cni-3e468380-71b9-6608-7930-b5eec0d52bc7" Mar 17 18:20:40.361774 env[1818]: 2025-03-17 18:20:40.292 [INFO][3029] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" iface="eth0" netns="/var/run/netns/cni-3e468380-71b9-6608-7930-b5eec0d52bc7" Mar 17 18:20:40.361774 env[1818]: 2025-03-17 18:20:40.292 [INFO][3029] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Mar 17 18:20:40.361774 env[1818]: 2025-03-17 18:20:40.292 [INFO][3029] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Mar 17 18:20:40.361774 env[1818]: 2025-03-17 18:20:40.338 [INFO][3036] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" HandleID="k8s-pod-network.f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Workload="172.31.22.27-k8s-csi--node--driver--9k7db-eth0" Mar 17 18:20:40.361774 env[1818]: 2025-03-17 18:20:40.338 [INFO][3036] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:20:40.361774 env[1818]: 2025-03-17 18:20:40.339 [INFO][3036] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:20:40.361774 env[1818]: 2025-03-17 18:20:40.351 [WARNING][3036] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" HandleID="k8s-pod-network.f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Workload="172.31.22.27-k8s-csi--node--driver--9k7db-eth0" Mar 17 18:20:40.361774 env[1818]: 2025-03-17 18:20:40.351 [INFO][3036] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" HandleID="k8s-pod-network.f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Workload="172.31.22.27-k8s-csi--node--driver--9k7db-eth0" Mar 17 18:20:40.361774 env[1818]: 2025-03-17 18:20:40.353 [INFO][3036] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:20:40.361774 env[1818]: 2025-03-17 18:20:40.359 [INFO][3029] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Mar 17 18:20:40.366347 env[1818]: time="2025-03-17T18:20:40.366272297Z" level=info msg="TearDown network for sandbox \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\" successfully" Mar 17 18:20:40.366575 env[1818]: time="2025-03-17T18:20:40.366528473Z" level=info msg="StopPodSandbox for \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\" returns successfully" Mar 17 18:20:40.367903 env[1818]: time="2025-03-17T18:20:40.367792806Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9k7db,Uid:18cae42e-0875-42b2-8913-ac2b39fe24a2,Namespace:calico-system,Attempt:1,}" Mar 17 18:20:40.369910 systemd[1]: run-netns-cni\x2d3e468380\x2d71b9\x2d6608\x2d7930\x2db5eec0d52bc7.mount: Deactivated successfully. Mar 17 18:20:40.608990 systemd-networkd[1531]: calib0cbf338743: Link UP Mar 17 18:20:40.617378 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:20:40.617479 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib0cbf338743: link becomes ready Mar 17 18:20:40.617228 systemd-networkd[1531]: calib0cbf338743: Gained carrier Mar 17 18:20:40.641664 env[1818]: 2025-03-17 18:20:40.475 [INFO][3043] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.27-k8s-csi--node--driver--9k7db-eth0 csi-node-driver- calico-system 18cae42e-0875-42b2-8913-ac2b39fe24a2 1060 0 2025-03-17 18:20:12 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.31.22.27 csi-node-driver-9k7db eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calib0cbf338743 [] []}} ContainerID="87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27" Namespace="calico-system" Pod="csi-node-driver-9k7db" WorkloadEndpoint="172.31.22.27-k8s-csi--node--driver--9k7db-" Mar 17 18:20:40.641664 env[1818]: 2025-03-17 18:20:40.475 [INFO][3043] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27" Namespace="calico-system" Pod="csi-node-driver-9k7db" WorkloadEndpoint="172.31.22.27-k8s-csi--node--driver--9k7db-eth0" Mar 17 18:20:40.641664 env[1818]: 2025-03-17 18:20:40.531 [INFO][3057] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27" HandleID="k8s-pod-network.87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27" Workload="172.31.22.27-k8s-csi--node--driver--9k7db-eth0" Mar 17 18:20:40.641664 env[1818]: 2025-03-17 18:20:40.548 [INFO][3057] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27" HandleID="k8s-pod-network.87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27" Workload="172.31.22.27-k8s-csi--node--driver--9k7db-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000317c40), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.22.27", "pod":"csi-node-driver-9k7db", "timestamp":"2025-03-17 18:20:40.531529753 +0000 UTC"}, Hostname:"172.31.22.27", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:20:40.641664 env[1818]: 2025-03-17 18:20:40.549 [INFO][3057] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:20:40.641664 env[1818]: 2025-03-17 18:20:40.549 [INFO][3057] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:20:40.641664 env[1818]: 2025-03-17 18:20:40.549 [INFO][3057] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.27' Mar 17 18:20:40.641664 env[1818]: 2025-03-17 18:20:40.552 [INFO][3057] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27" host="172.31.22.27" Mar 17 18:20:40.641664 env[1818]: 2025-03-17 18:20:40.560 [INFO][3057] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.22.27" Mar 17 18:20:40.641664 env[1818]: 2025-03-17 18:20:40.567 [INFO][3057] ipam/ipam.go 489: Trying affinity for 192.168.27.0/26 host="172.31.22.27" Mar 17 18:20:40.641664 env[1818]: 2025-03-17 18:20:40.571 [INFO][3057] ipam/ipam.go 155: Attempting to load block cidr=192.168.27.0/26 host="172.31.22.27" Mar 17 18:20:40.641664 env[1818]: 2025-03-17 18:20:40.575 [INFO][3057] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.0/26 host="172.31.22.27" Mar 17 18:20:40.641664 env[1818]: 2025-03-17 18:20:40.575 [INFO][3057] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.0/26 handle="k8s-pod-network.87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27" host="172.31.22.27" Mar 17 18:20:40.641664 env[1818]: 2025-03-17 18:20:40.577 [INFO][3057] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27 Mar 17 18:20:40.641664 env[1818]: 2025-03-17 18:20:40.586 [INFO][3057] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.27.0/26 handle="k8s-pod-network.87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27" host="172.31.22.27" Mar 17 18:20:40.641664 env[1818]: 2025-03-17 18:20:40.597 [INFO][3057] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.27.1/26] block=192.168.27.0/26 handle="k8s-pod-network.87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27" host="172.31.22.27" Mar 17 18:20:40.641664 env[1818]: 2025-03-17 18:20:40.597 [INFO][3057] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.1/26] handle="k8s-pod-network.87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27" host="172.31.22.27" Mar 17 18:20:40.641664 env[1818]: 2025-03-17 18:20:40.597 [INFO][3057] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:20:40.641664 env[1818]: 2025-03-17 18:20:40.597 [INFO][3057] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.27.1/26] IPv6=[] ContainerID="87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27" HandleID="k8s-pod-network.87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27" Workload="172.31.22.27-k8s-csi--node--driver--9k7db-eth0" Mar 17 18:20:40.642905 env[1818]: 2025-03-17 18:20:40.601 [INFO][3043] cni-plugin/k8s.go 386: Populated endpoint ContainerID="87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27" Namespace="calico-system" Pod="csi-node-driver-9k7db" WorkloadEndpoint="172.31.22.27-k8s-csi--node--driver--9k7db-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.27-k8s-csi--node--driver--9k7db-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"18cae42e-0875-42b2-8913-ac2b39fe24a2", ResourceVersion:"1060", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 20, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.27", ContainerID:"", Pod:"csi-node-driver-9k7db", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.27.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib0cbf338743", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:20:40.642905 env[1818]: 2025-03-17 18:20:40.602 [INFO][3043] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.27.1/32] ContainerID="87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27" Namespace="calico-system" Pod="csi-node-driver-9k7db" WorkloadEndpoint="172.31.22.27-k8s-csi--node--driver--9k7db-eth0" Mar 17 18:20:40.642905 env[1818]: 2025-03-17 18:20:40.602 [INFO][3043] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib0cbf338743 ContainerID="87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27" Namespace="calico-system" Pod="csi-node-driver-9k7db" WorkloadEndpoint="172.31.22.27-k8s-csi--node--driver--9k7db-eth0" Mar 17 18:20:40.642905 env[1818]: 2025-03-17 18:20:40.619 [INFO][3043] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27" Namespace="calico-system" Pod="csi-node-driver-9k7db" WorkloadEndpoint="172.31.22.27-k8s-csi--node--driver--9k7db-eth0" Mar 17 18:20:40.642905 env[1818]: 2025-03-17 18:20:40.622 [INFO][3043] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27" Namespace="calico-system" Pod="csi-node-driver-9k7db" WorkloadEndpoint="172.31.22.27-k8s-csi--node--driver--9k7db-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.27-k8s-csi--node--driver--9k7db-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"18cae42e-0875-42b2-8913-ac2b39fe24a2", ResourceVersion:"1060", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 20, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.27", ContainerID:"87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27", Pod:"csi-node-driver-9k7db", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.27.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib0cbf338743", MAC:"b6:ce:5a:99:de:f9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:20:40.642905 env[1818]: 2025-03-17 18:20:40.639 [INFO][3043] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27" Namespace="calico-system" Pod="csi-node-driver-9k7db" WorkloadEndpoint="172.31.22.27-k8s-csi--node--driver--9k7db-eth0" Mar 17 18:20:40.667000 audit[3077]: NETFILTER_CFG table=filter:83 family=2 entries=34 op=nft_register_chain pid=3077 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:20:40.667000 audit[3077]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffdf5bf100 a2=0 a3=ffffb2a75fa8 items=0 ppid=2848 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:40.667000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:20:40.674714 env[1818]: time="2025-03-17T18:20:40.674586951Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:20:40.674965 env[1818]: time="2025-03-17T18:20:40.674672471Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:20:40.674965 env[1818]: time="2025-03-17T18:20:40.674700698Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:20:40.675846 env[1818]: time="2025-03-17T18:20:40.675652054Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27 pid=3087 runtime=io.containerd.runc.v2 Mar 17 18:20:40.719462 systemd[1]: Started cri-containerd-87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27.scope. Mar 17 18:20:40.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.753000 audit: BPF prog-id=106 op=LOAD Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit[3097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3087 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:40.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837383631623534326530343034373330356364653734343932356562 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit[3097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3087 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:40.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837383631623534326530343034373330356364653734343932356562 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit: BPF prog-id=107 op=LOAD Mar 17 18:20:40.755000 audit[3097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3087 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:40.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837383631623534326530343034373330356364653734343932356562 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.755000 audit: BPF prog-id=108 op=LOAD Mar 17 18:20:40.755000 audit[3097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3087 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:40.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837383631623534326530343034373330356364653734343932356562 Mar 17 18:20:40.755000 audit: BPF prog-id=108 op=UNLOAD Mar 17 18:20:40.756000 audit: BPF prog-id=107 op=UNLOAD Mar 17 18:20:40.756000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.756000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.756000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.756000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.756000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.756000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.756000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.756000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.756000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.756000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:40.756000 audit: BPF prog-id=109 op=LOAD Mar 17 18:20:40.756000 audit[3097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3087 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:40.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837383631623534326530343034373330356364653734343932356562 Mar 17 18:20:40.783089 env[1818]: time="2025-03-17T18:20:40.783014577Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9k7db,Uid:18cae42e-0875-42b2-8913-ac2b39fe24a2,Namespace:calico-system,Attempt:1,} returns sandbox id \"87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27\"" Mar 17 18:20:40.786296 env[1818]: time="2025-03-17T18:20:40.786123682Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Mar 17 18:20:40.872623 systemd-networkd[1531]: vxlan.calico: Gained IPv6LL Mar 17 18:20:40.907116 kubelet[2212]: E0317 18:20:40.906946 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:41.768935 systemd-networkd[1531]: calib0cbf338743: Gained IPv6LL Mar 17 18:20:41.907691 kubelet[2212]: E0317 18:20:41.907616 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:41.925866 kubelet[2212]: I0317 18:20:41.925517 2212 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 18:20:41.979876 systemd[1]: run-containerd-runc-k8s.io-2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c-runc.rsdnIF.mount: Deactivated successfully. Mar 17 18:20:42.130588 systemd[1]: run-containerd-runc-k8s.io-2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c-runc.R4CTvV.mount: Deactivated successfully. Mar 17 18:20:42.402962 update_engine[1804]: I0317 18:20:42.402709 1804 update_attempter.cc:509] Updating boot flags... Mar 17 18:20:42.872409 env[1818]: time="2025-03-17T18:20:42.872313599Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:42.876116 env[1818]: time="2025-03-17T18:20:42.876046453Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:42.880269 env[1818]: time="2025-03-17T18:20:42.880196141Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:42.883758 env[1818]: time="2025-03-17T18:20:42.883685114Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:42.890110 env[1818]: time="2025-03-17T18:20:42.890047920Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163\"" Mar 17 18:20:42.895320 env[1818]: time="2025-03-17T18:20:42.895267508Z" level=info msg="CreateContainer within sandbox \"87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Mar 17 18:20:42.908658 kubelet[2212]: E0317 18:20:42.908556 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:42.931608 env[1818]: time="2025-03-17T18:20:42.931523955Z" level=info msg="CreateContainer within sandbox \"87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"93ad9140d521c12fe820c05ca1351f91adac57c4944aee26733c89f58369df5f\"" Mar 17 18:20:42.932608 env[1818]: time="2025-03-17T18:20:42.932548750Z" level=info msg="StartContainer for \"93ad9140d521c12fe820c05ca1351f91adac57c4944aee26733c89f58369df5f\"" Mar 17 18:20:42.963182 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1236968504.mount: Deactivated successfully. Mar 17 18:20:42.988467 systemd[1]: run-containerd-runc-k8s.io-93ad9140d521c12fe820c05ca1351f91adac57c4944aee26733c89f58369df5f-runc.SaI4Ow.mount: Deactivated successfully. Mar 17 18:20:42.992789 systemd[1]: Started cri-containerd-93ad9140d521c12fe820c05ca1351f91adac57c4944aee26733c89f58369df5f.scope. Mar 17 18:20:43.023000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.023000 audit[3265]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3087 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:43.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933616439313430643532316331326665383230633035636131333531 Mar 17 18:20:43.023000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.023000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.023000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.023000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.023000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.023000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.023000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.023000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.023000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.023000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.023000 audit: BPF prog-id=110 op=LOAD Mar 17 18:20:43.023000 audit[3265]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3087 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:43.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933616439313430643532316331326665383230633035636131333531 Mar 17 18:20:43.025000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.025000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.025000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.025000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.025000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.025000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.025000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.025000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.025000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.025000 audit: BPF prog-id=111 op=LOAD Mar 17 18:20:43.025000 audit[3265]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3087 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:43.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933616439313430643532316331326665383230633035636131333531 Mar 17 18:20:43.026000 audit: BPF prog-id=111 op=UNLOAD Mar 17 18:20:43.026000 audit: BPF prog-id=110 op=UNLOAD Mar 17 18:20:43.026000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.026000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.026000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.026000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.026000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.026000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.026000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.026000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.026000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.026000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:43.026000 audit: BPF prog-id=112 op=LOAD Mar 17 18:20:43.026000 audit[3265]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3087 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:43.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933616439313430643532316331326665383230633035636131333531 Mar 17 18:20:43.060914 env[1818]: time="2025-03-17T18:20:43.060846514Z" level=info msg="StartContainer for \"93ad9140d521c12fe820c05ca1351f91adac57c4944aee26733c89f58369df5f\" returns successfully" Mar 17 18:20:43.063179 env[1818]: time="2025-03-17T18:20:43.063128973Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Mar 17 18:20:43.908788 kubelet[2212]: E0317 18:20:43.908721 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:44.655254 env[1818]: time="2025-03-17T18:20:44.655195736Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:44.657854 env[1818]: time="2025-03-17T18:20:44.657782845Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:44.660762 env[1818]: time="2025-03-17T18:20:44.660698208Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:44.663694 env[1818]: time="2025-03-17T18:20:44.663634027Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:44.664955 env[1818]: time="2025-03-17T18:20:44.664903668Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349\"" Mar 17 18:20:44.669576 env[1818]: time="2025-03-17T18:20:44.669521537Z" level=info msg="CreateContainer within sandbox \"87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Mar 17 18:20:44.698701 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4132950887.mount: Deactivated successfully. Mar 17 18:20:44.707504 env[1818]: time="2025-03-17T18:20:44.707431601Z" level=info msg="CreateContainer within sandbox \"87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"caf67c27781b437b8c84f872a314c325a22c0499d7e88896f4cc7b4e811d4b0e\"" Mar 17 18:20:44.709158 env[1818]: time="2025-03-17T18:20:44.709096760Z" level=info msg="StartContainer for \"caf67c27781b437b8c84f872a314c325a22c0499d7e88896f4cc7b4e811d4b0e\"" Mar 17 18:20:44.749624 systemd[1]: Started cri-containerd-caf67c27781b437b8c84f872a314c325a22c0499d7e88896f4cc7b4e811d4b0e.scope. Mar 17 18:20:44.795000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.798465 kernel: kauditd_printk_skb: 608 callbacks suppressed Mar 17 18:20:44.798673 kernel: audit: type=1400 audit(1742235644.795:717): avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.795000 audit[3304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3087 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:44.815028 kernel: audit: type=1300 audit(1742235644.795:717): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3087 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:44.815133 kernel: audit: type=1327 audit(1742235644.795:717): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361663637633237373831623433376238633834663837326133313463 Mar 17 18:20:44.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361663637633237373831623433376238633834663837326133313463 Mar 17 18:20:44.795000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.831021 kernel: audit: type=1400 audit(1742235644.795:718): avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.831152 kernel: audit: type=1400 audit(1742235644.795:718): avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.795000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.795000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.846612 kernel: audit: type=1400 audit(1742235644.795:718): avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.795000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.855556 kernel: audit: type=1400 audit(1742235644.795:718): avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.795000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.863356 kernel: audit: type=1400 audit(1742235644.795:718): avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.863491 kernel: audit: type=1400 audit(1742235644.795:718): avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.795000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.879875 kernel: audit: type=1400 audit(1742235644.795:718): avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.795000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.795000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.795000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.795000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.795000 audit: BPF prog-id=113 op=LOAD Mar 17 18:20:44.795000 audit[3304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3087 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:44.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361663637633237373831623433376238633834663837326133313463 Mar 17 18:20:44.798000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.798000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.798000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.798000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.798000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.798000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.798000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.798000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.798000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.798000 audit: BPF prog-id=114 op=LOAD Mar 17 18:20:44.798000 audit[3304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3087 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:44.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361663637633237373831623433376238633834663837326133313463 Mar 17 18:20:44.804000 audit: BPF prog-id=114 op=UNLOAD Mar 17 18:20:44.804000 audit: BPF prog-id=113 op=UNLOAD Mar 17 18:20:44.804000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.804000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.804000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.804000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.804000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.804000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.804000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.804000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.804000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.804000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:44.804000 audit: BPF prog-id=115 op=LOAD Mar 17 18:20:44.804000 audit[3304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3087 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:44.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361663637633237373831623433376238633834663837326133313463 Mar 17 18:20:44.885575 env[1818]: time="2025-03-17T18:20:44.885521306Z" level=info msg="StartContainer for \"caf67c27781b437b8c84f872a314c325a22c0499d7e88896f4cc7b4e811d4b0e\" returns successfully" Mar 17 18:20:44.909952 kubelet[2212]: E0317 18:20:44.909107 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:45.077466 kubelet[2212]: I0317 18:20:45.077414 2212 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Mar 17 18:20:45.077466 kubelet[2212]: I0317 18:20:45.077462 2212 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Mar 17 18:20:45.334595 kubelet[2212]: I0317 18:20:45.334498 2212 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-9k7db" podStartSLOduration=29.45353319 podStartE2EDuration="33.334478695s" podCreationTimestamp="2025-03-17 18:20:12 +0000 UTC" firstStartedPulling="2025-03-17 18:20:40.785575541 +0000 UTC m=+29.811186829" lastFinishedPulling="2025-03-17 18:20:44.666521058 +0000 UTC m=+33.692132334" observedRunningTime="2025-03-17 18:20:45.334418947 +0000 UTC m=+34.360030247" watchObservedRunningTime="2025-03-17 18:20:45.334478695 +0000 UTC m=+34.360090067" Mar 17 18:20:45.909382 kubelet[2212]: E0317 18:20:45.909330 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:46.211031 env[1818]: time="2025-03-17T18:20:46.210953921Z" level=info msg="StopPodSandbox for \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\"" Mar 17 18:20:46.340582 env[1818]: 2025-03-17 18:20:46.283 [INFO][3347] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Mar 17 18:20:46.340582 env[1818]: 2025-03-17 18:20:46.283 [INFO][3347] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" iface="eth0" netns="/var/run/netns/cni-870b8c2a-c52a-2985-f1fe-e769f2d4e520" Mar 17 18:20:46.340582 env[1818]: 2025-03-17 18:20:46.283 [INFO][3347] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" iface="eth0" netns="/var/run/netns/cni-870b8c2a-c52a-2985-f1fe-e769f2d4e520" Mar 17 18:20:46.340582 env[1818]: 2025-03-17 18:20:46.284 [INFO][3347] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" iface="eth0" netns="/var/run/netns/cni-870b8c2a-c52a-2985-f1fe-e769f2d4e520" Mar 17 18:20:46.340582 env[1818]: 2025-03-17 18:20:46.284 [INFO][3347] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Mar 17 18:20:46.340582 env[1818]: 2025-03-17 18:20:46.284 [INFO][3347] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Mar 17 18:20:46.340582 env[1818]: 2025-03-17 18:20:46.321 [INFO][3353] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" HandleID="k8s-pod-network.a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Workload="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0" Mar 17 18:20:46.340582 env[1818]: 2025-03-17 18:20:46.321 [INFO][3353] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:20:46.340582 env[1818]: 2025-03-17 18:20:46.321 [INFO][3353] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:20:46.340582 env[1818]: 2025-03-17 18:20:46.333 [WARNING][3353] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" HandleID="k8s-pod-network.a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Workload="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0" Mar 17 18:20:46.340582 env[1818]: 2025-03-17 18:20:46.333 [INFO][3353] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" HandleID="k8s-pod-network.a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Workload="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0" Mar 17 18:20:46.340582 env[1818]: 2025-03-17 18:20:46.335 [INFO][3353] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:20:46.340582 env[1818]: 2025-03-17 18:20:46.338 [INFO][3347] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Mar 17 18:20:46.344293 env[1818]: time="2025-03-17T18:20:46.344231603Z" level=info msg="TearDown network for sandbox \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\" successfully" Mar 17 18:20:46.344494 env[1818]: time="2025-03-17T18:20:46.344459774Z" level=info msg="StopPodSandbox for \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\" returns successfully" Mar 17 18:20:46.346140 env[1818]: time="2025-03-17T18:20:46.346089767Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-tx8sb,Uid:5c6b8b2f-3eca-4f8a-8bcd-689f12cf1fb7,Namespace:default,Attempt:1,}" Mar 17 18:20:46.347428 systemd[1]: run-netns-cni\x2d870b8c2a\x2dc52a\x2d2985\x2df1fe\x2de769f2d4e520.mount: Deactivated successfully. Mar 17 18:20:46.549493 systemd-networkd[1531]: cali796b21805e5: Link UP Mar 17 18:20:46.556465 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:20:46.556598 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali796b21805e5: link becomes ready Mar 17 18:20:46.556693 systemd-networkd[1531]: cali796b21805e5: Gained carrier Mar 17 18:20:46.559066 (udev-worker)[3379]: Network interface NamePolicy= disabled on kernel command line. Mar 17 18:20:46.583445 env[1818]: 2025-03-17 18:20:46.435 [INFO][3360] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0 nginx-deployment-85f456d6dd- default 5c6b8b2f-3eca-4f8a-8bcd-689f12cf1fb7 1092 0 2025-03-17 18:20:30 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.22.27 nginx-deployment-85f456d6dd-tx8sb eth0 default [] [] [kns.default ksa.default.default] cali796b21805e5 [] []}} ContainerID="b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4" Namespace="default" Pod="nginx-deployment-85f456d6dd-tx8sb" WorkloadEndpoint="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-" Mar 17 18:20:46.583445 env[1818]: 2025-03-17 18:20:46.436 [INFO][3360] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4" Namespace="default" Pod="nginx-deployment-85f456d6dd-tx8sb" WorkloadEndpoint="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0" Mar 17 18:20:46.583445 env[1818]: 2025-03-17 18:20:46.484 [INFO][3372] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4" HandleID="k8s-pod-network.b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4" Workload="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0" Mar 17 18:20:46.583445 env[1818]: 2025-03-17 18:20:46.501 [INFO][3372] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4" HandleID="k8s-pod-network.b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4" Workload="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000261280), Attrs:map[string]string{"namespace":"default", "node":"172.31.22.27", "pod":"nginx-deployment-85f456d6dd-tx8sb", "timestamp":"2025-03-17 18:20:46.484701607 +0000 UTC"}, Hostname:"172.31.22.27", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:20:46.583445 env[1818]: 2025-03-17 18:20:46.501 [INFO][3372] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:20:46.583445 env[1818]: 2025-03-17 18:20:46.501 [INFO][3372] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:20:46.583445 env[1818]: 2025-03-17 18:20:46.501 [INFO][3372] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.27' Mar 17 18:20:46.583445 env[1818]: 2025-03-17 18:20:46.504 [INFO][3372] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4" host="172.31.22.27" Mar 17 18:20:46.583445 env[1818]: 2025-03-17 18:20:46.509 [INFO][3372] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.22.27" Mar 17 18:20:46.583445 env[1818]: 2025-03-17 18:20:46.515 [INFO][3372] ipam/ipam.go 489: Trying affinity for 192.168.27.0/26 host="172.31.22.27" Mar 17 18:20:46.583445 env[1818]: 2025-03-17 18:20:46.518 [INFO][3372] ipam/ipam.go 155: Attempting to load block cidr=192.168.27.0/26 host="172.31.22.27" Mar 17 18:20:46.583445 env[1818]: 2025-03-17 18:20:46.521 [INFO][3372] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.0/26 host="172.31.22.27" Mar 17 18:20:46.583445 env[1818]: 2025-03-17 18:20:46.521 [INFO][3372] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.0/26 handle="k8s-pod-network.b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4" host="172.31.22.27" Mar 17 18:20:46.583445 env[1818]: 2025-03-17 18:20:46.523 [INFO][3372] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4 Mar 17 18:20:46.583445 env[1818]: 2025-03-17 18:20:46.530 [INFO][3372] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.27.0/26 handle="k8s-pod-network.b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4" host="172.31.22.27" Mar 17 18:20:46.583445 env[1818]: 2025-03-17 18:20:46.541 [INFO][3372] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.27.2/26] block=192.168.27.0/26 handle="k8s-pod-network.b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4" host="172.31.22.27" Mar 17 18:20:46.583445 env[1818]: 2025-03-17 18:20:46.541 [INFO][3372] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.2/26] handle="k8s-pod-network.b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4" host="172.31.22.27" Mar 17 18:20:46.583445 env[1818]: 2025-03-17 18:20:46.541 [INFO][3372] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:20:46.583445 env[1818]: 2025-03-17 18:20:46.541 [INFO][3372] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.27.2/26] IPv6=[] ContainerID="b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4" HandleID="k8s-pod-network.b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4" Workload="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0" Mar 17 18:20:46.584736 env[1818]: 2025-03-17 18:20:46.544 [INFO][3360] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4" Namespace="default" Pod="nginx-deployment-85f456d6dd-tx8sb" WorkloadEndpoint="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"5c6b8b2f-3eca-4f8a-8bcd-689f12cf1fb7", ResourceVersion:"1092", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 20, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.27", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-tx8sb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali796b21805e5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:20:46.584736 env[1818]: 2025-03-17 18:20:46.544 [INFO][3360] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.27.2/32] ContainerID="b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4" Namespace="default" Pod="nginx-deployment-85f456d6dd-tx8sb" WorkloadEndpoint="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0" Mar 17 18:20:46.584736 env[1818]: 2025-03-17 18:20:46.545 [INFO][3360] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali796b21805e5 ContainerID="b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4" Namespace="default" Pod="nginx-deployment-85f456d6dd-tx8sb" WorkloadEndpoint="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0" Mar 17 18:20:46.584736 env[1818]: 2025-03-17 18:20:46.560 [INFO][3360] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4" Namespace="default" Pod="nginx-deployment-85f456d6dd-tx8sb" WorkloadEndpoint="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0" Mar 17 18:20:46.584736 env[1818]: 2025-03-17 18:20:46.563 [INFO][3360] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4" Namespace="default" Pod="nginx-deployment-85f456d6dd-tx8sb" WorkloadEndpoint="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"5c6b8b2f-3eca-4f8a-8bcd-689f12cf1fb7", ResourceVersion:"1092", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 20, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.27", ContainerID:"b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4", Pod:"nginx-deployment-85f456d6dd-tx8sb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali796b21805e5", MAC:"f6:d8:f4:0c:ef:a9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:20:46.584736 env[1818]: 2025-03-17 18:20:46.575 [INFO][3360] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4" Namespace="default" Pod="nginx-deployment-85f456d6dd-tx8sb" WorkloadEndpoint="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0" Mar 17 18:20:46.606000 audit[3400]: NETFILTER_CFG table=filter:84 family=2 entries=38 op=nft_register_chain pid=3400 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:20:46.606000 audit[3400]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20312 a0=3 a1=fffff5b4d520 a2=0 a3=ffff7fe77fa8 items=0 ppid=2848 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:46.606000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:20:46.611172 env[1818]: time="2025-03-17T18:20:46.611057178Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:20:46.611471 env[1818]: time="2025-03-17T18:20:46.611134043Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:20:46.611471 env[1818]: time="2025-03-17T18:20:46.611161006Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:20:46.611471 env[1818]: time="2025-03-17T18:20:46.611401781Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4 pid=3401 runtime=io.containerd.runc.v2 Mar 17 18:20:46.658670 systemd[1]: Started cri-containerd-b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4.scope. Mar 17 18:20:46.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.678000 audit: BPF prog-id=116 op=LOAD Mar 17 18:20:46.679000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.679000 audit[3410]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3401 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:46.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230353763363731356339306164663762303166336162646135363164 Mar 17 18:20:46.679000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.679000 audit[3410]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3401 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:46.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230353763363731356339306164663762303166336162646135363164 Mar 17 18:20:46.679000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.679000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.679000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.679000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.679000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.679000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.679000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.679000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.679000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.679000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.679000 audit: BPF prog-id=117 op=LOAD Mar 17 18:20:46.679000 audit[3410]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3401 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:46.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230353763363731356339306164663762303166336162646135363164 Mar 17 18:20:46.680000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.680000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.680000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.680000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.680000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.680000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.680000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.680000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.680000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.680000 audit: BPF prog-id=118 op=LOAD Mar 17 18:20:46.680000 audit[3410]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3401 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:46.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230353763363731356339306164663762303166336162646135363164 Mar 17 18:20:46.680000 audit: BPF prog-id=118 op=UNLOAD Mar 17 18:20:46.680000 audit: BPF prog-id=117 op=UNLOAD Mar 17 18:20:46.680000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.680000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.680000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.680000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.680000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.680000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.680000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.680000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.680000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.680000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:46.680000 audit: BPF prog-id=119 op=LOAD Mar 17 18:20:46.680000 audit[3410]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3401 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:46.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230353763363731356339306164663762303166336162646135363164 Mar 17 18:20:46.725125 env[1818]: time="2025-03-17T18:20:46.725032149Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-tx8sb,Uid:5c6b8b2f-3eca-4f8a-8bcd-689f12cf1fb7,Namespace:default,Attempt:1,} returns sandbox id \"b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4\"" Mar 17 18:20:46.728332 env[1818]: time="2025-03-17T18:20:46.728279037Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Mar 17 18:20:46.910690 kubelet[2212]: E0317 18:20:46.909922 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:47.910137 kubelet[2212]: E0317 18:20:47.910068 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:47.912612 systemd-networkd[1531]: cali796b21805e5: Gained IPv6LL Mar 17 18:20:48.911055 kubelet[2212]: E0317 18:20:48.910994 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:49.911178 kubelet[2212]: E0317 18:20:49.911123 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:50.472862 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3827663788.mount: Deactivated successfully. Mar 17 18:20:50.911393 kubelet[2212]: E0317 18:20:50.911240 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:51.876968 kubelet[2212]: E0317 18:20:51.876859 2212 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:51.911721 kubelet[2212]: E0317 18:20:51.911621 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:52.727859 env[1818]: time="2025-03-17T18:20:52.727778177Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:52.730552 env[1818]: time="2025-03-17T18:20:52.730485383Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f660a383148a8217a75a455efeb8bfd4cbe3afa737712cc0e25f27c03b770dd4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:52.734254 env[1818]: time="2025-03-17T18:20:52.734190822Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:52.737997 env[1818]: time="2025-03-17T18:20:52.737796513Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:b927c62cc716b99bce51774b46a63feb63f5414c6f985fb80cacd1933bbd0e06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:52.741323 env[1818]: time="2025-03-17T18:20:52.741245186Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f660a383148a8217a75a455efeb8bfd4cbe3afa737712cc0e25f27c03b770dd4\"" Mar 17 18:20:52.750371 env[1818]: time="2025-03-17T18:20:52.750275514Z" level=info msg="CreateContainer within sandbox \"b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Mar 17 18:20:52.769646 env[1818]: time="2025-03-17T18:20:52.769575255Z" level=info msg="CreateContainer within sandbox \"b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"495c07964b0cab9e54619fdc8ac3f9228abff2059f484e7fbc047fa501c98122\"" Mar 17 18:20:52.771713 env[1818]: time="2025-03-17T18:20:52.771636625Z" level=info msg="StartContainer for \"495c07964b0cab9e54619fdc8ac3f9228abff2059f484e7fbc047fa501c98122\"" Mar 17 18:20:52.824133 systemd[1]: run-containerd-runc-k8s.io-495c07964b0cab9e54619fdc8ac3f9228abff2059f484e7fbc047fa501c98122-runc.mcRPhp.mount: Deactivated successfully. Mar 17 18:20:52.833115 systemd[1]: Started cri-containerd-495c07964b0cab9e54619fdc8ac3f9228abff2059f484e7fbc047fa501c98122.scope. Mar 17 18:20:52.861896 kernel: kauditd_printk_skb: 93 callbacks suppressed Mar 17 18:20:52.862076 kernel: audit: type=1400 audit(1742235652.856:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.873276 kernel: audit: type=1400 audit(1742235652.860:743): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.873429 kernel: audit: type=1400 audit(1742235652.860:744): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.887188 kernel: audit: type=1400 audit(1742235652.860:745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.894085 kernel: audit: type=1400 audit(1742235652.860:746): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.894671 kernel: audit: type=1400 audit(1742235652.860:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.901289 kernel: audit: type=1400 audit(1742235652.860:748): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.912504 kubelet[2212]: E0317 18:20:52.912437 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:52.914852 kernel: audit: type=1400 audit(1742235652.860:749): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.922467 kernel: audit: type=1400 audit(1742235652.860:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.864000 audit: BPF prog-id=120 op=LOAD Mar 17 18:20:52.930850 kernel: audit: type=1400 audit(1742235652.864:751): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.865000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.865000 audit[3456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=3401 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:52.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439356330373936346230636162396535343631396664633861633366 Mar 17 18:20:52.865000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.865000 audit[3456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3401 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:52.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439356330373936346230636162396535343631396664633861633366 Mar 17 18:20:52.866000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.866000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.866000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.866000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.866000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.866000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.866000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.866000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.866000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.866000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.866000 audit: BPF prog-id=121 op=LOAD Mar 17 18:20:52.866000 audit[3456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=3401 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:52.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439356330373936346230636162396535343631396664633861633366 Mar 17 18:20:52.871000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.871000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.871000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.871000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.871000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.871000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.871000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.871000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.871000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.871000 audit: BPF prog-id=122 op=LOAD Mar 17 18:20:52.871000 audit[3456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=3401 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:52.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439356330373936346230636162396535343631396664633861633366 Mar 17 18:20:52.878000 audit: BPF prog-id=122 op=UNLOAD Mar 17 18:20:52.878000 audit: BPF prog-id=121 op=UNLOAD Mar 17 18:20:52.878000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.878000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.878000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.878000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.878000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.878000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.878000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.878000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.878000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.878000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:52.878000 audit: BPF prog-id=123 op=LOAD Mar 17 18:20:52.878000 audit[3456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=3401 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:52.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439356330373936346230636162396535343631396664633861633366 Mar 17 18:20:52.950096 env[1818]: time="2025-03-17T18:20:52.950015556Z" level=info msg="StartContainer for \"495c07964b0cab9e54619fdc8ac3f9228abff2059f484e7fbc047fa501c98122\" returns successfully" Mar 17 18:20:53.390294 kubelet[2212]: I0317 18:20:53.390222 2212 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-tx8sb" podStartSLOduration=17.370335153 podStartE2EDuration="23.390203116s" podCreationTimestamp="2025-03-17 18:20:30 +0000 UTC" firstStartedPulling="2025-03-17 18:20:46.727319223 +0000 UTC m=+35.752930487" lastFinishedPulling="2025-03-17 18:20:52.747187174 +0000 UTC m=+41.772798450" observedRunningTime="2025-03-17 18:20:53.389897943 +0000 UTC m=+42.415509231" watchObservedRunningTime="2025-03-17 18:20:53.390203116 +0000 UTC m=+42.415814404" Mar 17 18:20:53.473088 kubelet[2212]: I0317 18:20:53.472987 2212 topology_manager.go:215] "Topology Admit Handler" podUID="ceca2420-32d1-4255-8ee4-e3d72202f07e" podNamespace="calico-system" podName="calico-typha-856d47d645-dl76h" Mar 17 18:20:53.483855 systemd[1]: Created slice kubepods-besteffort-podceca2420_32d1_4255_8ee4_e3d72202f07e.slice. Mar 17 18:20:53.522052 kubelet[2212]: I0317 18:20:53.522007 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/ceca2420-32d1-4255-8ee4-e3d72202f07e-typha-certs\") pod \"calico-typha-856d47d645-dl76h\" (UID: \"ceca2420-32d1-4255-8ee4-e3d72202f07e\") " pod="calico-system/calico-typha-856d47d645-dl76h" Mar 17 18:20:53.522351 kubelet[2212]: I0317 18:20:53.522304 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ceca2420-32d1-4255-8ee4-e3d72202f07e-tigera-ca-bundle\") pod \"calico-typha-856d47d645-dl76h\" (UID: \"ceca2420-32d1-4255-8ee4-e3d72202f07e\") " pod="calico-system/calico-typha-856d47d645-dl76h" Mar 17 18:20:53.522515 kubelet[2212]: I0317 18:20:53.522489 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6lh4j\" (UniqueName: \"kubernetes.io/projected/ceca2420-32d1-4255-8ee4-e3d72202f07e-kube-api-access-6lh4j\") pod \"calico-typha-856d47d645-dl76h\" (UID: \"ceca2420-32d1-4255-8ee4-e3d72202f07e\") " pod="calico-system/calico-typha-856d47d645-dl76h" Mar 17 18:20:53.537000 audit[3504]: NETFILTER_CFG table=filter:85 family=2 entries=8 op=nft_register_rule pid=3504 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:53.537000 audit[3504]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd93e2540 a2=0 a3=1 items=0 ppid=2430 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:53.537000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:53.546000 audit[3504]: NETFILTER_CFG table=nat:86 family=2 entries=30 op=nft_register_rule pid=3504 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:53.546000 audit[3504]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffd93e2540 a2=0 a3=1 items=0 ppid=2430 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:53.546000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:53.568000 audit[3506]: NETFILTER_CFG table=filter:87 family=2 entries=8 op=nft_register_rule pid=3506 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:53.568000 audit[3506]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff6b5d3e0 a2=0 a3=1 items=0 ppid=2430 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:53.568000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:53.582000 audit[3506]: NETFILTER_CFG table=nat:88 family=2 entries=30 op=nft_register_rule pid=3506 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:53.582000 audit[3506]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=fffff6b5d3e0 a2=0 a3=1 items=0 ppid=2430 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:53.582000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:53.790300 env[1818]: time="2025-03-17T18:20:53.790230409Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-856d47d645-dl76h,Uid:ceca2420-32d1-4255-8ee4-e3d72202f07e,Namespace:calico-system,Attempt:0,}" Mar 17 18:20:53.833663 env[1818]: time="2025-03-17T18:20:53.833535435Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:20:53.834088 env[1818]: time="2025-03-17T18:20:53.834023179Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:20:53.834281 env[1818]: time="2025-03-17T18:20:53.834222890Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:20:53.834854 env[1818]: time="2025-03-17T18:20:53.834752766Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/459754255025b6d8d2c7bf5b8ed1998db336348ab5733e01d1857a233a5c9989 pid=3553 runtime=io.containerd.runc.v2 Mar 17 18:20:53.888400 systemd[1]: Started cri-containerd-459754255025b6d8d2c7bf5b8ed1998db336348ab5733e01d1857a233a5c9989.scope. Mar 17 18:20:53.903916 systemd[1]: run-containerd-runc-k8s.io-459754255025b6d8d2c7bf5b8ed1998db336348ab5733e01d1857a233a5c9989-runc.y7JjGH.mount: Deactivated successfully. Mar 17 18:20:53.912831 kubelet[2212]: E0317 18:20:53.912649 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:53.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.947000 audit: BPF prog-id=124 op=LOAD Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3553 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:53.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393735343235353032356236643864326337626635623865643139 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3553 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:53.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393735343235353032356236643864326337626635623865643139 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit: BPF prog-id=125 op=LOAD Mar 17 18:20:53.949000 audit[3569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3553 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:53.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393735343235353032356236643864326337626635623865643139 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit: BPF prog-id=126 op=LOAD Mar 17 18:20:53.949000 audit[3569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3553 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:53.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393735343235353032356236643864326337626635623865643139 Mar 17 18:20:53.949000 audit: BPF prog-id=126 op=UNLOAD Mar 17 18:20:53.949000 audit: BPF prog-id=125 op=UNLOAD Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:53.949000 audit: BPF prog-id=127 op=LOAD Mar 17 18:20:53.949000 audit[3569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3553 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:53.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393735343235353032356236643864326337626635623865643139 Mar 17 18:20:53.965082 env[1818]: time="2025-03-17T18:20:53.965011691Z" level=info msg="StopContainer for \"2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c\" with timeout 5 (s)" Mar 17 18:20:53.966913 env[1818]: time="2025-03-17T18:20:53.966140665Z" level=info msg="Stop container \"2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c\" with signal terminated" Mar 17 18:20:54.011217 env[1818]: time="2025-03-17T18:20:54.011160936Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-856d47d645-dl76h,Uid:ceca2420-32d1-4255-8ee4-e3d72202f07e,Namespace:calico-system,Attempt:0,} returns sandbox id \"459754255025b6d8d2c7bf5b8ed1998db336348ab5733e01d1857a233a5c9989\"" Mar 17 18:20:54.014170 systemd[1]: cri-containerd-2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c.scope: Deactivated successfully. Mar 17 18:20:54.014701 systemd[1]: cri-containerd-2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c.scope: Consumed 2.452s CPU time. Mar 17 18:20:54.018730 env[1818]: time="2025-03-17T18:20:54.018656170Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Mar 17 18:20:54.056009 env[1818]: time="2025-03-17T18:20:54.055803258Z" level=info msg="shim disconnected" id=2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c Mar 17 18:20:54.056009 env[1818]: time="2025-03-17T18:20:54.055927155Z" level=warning msg="cleaning up after shim disconnected" id=2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c namespace=k8s.io Mar 17 18:20:54.056009 env[1818]: time="2025-03-17T18:20:54.055950597Z" level=info msg="cleaning up dead shim" Mar 17 18:20:54.071462 env[1818]: time="2025-03-17T18:20:54.071406057Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:20:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3614 runtime=io.containerd.runc.v2\n" Mar 17 18:20:54.767268 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c-rootfs.mount: Deactivated successfully. Mar 17 18:20:54.913869 kubelet[2212]: E0317 18:20:54.913773 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:55.072228 env[1818]: time="2025-03-17T18:20:55.072066789Z" level=info msg="StopContainer for \"2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c\" returns successfully" Mar 17 18:20:55.073522 env[1818]: time="2025-03-17T18:20:55.073473478Z" level=info msg="StopPodSandbox for \"40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef\"" Mar 17 18:20:55.074000 env[1818]: time="2025-03-17T18:20:55.073958415Z" level=info msg="Container to stop \"af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Mar 17 18:20:55.074144 env[1818]: time="2025-03-17T18:20:55.074108561Z" level=info msg="Container to stop \"892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Mar 17 18:20:55.074282 env[1818]: time="2025-03-17T18:20:55.074249117Z" level=info msg="Container to stop \"2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Mar 17 18:20:55.077888 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef-shm.mount: Deactivated successfully. Mar 17 18:20:55.089420 systemd[1]: cri-containerd-40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef.scope: Deactivated successfully. Mar 17 18:20:55.089000 audit: BPF prog-id=67 op=UNLOAD Mar 17 18:20:55.093000 audit: BPF prog-id=70 op=UNLOAD Mar 17 18:20:55.125477 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef-rootfs.mount: Deactivated successfully. Mar 17 18:20:55.130228 env[1818]: time="2025-03-17T18:20:55.130127425Z" level=info msg="shim disconnected" id=40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef Mar 17 18:20:55.130380 env[1818]: time="2025-03-17T18:20:55.130227314Z" level=warning msg="cleaning up after shim disconnected" id=40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef namespace=k8s.io Mar 17 18:20:55.130380 env[1818]: time="2025-03-17T18:20:55.130249796Z" level=info msg="cleaning up dead shim" Mar 17 18:20:55.146705 env[1818]: time="2025-03-17T18:20:55.146642185Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:20:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3645 runtime=io.containerd.runc.v2\n" Mar 17 18:20:55.153198 env[1818]: time="2025-03-17T18:20:55.153133835Z" level=info msg="TearDown network for sandbox \"40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef\" successfully" Mar 17 18:20:55.153198 env[1818]: time="2025-03-17T18:20:55.153192818Z" level=info msg="StopPodSandbox for \"40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef\" returns successfully" Mar 17 18:20:55.239287 kubelet[2212]: I0317 18:20:55.238751 2212 topology_manager.go:215] "Topology Admit Handler" podUID="2e25f947-2e98-4f55-813d-832009dd32a3" podNamespace="calico-system" podName="calico-node-w4nmp" Mar 17 18:20:55.239287 kubelet[2212]: E0317 18:20:55.238881 2212 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="6cc9f538-0833-471a-981c-934995c8722c" containerName="flexvol-driver" Mar 17 18:20:55.239287 kubelet[2212]: E0317 18:20:55.238901 2212 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="6cc9f538-0833-471a-981c-934995c8722c" containerName="install-cni" Mar 17 18:20:55.239287 kubelet[2212]: E0317 18:20:55.238940 2212 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="6cc9f538-0833-471a-981c-934995c8722c" containerName="calico-node" Mar 17 18:20:55.239287 kubelet[2212]: I0317 18:20:55.238985 2212 memory_manager.go:354] "RemoveStaleState removing state" podUID="6cc9f538-0833-471a-981c-934995c8722c" containerName="calico-node" Mar 17 18:20:55.248744 systemd[1]: Created slice kubepods-besteffort-pod2e25f947_2e98_4f55_813d_832009dd32a3.slice. Mar 17 18:20:55.336937 kubelet[2212]: I0317 18:20:55.335976 2212 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-cni-bin-dir\") pod \"6cc9f538-0833-471a-981c-934995c8722c\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " Mar 17 18:20:55.337224 kubelet[2212]: I0317 18:20:55.337192 2212 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-lib-modules\") pod \"6cc9f538-0833-471a-981c-934995c8722c\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " Mar 17 18:20:55.337384 kubelet[2212]: I0317 18:20:55.336207 2212 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "6cc9f538-0833-471a-981c-934995c8722c" (UID: "6cc9f538-0833-471a-981c-934995c8722c"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Mar 17 18:20:55.337474 kubelet[2212]: I0317 18:20:55.337333 2212 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "6cc9f538-0833-471a-981c-934995c8722c" (UID: "6cc9f538-0833-471a-981c-934995c8722c"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Mar 17 18:20:55.337474 kubelet[2212]: I0317 18:20:55.337353 2212 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-flexvol-driver-host\") pod \"6cc9f538-0833-471a-981c-934995c8722c\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " Mar 17 18:20:55.337611 kubelet[2212]: I0317 18:20:55.337512 2212 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-cni-net-dir\") pod \"6cc9f538-0833-471a-981c-934995c8722c\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " Mar 17 18:20:55.337611 kubelet[2212]: I0317 18:20:55.337552 2212 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-xtables-lock\") pod \"6cc9f538-0833-471a-981c-934995c8722c\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " Mar 17 18:20:55.337737 kubelet[2212]: I0317 18:20:55.337611 2212 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-cni-log-dir\") pod \"6cc9f538-0833-471a-981c-934995c8722c\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " Mar 17 18:20:55.337737 kubelet[2212]: I0317 18:20:55.337657 2212 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-gq5bv\" (UniqueName: \"kubernetes.io/projected/6cc9f538-0833-471a-981c-934995c8722c-kube-api-access-gq5bv\") pod \"6cc9f538-0833-471a-981c-934995c8722c\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " Mar 17 18:20:55.337737 kubelet[2212]: I0317 18:20:55.337718 2212 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-var-lib-calico\") pod \"6cc9f538-0833-471a-981c-934995c8722c\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " Mar 17 18:20:55.337944 kubelet[2212]: I0317 18:20:55.337784 2212 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6cc9f538-0833-471a-981c-934995c8722c-tigera-ca-bundle\") pod \"6cc9f538-0833-471a-981c-934995c8722c\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " Mar 17 18:20:55.337944 kubelet[2212]: I0317 18:20:55.337852 2212 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-policysync\") pod \"6cc9f538-0833-471a-981c-934995c8722c\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " Mar 17 18:20:55.337944 kubelet[2212]: I0317 18:20:55.337895 2212 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6cc9f538-0833-471a-981c-934995c8722c-node-certs\") pod \"6cc9f538-0833-471a-981c-934995c8722c\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " Mar 17 18:20:55.338128 kubelet[2212]: I0317 18:20:55.337953 2212 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-var-run-calico\") pod \"6cc9f538-0833-471a-981c-934995c8722c\" (UID: \"6cc9f538-0833-471a-981c-934995c8722c\") " Mar 17 18:20:55.338128 kubelet[2212]: I0317 18:20:55.338043 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/2e25f947-2e98-4f55-813d-832009dd32a3-cni-log-dir\") pod \"calico-node-w4nmp\" (UID: \"2e25f947-2e98-4f55-813d-832009dd32a3\") " pod="calico-system/calico-node-w4nmp" Mar 17 18:20:55.338128 kubelet[2212]: I0317 18:20:55.338110 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5ng9m\" (UniqueName: \"kubernetes.io/projected/2e25f947-2e98-4f55-813d-832009dd32a3-kube-api-access-5ng9m\") pod \"calico-node-w4nmp\" (UID: \"2e25f947-2e98-4f55-813d-832009dd32a3\") " pod="calico-system/calico-node-w4nmp" Mar 17 18:20:55.338308 kubelet[2212]: I0317 18:20:55.338151 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2e25f947-2e98-4f55-813d-832009dd32a3-xtables-lock\") pod \"calico-node-w4nmp\" (UID: \"2e25f947-2e98-4f55-813d-832009dd32a3\") " pod="calico-system/calico-node-w4nmp" Mar 17 18:20:55.338308 kubelet[2212]: I0317 18:20:55.338227 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2e25f947-2e98-4f55-813d-832009dd32a3-tigera-ca-bundle\") pod \"calico-node-w4nmp\" (UID: \"2e25f947-2e98-4f55-813d-832009dd32a3\") " pod="calico-system/calico-node-w4nmp" Mar 17 18:20:55.338425 kubelet[2212]: I0317 18:20:55.338302 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/2e25f947-2e98-4f55-813d-832009dd32a3-var-run-calico\") pod \"calico-node-w4nmp\" (UID: \"2e25f947-2e98-4f55-813d-832009dd32a3\") " pod="calico-system/calico-node-w4nmp" Mar 17 18:20:55.338425 kubelet[2212]: I0317 18:20:55.338339 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/2e25f947-2e98-4f55-813d-832009dd32a3-cni-bin-dir\") pod \"calico-node-w4nmp\" (UID: \"2e25f947-2e98-4f55-813d-832009dd32a3\") " pod="calico-system/calico-node-w4nmp" Mar 17 18:20:55.338425 kubelet[2212]: I0317 18:20:55.338405 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2e25f947-2e98-4f55-813d-832009dd32a3-lib-modules\") pod \"calico-node-w4nmp\" (UID: \"2e25f947-2e98-4f55-813d-832009dd32a3\") " pod="calico-system/calico-node-w4nmp" Mar 17 18:20:55.338607 kubelet[2212]: I0317 18:20:55.338467 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/2e25f947-2e98-4f55-813d-832009dd32a3-policysync\") pod \"calico-node-w4nmp\" (UID: \"2e25f947-2e98-4f55-813d-832009dd32a3\") " pod="calico-system/calico-node-w4nmp" Mar 17 18:20:55.338607 kubelet[2212]: I0317 18:20:55.338508 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/2e25f947-2e98-4f55-813d-832009dd32a3-cni-net-dir\") pod \"calico-node-w4nmp\" (UID: \"2e25f947-2e98-4f55-813d-832009dd32a3\") " pod="calico-system/calico-node-w4nmp" Mar 17 18:20:55.338607 kubelet[2212]: I0317 18:20:55.338572 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/2e25f947-2e98-4f55-813d-832009dd32a3-flexvol-driver-host\") pod \"calico-node-w4nmp\" (UID: \"2e25f947-2e98-4f55-813d-832009dd32a3\") " pod="calico-system/calico-node-w4nmp" Mar 17 18:20:55.338771 kubelet[2212]: I0317 18:20:55.338650 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/2e25f947-2e98-4f55-813d-832009dd32a3-node-certs\") pod \"calico-node-w4nmp\" (UID: \"2e25f947-2e98-4f55-813d-832009dd32a3\") " pod="calico-system/calico-node-w4nmp" Mar 17 18:20:55.338771 kubelet[2212]: I0317 18:20:55.338721 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2e25f947-2e98-4f55-813d-832009dd32a3-var-lib-calico\") pod \"calico-node-w4nmp\" (UID: \"2e25f947-2e98-4f55-813d-832009dd32a3\") " pod="calico-system/calico-node-w4nmp" Mar 17 18:20:55.338771 kubelet[2212]: I0317 18:20:55.338762 2212 reconciler_common.go:289] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-cni-bin-dir\") on node \"172.31.22.27\" DevicePath \"\"" Mar 17 18:20:55.339059 kubelet[2212]: I0317 18:20:55.338830 2212 reconciler_common.go:289] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-lib-modules\") on node \"172.31.22.27\" DevicePath \"\"" Mar 17 18:20:55.339059 kubelet[2212]: I0317 18:20:55.338936 2212 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "6cc9f538-0833-471a-981c-934995c8722c" (UID: "6cc9f538-0833-471a-981c-934995c8722c"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Mar 17 18:20:55.339059 kubelet[2212]: I0317 18:20:55.339009 2212 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "6cc9f538-0833-471a-981c-934995c8722c" (UID: "6cc9f538-0833-471a-981c-934995c8722c"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Mar 17 18:20:55.339239 kubelet[2212]: I0317 18:20:55.339075 2212 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "6cc9f538-0833-471a-981c-934995c8722c" (UID: "6cc9f538-0833-471a-981c-934995c8722c"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Mar 17 18:20:55.339390 kubelet[2212]: I0317 18:20:55.339357 2212 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "6cc9f538-0833-471a-981c-934995c8722c" (UID: "6cc9f538-0833-471a-981c-934995c8722c"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Mar 17 18:20:55.339570 kubelet[2212]: I0317 18:20:55.339542 2212 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "6cc9f538-0833-471a-981c-934995c8722c" (UID: "6cc9f538-0833-471a-981c-934995c8722c"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Mar 17 18:20:55.340445 kubelet[2212]: I0317 18:20:55.340404 2212 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "6cc9f538-0833-471a-981c-934995c8722c" (UID: "6cc9f538-0833-471a-981c-934995c8722c"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Mar 17 18:20:55.340633 kubelet[2212]: I0317 18:20:55.340488 2212 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-policysync" (OuterVolumeSpecName: "policysync") pod "6cc9f538-0833-471a-981c-934995c8722c" (UID: "6cc9f538-0833-471a-981c-934995c8722c"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Mar 17 18:20:55.347858 systemd[1]: var-lib-kubelet-pods-6cc9f538\x2d0833\x2d471a\x2d981c\x2d934995c8722c-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. Mar 17 18:20:55.354509 kubelet[2212]: I0317 18:20:55.354456 2212 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/6cc9f538-0833-471a-981c-934995c8722c-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "6cc9f538-0833-471a-981c-934995c8722c" (UID: "6cc9f538-0833-471a-981c-934995c8722c"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Mar 17 18:20:55.357754 systemd[1]: var-lib-kubelet-pods-6cc9f538\x2d0833\x2d471a\x2d981c\x2d934995c8722c-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dgq5bv.mount: Deactivated successfully. Mar 17 18:20:55.359891 kubelet[2212]: I0317 18:20:55.358068 2212 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/6cc9f538-0833-471a-981c-934995c8722c-node-certs" (OuterVolumeSpecName: "node-certs") pod "6cc9f538-0833-471a-981c-934995c8722c" (UID: "6cc9f538-0833-471a-981c-934995c8722c"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Mar 17 18:20:55.358040 systemd[1]: var-lib-kubelet-pods-6cc9f538\x2d0833\x2d471a\x2d981c\x2d934995c8722c-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Mar 17 18:20:55.360737 kubelet[2212]: I0317 18:20:55.360689 2212 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/6cc9f538-0833-471a-981c-934995c8722c-kube-api-access-gq5bv" (OuterVolumeSpecName: "kube-api-access-gq5bv") pod "6cc9f538-0833-471a-981c-934995c8722c" (UID: "6cc9f538-0833-471a-981c-934995c8722c"). InnerVolumeSpecName "kube-api-access-gq5bv". PluginName "kubernetes.io/projected", VolumeGidValue "" Mar 17 18:20:55.382140 kubelet[2212]: I0317 18:20:55.382099 2212 scope.go:117] "RemoveContainer" containerID="2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c" Mar 17 18:20:55.387330 env[1818]: time="2025-03-17T18:20:55.387261423Z" level=info msg="RemoveContainer for \"2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c\"" Mar 17 18:20:55.391933 env[1818]: time="2025-03-17T18:20:55.391472355Z" level=info msg="RemoveContainer for \"2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c\" returns successfully" Mar 17 18:20:55.392693 kubelet[2212]: I0317 18:20:55.392626 2212 scope.go:117] "RemoveContainer" containerID="892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971" Mar 17 18:20:55.396322 env[1818]: time="2025-03-17T18:20:55.395964051Z" level=info msg="RemoveContainer for \"892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971\"" Mar 17 18:20:55.400554 systemd[1]: Removed slice kubepods-besteffort-pod6cc9f538_0833_471a_981c_934995c8722c.slice. Mar 17 18:20:55.400757 systemd[1]: kubepods-besteffort-pod6cc9f538_0833_471a_981c_934995c8722c.slice: Consumed 3.541s CPU time. Mar 17 18:20:55.407488 env[1818]: time="2025-03-17T18:20:55.407155086Z" level=info msg="RemoveContainer for \"892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971\" returns successfully" Mar 17 18:20:55.412240 kubelet[2212]: I0317 18:20:55.412188 2212 scope.go:117] "RemoveContainer" containerID="af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc" Mar 17 18:20:55.415302 env[1818]: time="2025-03-17T18:20:55.415236243Z" level=info msg="RemoveContainer for \"af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc\"" Mar 17 18:20:55.419451 env[1818]: time="2025-03-17T18:20:55.419376201Z" level=info msg="RemoveContainer for \"af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc\" returns successfully" Mar 17 18:20:55.419765 kubelet[2212]: I0317 18:20:55.419705 2212 scope.go:117] "RemoveContainer" containerID="2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c" Mar 17 18:20:55.420224 env[1818]: time="2025-03-17T18:20:55.420085247Z" level=error msg="ContainerStatus for \"2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c\": not found" Mar 17 18:20:55.420674 kubelet[2212]: E0317 18:20:55.420631 2212 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c\": not found" containerID="2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c" Mar 17 18:20:55.420786 kubelet[2212]: I0317 18:20:55.420688 2212 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c"} err="failed to get container status \"2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c\": rpc error: code = NotFound desc = an error occurred when try to find container \"2abba688fc4a2e6862a4a026cd42afb8622c282c73e66461197f3c8c595e8d0c\": not found" Mar 17 18:20:55.420786 kubelet[2212]: I0317 18:20:55.420732 2212 scope.go:117] "RemoveContainer" containerID="892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971" Mar 17 18:20:55.421153 env[1818]: time="2025-03-17T18:20:55.421061854Z" level=error msg="ContainerStatus for \"892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971\": not found" Mar 17 18:20:55.421404 kubelet[2212]: E0317 18:20:55.421371 2212 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971\": not found" containerID="892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971" Mar 17 18:20:55.421569 kubelet[2212]: I0317 18:20:55.421533 2212 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971"} err="failed to get container status \"892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971\": rpc error: code = NotFound desc = an error occurred when try to find container \"892c2e0feae4d6526da1d11fd3d72d4e0656dd4bf8b8c10eb3a8ff9b0640f971\": not found" Mar 17 18:20:55.421717 kubelet[2212]: I0317 18:20:55.421694 2212 scope.go:117] "RemoveContainer" containerID="af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc" Mar 17 18:20:55.422287 env[1818]: time="2025-03-17T18:20:55.422187935Z" level=error msg="ContainerStatus for \"af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc\": not found" Mar 17 18:20:55.422476 kubelet[2212]: E0317 18:20:55.422427 2212 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc\": not found" containerID="af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc" Mar 17 18:20:55.422603 kubelet[2212]: I0317 18:20:55.422484 2212 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc"} err="failed to get container status \"af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc\": rpc error: code = NotFound desc = an error occurred when try to find container \"af7eb417d2c0a16f90476bb690db472ad70b164000e0a33bd6506467175491cc\": not found" Mar 17 18:20:55.441243 kubelet[2212]: I0317 18:20:55.441176 2212 reconciler_common.go:289] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6cc9f538-0833-471a-981c-934995c8722c-node-certs\") on node \"172.31.22.27\" DevicePath \"\"" Mar 17 18:20:55.441243 kubelet[2212]: I0317 18:20:55.441230 2212 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-gq5bv\" (UniqueName: \"kubernetes.io/projected/6cc9f538-0833-471a-981c-934995c8722c-kube-api-access-gq5bv\") on node \"172.31.22.27\" DevicePath \"\"" Mar 17 18:20:55.441479 kubelet[2212]: I0317 18:20:55.441256 2212 reconciler_common.go:289] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-flexvol-driver-host\") on node \"172.31.22.27\" DevicePath \"\"" Mar 17 18:20:55.441479 kubelet[2212]: I0317 18:20:55.441278 2212 reconciler_common.go:289] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-xtables-lock\") on node \"172.31.22.27\" DevicePath \"\"" Mar 17 18:20:55.441479 kubelet[2212]: I0317 18:20:55.441298 2212 reconciler_common.go:289] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-cni-log-dir\") on node \"172.31.22.27\" DevicePath \"\"" Mar 17 18:20:55.441479 kubelet[2212]: I0317 18:20:55.441317 2212 reconciler_common.go:289] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-policysync\") on node \"172.31.22.27\" DevicePath \"\"" Mar 17 18:20:55.441479 kubelet[2212]: I0317 18:20:55.441337 2212 reconciler_common.go:289] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-var-run-calico\") on node \"172.31.22.27\" DevicePath \"\"" Mar 17 18:20:55.441479 kubelet[2212]: I0317 18:20:55.441358 2212 reconciler_common.go:289] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-var-lib-calico\") on node \"172.31.22.27\" DevicePath \"\"" Mar 17 18:20:55.441479 kubelet[2212]: I0317 18:20:55.441377 2212 reconciler_common.go:289] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6cc9f538-0833-471a-981c-934995c8722c-cni-net-dir\") on node \"172.31.22.27\" DevicePath \"\"" Mar 17 18:20:55.441479 kubelet[2212]: I0317 18:20:55.441397 2212 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6cc9f538-0833-471a-981c-934995c8722c-tigera-ca-bundle\") on node \"172.31.22.27\" DevicePath \"\"" Mar 17 18:20:55.554335 env[1818]: time="2025-03-17T18:20:55.554260205Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-w4nmp,Uid:2e25f947-2e98-4f55-813d-832009dd32a3,Namespace:calico-system,Attempt:0,}" Mar 17 18:20:55.620840 env[1818]: time="2025-03-17T18:20:55.617320387Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:20:55.620840 env[1818]: time="2025-03-17T18:20:55.617654396Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:20:55.620840 env[1818]: time="2025-03-17T18:20:55.617689169Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:20:55.620840 env[1818]: time="2025-03-17T18:20:55.618042900Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/de1296700d1a54d98b24cac9215707059a7fa89ce4c6961638b5411f461c485f pid=3671 runtime=io.containerd.runc.v2 Mar 17 18:20:55.664260 systemd[1]: Started cri-containerd-de1296700d1a54d98b24cac9215707059a7fa89ce4c6961638b5411f461c485f.scope. Mar 17 18:20:55.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.696000 audit: BPF prog-id=128 op=LOAD Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit[3681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3671 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:55.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465313239363730306431613534643938623234636163393231353730 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit[3681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3671 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:55.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465313239363730306431613534643938623234636163393231353730 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit: BPF prog-id=129 op=LOAD Mar 17 18:20:55.697000 audit[3681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3671 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:55.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465313239363730306431613534643938623234636163393231353730 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.697000 audit: BPF prog-id=130 op=LOAD Mar 17 18:20:55.697000 audit[3681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3671 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:55.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465313239363730306431613534643938623234636163393231353730 Mar 17 18:20:55.698000 audit: BPF prog-id=130 op=UNLOAD Mar 17 18:20:55.698000 audit: BPF prog-id=129 op=UNLOAD Mar 17 18:20:55.698000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.698000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.698000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.698000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.698000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.698000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.698000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.698000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.698000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.698000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.698000 audit: BPF prog-id=131 op=LOAD Mar 17 18:20:55.698000 audit[3681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3671 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:55.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465313239363730306431613534643938623234636163393231353730 Mar 17 18:20:55.729255 env[1818]: time="2025-03-17T18:20:55.729197728Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-w4nmp,Uid:2e25f947-2e98-4f55-813d-832009dd32a3,Namespace:calico-system,Attempt:0,} returns sandbox id \"de1296700d1a54d98b24cac9215707059a7fa89ce4c6961638b5411f461c485f\"" Mar 17 18:20:55.734201 env[1818]: time="2025-03-17T18:20:55.734146370Z" level=info msg="CreateContainer within sandbox \"de1296700d1a54d98b24cac9215707059a7fa89ce4c6961638b5411f461c485f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Mar 17 18:20:55.785017 env[1818]: time="2025-03-17T18:20:55.784949415Z" level=info msg="CreateContainer within sandbox \"de1296700d1a54d98b24cac9215707059a7fa89ce4c6961638b5411f461c485f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"801fe12eeb1bf7f32c0683db7d21be4106006edcd235a4a5f84f25bf3a45e73c\"" Mar 17 18:20:55.786135 env[1818]: time="2025-03-17T18:20:55.786065377Z" level=info msg="StartContainer for \"801fe12eeb1bf7f32c0683db7d21be4106006edcd235a4a5f84f25bf3a45e73c\"" Mar 17 18:20:55.838165 systemd[1]: run-containerd-runc-k8s.io-801fe12eeb1bf7f32c0683db7d21be4106006edcd235a4a5f84f25bf3a45e73c-runc.mPcyBx.mount: Deactivated successfully. Mar 17 18:20:55.845278 systemd[1]: Started cri-containerd-801fe12eeb1bf7f32c0683db7d21be4106006edcd235a4a5f84f25bf3a45e73c.scope. Mar 17 18:20:55.882000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.882000 audit[3710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3671 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:55.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830316665313265656231626637663332633036383364623764323162 Mar 17 18:20:55.885000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.885000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.885000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.885000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.885000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.885000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.885000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.885000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.885000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.885000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.885000 audit: BPF prog-id=132 op=LOAD Mar 17 18:20:55.885000 audit[3710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3671 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:55.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830316665313265656231626637663332633036383364623764323162 Mar 17 18:20:55.886000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.886000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.886000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.886000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.886000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.886000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.886000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.886000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.886000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.886000 audit: BPF prog-id=133 op=LOAD Mar 17 18:20:55.886000 audit[3710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3671 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:55.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830316665313265656231626637663332633036383364623764323162 Mar 17 18:20:55.888000 audit: BPF prog-id=133 op=UNLOAD Mar 17 18:20:55.888000 audit: BPF prog-id=132 op=UNLOAD Mar 17 18:20:55.888000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.888000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.888000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.888000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.888000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.888000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.888000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.888000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.888000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.888000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:55.888000 audit: BPF prog-id=134 op=LOAD Mar 17 18:20:55.888000 audit[3710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3671 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:55.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830316665313265656231626637663332633036383364623764323162 Mar 17 18:20:55.914920 kubelet[2212]: E0317 18:20:55.914740 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:55.921541 env[1818]: time="2025-03-17T18:20:55.921478644Z" level=info msg="StartContainer for \"801fe12eeb1bf7f32c0683db7d21be4106006edcd235a4a5f84f25bf3a45e73c\" returns successfully" Mar 17 18:20:55.961274 systemd[1]: cri-containerd-801fe12eeb1bf7f32c0683db7d21be4106006edcd235a4a5f84f25bf3a45e73c.scope: Deactivated successfully. Mar 17 18:20:55.964000 audit: BPF prog-id=134 op=UNLOAD Mar 17 18:20:56.023927 env[1818]: time="2025-03-17T18:20:56.023850280Z" level=info msg="shim disconnected" id=801fe12eeb1bf7f32c0683db7d21be4106006edcd235a4a5f84f25bf3a45e73c Mar 17 18:20:56.024368 env[1818]: time="2025-03-17T18:20:56.024322669Z" level=warning msg="cleaning up after shim disconnected" id=801fe12eeb1bf7f32c0683db7d21be4106006edcd235a4a5f84f25bf3a45e73c namespace=k8s.io Mar 17 18:20:56.024515 env[1818]: time="2025-03-17T18:20:56.024487458Z" level=info msg="cleaning up dead shim" Mar 17 18:20:56.048984 env[1818]: time="2025-03-17T18:20:56.048928403Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:20:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3749 runtime=io.containerd.runc.v2\n" Mar 17 18:20:56.211102 kubelet[2212]: I0317 18:20:56.211045 2212 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="6cc9f538-0833-471a-981c-934995c8722c" path="/var/lib/kubelet/pods/6cc9f538-0833-471a-981c-934995c8722c/volumes" Mar 17 18:20:56.390106 env[1818]: time="2025-03-17T18:20:56.390017004Z" level=info msg="CreateContainer within sandbox \"de1296700d1a54d98b24cac9215707059a7fa89ce4c6961638b5411f461c485f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Mar 17 18:20:56.418081 env[1818]: time="2025-03-17T18:20:56.418005388Z" level=info msg="CreateContainer within sandbox \"de1296700d1a54d98b24cac9215707059a7fa89ce4c6961638b5411f461c485f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"3fe2b6e45655b196ea0b195585f316ece385b66a504fbe0be3e9ef975bdf8916\"" Mar 17 18:20:56.419111 env[1818]: time="2025-03-17T18:20:56.419051806Z" level=info msg="StartContainer for \"3fe2b6e45655b196ea0b195585f316ece385b66a504fbe0be3e9ef975bdf8916\"" Mar 17 18:20:56.469021 systemd[1]: Started cri-containerd-3fe2b6e45655b196ea0b195585f316ece385b66a504fbe0be3e9ef975bdf8916.scope. Mar 17 18:20:56.503000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.503000 audit[3769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3671 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:56.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653262366534353635356231393665613062313935353835663331 Mar 17 18:20:56.504000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.504000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.504000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.504000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.504000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.504000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.504000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.504000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.504000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.504000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.504000 audit: BPF prog-id=135 op=LOAD Mar 17 18:20:56.504000 audit[3769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3671 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:56.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653262366534353635356231393665613062313935353835663331 Mar 17 18:20:56.504000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.504000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.504000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.504000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.504000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.504000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.504000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.504000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.504000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.504000 audit: BPF prog-id=136 op=LOAD Mar 17 18:20:56.504000 audit[3769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3671 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:56.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653262366534353635356231393665613062313935353835663331 Mar 17 18:20:56.504000 audit: BPF prog-id=136 op=UNLOAD Mar 17 18:20:56.504000 audit: BPF prog-id=135 op=UNLOAD Mar 17 18:20:56.505000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.505000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.505000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.505000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.505000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.505000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.505000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.505000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.505000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.505000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:56.505000 audit: BPF prog-id=137 op=LOAD Mar 17 18:20:56.505000 audit[3769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3671 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:56.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653262366534353635356231393665613062313935353835663331 Mar 17 18:20:56.533703 env[1818]: time="2025-03-17T18:20:56.533603890Z" level=info msg="StartContainer for \"3fe2b6e45655b196ea0b195585f316ece385b66a504fbe0be3e9ef975bdf8916\" returns successfully" Mar 17 18:20:56.768785 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-801fe12eeb1bf7f32c0683db7d21be4106006edcd235a4a5f84f25bf3a45e73c-rootfs.mount: Deactivated successfully. Mar 17 18:20:56.915165 kubelet[2212]: E0317 18:20:56.915107 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:56.967950 env[1818]: time="2025-03-17T18:20:56.967877862Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:56.973942 env[1818]: time="2025-03-17T18:20:56.973808826Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d1fc316829ae1650b0b1629b54232520f297e7c3b1444eecd290ae088902a28,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:56.983099 env[1818]: time="2025-03-17T18:20:56.983023655Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:56.989090 env[1818]: time="2025-03-17T18:20:56.989021390Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:20:56.992879 env[1818]: time="2025-03-17T18:20:56.991921798Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:1d1fc316829ae1650b0b1629b54232520f297e7c3b1444eecd290ae088902a28\"" Mar 17 18:20:57.026526 env[1818]: time="2025-03-17T18:20:57.026359054Z" level=info msg="CreateContainer within sandbox \"459754255025b6d8d2c7bf5b8ed1998db336348ab5733e01d1857a233a5c9989\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Mar 17 18:20:57.053235 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount71051319.mount: Deactivated successfully. Mar 17 18:20:57.055272 env[1818]: time="2025-03-17T18:20:57.055163193Z" level=info msg="CreateContainer within sandbox \"459754255025b6d8d2c7bf5b8ed1998db336348ab5733e01d1857a233a5c9989\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"669b4912022241547454926d6bfd1fd56a16ab96d92a3800694aa5e695ad3e6b\"" Mar 17 18:20:57.056804 env[1818]: time="2025-03-17T18:20:57.056590692Z" level=info msg="StartContainer for \"669b4912022241547454926d6bfd1fd56a16ab96d92a3800694aa5e695ad3e6b\"" Mar 17 18:20:57.102058 systemd[1]: Started cri-containerd-669b4912022241547454926d6bfd1fd56a16ab96d92a3800694aa5e695ad3e6b.scope. Mar 17 18:20:57.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.137000 audit: BPF prog-id=138 op=LOAD Mar 17 18:20:57.139000 audit[3811]: AVC avc: denied { bpf } for pid=3811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.139000 audit[3811]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3553 pid=3811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:57.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636396234393132303232323431353437343534393236643662666431 Mar 17 18:20:57.140000 audit[3811]: AVC avc: denied { perfmon } for pid=3811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.140000 audit[3811]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3553 pid=3811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:57.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636396234393132303232323431353437343534393236643662666431 Mar 17 18:20:57.140000 audit[3811]: AVC avc: denied { bpf } for pid=3811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.140000 audit[3811]: AVC avc: denied { bpf } for pid=3811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.140000 audit[3811]: AVC avc: denied { bpf } for pid=3811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.140000 audit[3811]: AVC avc: denied { perfmon } for pid=3811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.140000 audit[3811]: AVC avc: denied { perfmon } for pid=3811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.140000 audit[3811]: AVC avc: denied { perfmon } for pid=3811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.140000 audit[3811]: AVC avc: denied { perfmon } for pid=3811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.140000 audit[3811]: AVC avc: denied { perfmon } for pid=3811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.140000 audit[3811]: AVC avc: denied { bpf } for pid=3811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.140000 audit[3811]: AVC avc: denied { bpf } for pid=3811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.140000 audit: BPF prog-id=139 op=LOAD Mar 17 18:20:57.140000 audit[3811]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3553 pid=3811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:57.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636396234393132303232323431353437343534393236643662666431 Mar 17 18:20:57.142000 audit[3811]: AVC avc: denied { bpf } for pid=3811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.142000 audit[3811]: AVC avc: denied { bpf } for pid=3811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.142000 audit[3811]: AVC avc: denied { perfmon } for pid=3811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.142000 audit[3811]: AVC avc: denied { perfmon } for pid=3811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.142000 audit[3811]: AVC avc: denied { perfmon } for pid=3811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.142000 audit[3811]: AVC avc: denied { perfmon } for pid=3811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.142000 audit[3811]: AVC avc: denied { perfmon } for pid=3811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.142000 audit[3811]: AVC avc: denied { bpf } for pid=3811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.142000 audit[3811]: AVC avc: denied { bpf } for pid=3811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.142000 audit: BPF prog-id=140 op=LOAD Mar 17 18:20:57.142000 audit[3811]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3553 pid=3811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:57.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636396234393132303232323431353437343534393236643662666431 Mar 17 18:20:57.143000 audit: BPF prog-id=140 op=UNLOAD Mar 17 18:20:57.143000 audit: BPF prog-id=139 op=UNLOAD Mar 17 18:20:57.144000 audit[3811]: AVC avc: denied { bpf } for pid=3811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.144000 audit[3811]: AVC avc: denied { bpf } for pid=3811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.144000 audit[3811]: AVC avc: denied { bpf } for pid=3811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.144000 audit[3811]: AVC avc: denied { perfmon } for pid=3811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.144000 audit[3811]: AVC avc: denied { perfmon } for pid=3811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.144000 audit[3811]: AVC avc: denied { perfmon } for pid=3811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.144000 audit[3811]: AVC avc: denied { perfmon } for pid=3811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.144000 audit[3811]: AVC avc: denied { perfmon } for pid=3811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.144000 audit[3811]: AVC avc: denied { bpf } for pid=3811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.144000 audit[3811]: AVC avc: denied { bpf } for pid=3811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:57.144000 audit: BPF prog-id=141 op=LOAD Mar 17 18:20:57.144000 audit[3811]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3553 pid=3811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:57.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636396234393132303232323431353437343534393236643662666431 Mar 17 18:20:57.200702 env[1818]: time="2025-03-17T18:20:57.200624199Z" level=info msg="StartContainer for \"669b4912022241547454926d6bfd1fd56a16ab96d92a3800694aa5e695ad3e6b\" returns successfully" Mar 17 18:20:57.445319 kubelet[2212]: I0317 18:20:57.445116 2212 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-856d47d645-dl76h" podStartSLOduration=1.4690822319999999 podStartE2EDuration="4.445071425s" podCreationTimestamp="2025-03-17 18:20:53 +0000 UTC" firstStartedPulling="2025-03-17 18:20:54.017065901 +0000 UTC m=+43.042677189" lastFinishedPulling="2025-03-17 18:20:56.993055118 +0000 UTC m=+46.018666382" observedRunningTime="2025-03-17 18:20:57.416592131 +0000 UTC m=+46.442203443" watchObservedRunningTime="2025-03-17 18:20:57.445071425 +0000 UTC m=+46.470682701" Mar 17 18:20:57.846596 systemd[1]: cri-containerd-3fe2b6e45655b196ea0b195585f316ece385b66a504fbe0be3e9ef975bdf8916.scope: Deactivated successfully. Mar 17 18:20:57.847056 systemd[1]: cri-containerd-3fe2b6e45655b196ea0b195585f316ece385b66a504fbe0be3e9ef975bdf8916.scope: Consumed 1.283s CPU time. Mar 17 18:20:57.852000 audit: BPF prog-id=137 op=UNLOAD Mar 17 18:20:57.882671 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3fe2b6e45655b196ea0b195585f316ece385b66a504fbe0be3e9ef975bdf8916-rootfs.mount: Deactivated successfully. Mar 17 18:20:57.916411 kubelet[2212]: E0317 18:20:57.916280 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:57.999518 env[1818]: time="2025-03-17T18:20:57.999441654Z" level=info msg="shim disconnected" id=3fe2b6e45655b196ea0b195585f316ece385b66a504fbe0be3e9ef975bdf8916 Mar 17 18:20:58.000243 env[1818]: time="2025-03-17T18:20:57.999516984Z" level=warning msg="cleaning up after shim disconnected" id=3fe2b6e45655b196ea0b195585f316ece385b66a504fbe0be3e9ef975bdf8916 namespace=k8s.io Mar 17 18:20:58.000243 env[1818]: time="2025-03-17T18:20:57.999541470Z" level=info msg="cleaning up dead shim" Mar 17 18:20:58.012700 env[1818]: time="2025-03-17T18:20:58.012623826Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:20:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3851 runtime=io.containerd.runc.v2\n" Mar 17 18:20:58.441423 env[1818]: time="2025-03-17T18:20:58.441359943Z" level=info msg="CreateContainer within sandbox \"de1296700d1a54d98b24cac9215707059a7fa89ce4c6961638b5411f461c485f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Mar 17 18:20:58.467157 env[1818]: time="2025-03-17T18:20:58.467061483Z" level=info msg="CreateContainer within sandbox \"de1296700d1a54d98b24cac9215707059a7fa89ce4c6961638b5411f461c485f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"d94677b419a8e848e500a0a10b9e5f2162ffc7722f79e98f08a788e19278ea5b\"" Mar 17 18:20:58.469677 env[1818]: time="2025-03-17T18:20:58.469597892Z" level=info msg="StartContainer for \"d94677b419a8e848e500a0a10b9e5f2162ffc7722f79e98f08a788e19278ea5b\"" Mar 17 18:20:58.500319 systemd[1]: Started cri-containerd-d94677b419a8e848e500a0a10b9e5f2162ffc7722f79e98f08a788e19278ea5b.scope. Mar 17 18:20:58.533559 kernel: kauditd_printk_skb: 320 callbacks suppressed Mar 17 18:20:58.533736 kernel: audit: type=1325 audit(1742235658.525:834): table=filter:89 family=2 entries=8 op=nft_register_rule pid=3887 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:58.525000 audit[3887]: NETFILTER_CFG table=filter:89 family=2 entries=8 op=nft_register_rule pid=3887 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:58.525000 audit[3887]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd23451c0 a2=0 a3=1 items=0 ppid=2430 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:58.547122 kernel: audit: type=1300 audit(1742235658.525:834): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd23451c0 a2=0 a3=1 items=0 ppid=2430 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:58.554954 kernel: audit: type=1327 audit(1742235658.525:834): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:58.525000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:58.553000 audit[3887]: NETFILTER_CFG table=nat:90 family=2 entries=32 op=nft_register_chain pid=3887 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:58.560606 kernel: audit: type=1325 audit(1742235658.553:835): table=nat:90 family=2 entries=32 op=nft_register_chain pid=3887 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:58.553000 audit[3887]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9476 a0=3 a1=ffffd23451c0 a2=0 a3=1 items=0 ppid=2430 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:58.553000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:58.576780 kernel: audit: type=1300 audit(1742235658.553:835): arch=c00000b7 syscall=211 success=yes exit=9476 a0=3 a1=ffffd23451c0 a2=0 a3=1 items=0 ppid=2430 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:58.576917 kernel: audit: type=1327 audit(1742235658.553:835): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.588847 kernel: audit: type=1400 audit(1742235658.580:836): avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3671 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:58.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439343637376234313961386538343865353030613061313062396535 Mar 17 18:20:58.610055 kernel: audit: type=1300 audit(1742235658.580:836): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3671 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:58.610190 kernel: audit: type=1327 audit(1742235658.580:836): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439343637376234313961386538343865353030613061313062396535 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.617170 kernel: audit: type=1400 audit(1742235658.580:837): avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit: BPF prog-id=142 op=LOAD Mar 17 18:20:58.580000 audit[3876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3671 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:58.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439343637376234313961386538343865353030613061313062396535 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit: BPF prog-id=143 op=LOAD Mar 17 18:20:58.580000 audit[3876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3671 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:58.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439343637376234313961386538343865353030613061313062396535 Mar 17 18:20:58.580000 audit: BPF prog-id=143 op=UNLOAD Mar 17 18:20:58.580000 audit: BPF prog-id=142 op=UNLOAD Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:20:58.580000 audit: BPF prog-id=144 op=LOAD Mar 17 18:20:58.580000 audit[3876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3671 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:58.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439343637376234313961386538343865353030613061313062396535 Mar 17 18:20:58.638755 env[1818]: time="2025-03-17T18:20:58.638003263Z" level=info msg="StartContainer for \"d94677b419a8e848e500a0a10b9e5f2162ffc7722f79e98f08a788e19278ea5b\" returns successfully" Mar 17 18:20:58.660000 audit[3910]: NETFILTER_CFG table=filter:91 family=2 entries=8 op=nft_register_rule pid=3910 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:58.660000 audit[3910]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff59c0040 a2=0 a3=1 items=0 ppid=2430 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:58.660000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:58.667000 audit[3910]: NETFILTER_CFG table=nat:92 family=2 entries=30 op=nft_register_rule pid=3910 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:20:58.667000 audit[3910]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=fffff59c0040 a2=0 a3=1 items=0 ppid=2430 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:20:58.667000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:20:58.769743 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount448363723.mount: Deactivated successfully. Mar 17 18:20:58.916968 kubelet[2212]: E0317 18:20:58.916909 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:20:59.449609 systemd[1]: run-containerd-runc-k8s.io-d94677b419a8e848e500a0a10b9e5f2162ffc7722f79e98f08a788e19278ea5b-runc.lMqXxL.mount: Deactivated successfully. Mar 17 18:20:59.450959 kubelet[2212]: I0317 18:20:59.450124 2212 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-w4nmp" podStartSLOduration=4.450101606 podStartE2EDuration="4.450101606s" podCreationTimestamp="2025-03-17 18:20:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 18:20:59.449245769 +0000 UTC m=+48.474857069" watchObservedRunningTime="2025-03-17 18:20:59.450101606 +0000 UTC m=+48.475712894" Mar 17 18:20:59.917177 kubelet[2212]: E0317 18:20:59.917103 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:00.180000 audit[4001]: AVC avc: denied { write } for pid=4001 comm="tee" name="fd" dev="proc" ino=19741 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:21:00.183000 audit[4005]: AVC avc: denied { write } for pid=4005 comm="tee" name="fd" dev="proc" ino=19745 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:21:00.185000 audit[4008]: AVC avc: denied { write } for pid=4008 comm="tee" name="fd" dev="proc" ino=20588 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:21:00.185000 audit[4008]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeea81a1e a2=241 a3=1b6 items=1 ppid=3962 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.185000 audit: CWD cwd="/etc/service/enabled/bird/log" Mar 17 18:21:00.185000 audit: PATH item=0 name="/dev/fd/63" inode=20580 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:21:00.185000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:21:00.188000 audit[4003]: AVC avc: denied { write } for pid=4003 comm="tee" name="fd" dev="proc" ino=19748 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:21:00.191000 audit[4009]: AVC avc: denied { write } for pid=4009 comm="tee" name="fd" dev="proc" ino=19751 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:21:00.180000 audit[4001]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe7961a0d a2=241 a3=1b6 items=1 ppid=3970 pid=4001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.180000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Mar 17 18:21:00.180000 audit: PATH item=0 name="/dev/fd/63" inode=19732 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:21:00.180000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:21:00.183000 audit[4005]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc3859a1d a2=241 a3=1b6 items=1 ppid=3971 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.183000 audit: CWD cwd="/etc/service/enabled/confd/log" Mar 17 18:21:00.183000 audit: PATH item=0 name="/dev/fd/63" inode=20579 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:21:00.183000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:21:00.191000 audit[4009]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff105ca1d a2=241 a3=1b6 items=1 ppid=3966 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.191000 audit: CWD cwd="/etc/service/enabled/felix/log" Mar 17 18:21:00.191000 audit: PATH item=0 name="/dev/fd/63" inode=19734 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:21:00.191000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:21:00.188000 audit[4003]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd10a4a1d a2=241 a3=1b6 items=1 ppid=3975 pid=4003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.188000 audit: CWD cwd="/etc/service/enabled/bird6/log" Mar 17 18:21:00.188000 audit: PATH item=0 name="/dev/fd/63" inode=19733 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:21:00.188000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:21:00.210000 audit[4024]: AVC avc: denied { write } for pid=4024 comm="tee" name="fd" dev="proc" ino=19758 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:21:00.210000 audit[4025]: AVC avc: denied { write } for pid=4025 comm="tee" name="fd" dev="proc" ino=20596 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:21:00.210000 audit[4025]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc4ef3a0e a2=241 a3=1b6 items=1 ppid=3967 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.210000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Mar 17 18:21:00.210000 audit: PATH item=0 name="/dev/fd/63" inode=20583 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:21:00.210000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:21:00.210000 audit[4024]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc7640a1f a2=241 a3=1b6 items=1 ppid=3972 pid=4024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.210000 audit: CWD cwd="/etc/service/enabled/cni/log" Mar 17 18:21:00.210000 audit: PATH item=0 name="/dev/fd/63" inode=19742 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:21:00.210000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:21:00.460154 systemd[1]: run-containerd-runc-k8s.io-d94677b419a8e848e500a0a10b9e5f2162ffc7722f79e98f08a788e19278ea5b-runc.jUF2bn.mount: Deactivated successfully. Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit: BPF prog-id=145 op=LOAD Mar 17 18:21:00.650000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffee9ea098 a2=98 a3=ffffee9ea088 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.650000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.650000 audit: BPF prog-id=145 op=UNLOAD Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit: BPF prog-id=146 op=LOAD Mar 17 18:21:00.650000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffee9e9d28 a2=74 a3=95 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.650000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.650000 audit: BPF prog-id=146 op=UNLOAD Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.650000 audit: BPF prog-id=147 op=LOAD Mar 17 18:21:00.650000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffee9e9d88 a2=94 a3=2 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.650000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.651000 audit: BPF prog-id=147 op=UNLOAD Mar 17 18:21:00.830000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.830000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.830000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.830000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.830000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.830000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.830000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.830000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.830000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.830000 audit: BPF prog-id=148 op=LOAD Mar 17 18:21:00.830000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffee9e9d48 a2=40 a3=ffffee9e9d78 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.830000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.832000 audit: BPF prog-id=148 op=UNLOAD Mar 17 18:21:00.832000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.832000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffee9e9e60 a2=50 a3=0 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.832000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.848000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.848000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffee9e9db8 a2=28 a3=ffffee9e9ee8 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.848000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.849000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.849000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffee9e9de8 a2=28 a3=ffffee9e9f18 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.849000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.850000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.850000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffee9e9c98 a2=28 a3=ffffee9e9dc8 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.850000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.850000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.850000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffee9e9e08 a2=28 a3=ffffee9e9f38 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.850000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.850000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.850000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffee9e9de8 a2=28 a3=ffffee9e9f18 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.850000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.851000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.851000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffee9e9dd8 a2=28 a3=ffffee9e9f08 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.851000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.852000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.852000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffee9e9e08 a2=28 a3=ffffee9e9f38 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.852000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.852000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.852000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffee9e9de8 a2=28 a3=ffffee9e9f18 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.852000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.852000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.852000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffee9e9e08 a2=28 a3=ffffee9e9f38 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.852000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.853000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.853000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffee9e9dd8 a2=28 a3=ffffee9e9f08 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.853000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.853000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.853000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffee9e9e58 a2=28 a3=ffffee9e9f98 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.853000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.854000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.854000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffee9e9b90 a2=50 a3=0 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.854000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.854000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.854000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.854000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.854000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.854000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.854000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.854000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.854000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.854000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.854000 audit: BPF prog-id=149 op=LOAD Mar 17 18:21:00.854000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffee9e9b98 a2=94 a3=5 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.854000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.856000 audit: BPF prog-id=149 op=UNLOAD Mar 17 18:21:00.856000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.856000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffee9e9ca0 a2=50 a3=0 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.856000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.856000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.856000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffee9e9de8 a2=4 a3=3 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.856000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.857000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.857000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.857000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.857000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.857000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.857000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.857000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.857000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.857000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.857000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.857000 audit[4094]: AVC avc: denied { confidentiality } for pid=4094 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:00.857000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffee9e9dc8 a2=94 a3=6 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.857000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { confidentiality } for pid=4094 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:00.858000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffee9e9598 a2=94 a3=83 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.858000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.858000 audit[4094]: AVC avc: denied { confidentiality } for pid=4094 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:00.858000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffee9e9598 a2=94 a3=83 items=0 ppid=3968 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.858000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:21:00.875000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.875000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.875000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.875000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.875000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.875000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.875000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.875000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.875000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.875000 audit: BPF prog-id=150 op=LOAD Mar 17 18:21:00.875000 audit[4097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd2eed8b8 a2=98 a3=ffffd2eed8a8 items=0 ppid=3968 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.875000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:21:00.877000 audit: BPF prog-id=150 op=UNLOAD Mar 17 18:21:00.877000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.877000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.877000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.877000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.877000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.877000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.877000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.877000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.877000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.877000 audit: BPF prog-id=151 op=LOAD Mar 17 18:21:00.877000 audit[4097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd2eed768 a2=74 a3=95 items=0 ppid=3968 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.877000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:21:00.879000 audit: BPF prog-id=151 op=UNLOAD Mar 17 18:21:00.879000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.879000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.879000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.879000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.879000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.879000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.879000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.879000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.879000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:00.879000 audit: BPF prog-id=152 op=LOAD Mar 17 18:21:00.879000 audit[4097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd2eed798 a2=40 a3=ffffd2eed7c8 items=0 ppid=3968 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:00.879000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:21:00.880000 audit: BPF prog-id=152 op=UNLOAD Mar 17 18:21:00.917779 kubelet[2212]: E0317 18:21:00.917722 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:01.013000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.016331 (udev-worker)[4120]: Network interface NamePolicy= disabled on kernel command line. Mar 17 18:21:01.013000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.013000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.013000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.013000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.013000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.013000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.013000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.013000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.013000 audit: BPF prog-id=153 op=LOAD Mar 17 18:21:01.013000 audit[4119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffca4de78 a2=98 a3=fffffca4de68 items=0 ppid=3968 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.013000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:21:01.016000 audit: BPF prog-id=153 op=UNLOAD Mar 17 18:21:01.016000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.016000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020629 (udev-worker)[4121]: Network interface NamePolicy= disabled on kernel command line. Mar 17 18:21:01.016000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.016000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.016000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.016000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.016000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.016000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.016000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.016000 audit: BPF prog-id=154 op=LOAD Mar 17 18:21:01.016000 audit[4119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffca4db58 a2=74 a3=95 items=0 ppid=3968 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:21:01.020000 audit: BPF prog-id=154 op=UNLOAD Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit: BPF prog-id=155 op=LOAD Mar 17 18:21:01.020000 audit[4119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffca4dbb8 a2=94 a3=2 items=0 ppid=3968 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.020000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:21:01.020000 audit: BPF prog-id=155 op=UNLOAD Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffca4dbe8 a2=28 a3=fffffca4dd18 items=0 ppid=3968 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.020000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffca4dc18 a2=28 a3=fffffca4dd48 items=0 ppid=3968 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.020000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffca4dac8 a2=28 a3=fffffca4dbf8 items=0 ppid=3968 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.020000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffca4dc38 a2=28 a3=fffffca4dd68 items=0 ppid=3968 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.020000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffca4dc18 a2=28 a3=fffffca4dd48 items=0 ppid=3968 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.020000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffca4dc08 a2=28 a3=fffffca4dd38 items=0 ppid=3968 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.020000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffca4dc38 a2=28 a3=fffffca4dd68 items=0 ppid=3968 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.020000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffca4dc18 a2=28 a3=fffffca4dd48 items=0 ppid=3968 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.020000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffca4dc38 a2=28 a3=fffffca4dd68 items=0 ppid=3968 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.020000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffca4dc08 a2=28 a3=fffffca4dd38 items=0 ppid=3968 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.020000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffca4dc88 a2=28 a3=fffffca4ddc8 items=0 ppid=3968 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.020000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.020000 audit: BPF prog-id=156 op=LOAD Mar 17 18:21:01.020000 audit[4119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffca4daa8 a2=40 a3=fffffca4dad8 items=0 ppid=3968 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.020000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:21:01.020000 audit: BPF prog-id=156 op=UNLOAD Mar 17 18:21:01.021000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.021000 audit[4119]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=fffffca4dad0 a2=50 a3=0 items=0 ppid=3968 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.021000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:21:01.021000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.021000 audit[4119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=fffffca4dad0 a2=50 a3=0 items=0 ppid=3968 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.021000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:21:01.021000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.021000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.021000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.021000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.021000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.021000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.021000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.021000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.021000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.021000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.021000 audit: BPF prog-id=157 op=LOAD Mar 17 18:21:01.021000 audit[4119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffca4d238 a2=94 a3=2 items=0 ppid=3968 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.021000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:21:01.022000 audit: BPF prog-id=157 op=UNLOAD Mar 17 18:21:01.022000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.022000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.022000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.022000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.022000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.022000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.022000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.022000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.022000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.022000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.022000 audit: BPF prog-id=158 op=LOAD Mar 17 18:21:01.022000 audit[4119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffca4d3c8 a2=94 a3=2d items=0 ppid=3968 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.022000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:21:01.034000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.034000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.034000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.034000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.034000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.034000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.034000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.034000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.034000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.034000 audit: BPF prog-id=159 op=LOAD Mar 17 18:21:01.034000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdff36118 a2=98 a3=ffffdff36108 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.034000 audit: BPF prog-id=159 op=UNLOAD Mar 17 18:21:01.035000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.035000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.035000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.035000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.035000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.035000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.035000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.035000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.035000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.035000 audit: BPF prog-id=160 op=LOAD Mar 17 18:21:01.035000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdff35da8 a2=74 a3=95 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.035000 audit: BPF prog-id=160 op=UNLOAD Mar 17 18:21:01.035000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.035000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.035000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.035000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.035000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.035000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.035000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.035000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.035000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.035000 audit: BPF prog-id=161 op=LOAD Mar 17 18:21:01.035000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdff35e08 a2=94 a3=2 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.035000 audit: BPF prog-id=161 op=UNLOAD Mar 17 18:21:01.218000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.218000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.218000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.218000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.218000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.218000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.218000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.218000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.218000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.218000 audit: BPF prog-id=162 op=LOAD Mar 17 18:21:01.218000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdff35dc8 a2=40 a3=ffffdff35df8 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.220000 audit: BPF prog-id=162 op=UNLOAD Mar 17 18:21:01.220000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.220000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffdff35ee0 a2=50 a3=0 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.220000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.237000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.237000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdff35e38 a2=28 a3=ffffdff35f68 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.237000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.238000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.238000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdff35e68 a2=28 a3=ffffdff35f98 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.238000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.238000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.238000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdff35d18 a2=28 a3=ffffdff35e48 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.238000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.238000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.238000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdff35e88 a2=28 a3=ffffdff35fb8 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.238000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.239000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.239000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdff35e68 a2=28 a3=ffffdff35f98 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.239000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.239000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.239000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdff35e58 a2=28 a3=ffffdff35f88 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.239000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.240000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.240000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdff35e88 a2=28 a3=ffffdff35fb8 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.240000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.240000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.240000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdff35e68 a2=28 a3=ffffdff35f98 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.240000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.240000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.240000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdff35e88 a2=28 a3=ffffdff35fb8 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.240000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.241000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.241000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdff35e58 a2=28 a3=ffffdff35f88 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.241000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.241000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.241000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdff35ed8 a2=28 a3=ffffdff36018 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.241000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdff35c10 a2=50 a3=0 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.242000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit: BPF prog-id=163 op=LOAD Mar 17 18:21:01.242000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdff35c18 a2=94 a3=5 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.242000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.242000 audit: BPF prog-id=163 op=UNLOAD Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdff35d20 a2=50 a3=0 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.242000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffdff35e68 a2=4 a3=3 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.242000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { confidentiality } for pid=4125 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:01.242000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdff35e48 a2=94 a3=6 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.242000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.242000 audit[4125]: AVC avc: denied { confidentiality } for pid=4125 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:01.242000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdff35618 a2=94 a3=83 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.242000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.243000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.243000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.243000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.243000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.243000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.243000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.243000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.243000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.243000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.243000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.243000 audit[4125]: AVC avc: denied { confidentiality } for pid=4125 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:01.243000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdff35618 a2=94 a3=83 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.243000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.243000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.243000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffdff37058 a2=10 a3=ffffdff37148 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.243000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.244000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.244000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffdff36f18 a2=10 a3=ffffdff37008 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.244000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.244000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.244000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffdff36e88 a2=10 a3=ffffdff37008 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.244000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.244000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:01.244000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffdff36e88 a2=10 a3=ffffdff37008 items=0 ppid=3968 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.244000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:21:01.252000 audit: BPF prog-id=158 op=UNLOAD Mar 17 18:21:01.252000 audit[4120]: SYSCALL arch=c00000b7 syscall=22 success=yes exit=1 a0=3 a1=aaaae08f05c0 a2=4 a3=ffffffffffffffff items=0 ppid=1526 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:01.252000 audit: PROCTITLE proctitle="(udev-worker)" Mar 17 18:21:01.918406 kubelet[2212]: E0317 18:21:01.918313 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:02.919488 kubelet[2212]: E0317 18:21:02.919432 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:03.806000 audit[4160]: NETFILTER_CFG table=filter:93 family=2 entries=20 op=nft_register_rule pid=4160 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:21:03.809744 kernel: kauditd_printk_skb: 550 callbacks suppressed Mar 17 18:21:03.809846 kernel: audit: type=1325 audit(1742235663.806:942): table=filter:93 family=2 entries=20 op=nft_register_rule pid=4160 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:21:03.806000 audit[4160]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffc5227a60 a2=0 a3=1 items=0 ppid=2430 pid=4160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:03.825004 kernel: audit: type=1300 audit(1742235663.806:942): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffc5227a60 a2=0 a3=1 items=0 ppid=2430 pid=4160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:03.825078 kernel: audit: type=1327 audit(1742235663.806:942): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:21:03.806000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:21:03.832000 audit[4160]: NETFILTER_CFG table=nat:94 family=2 entries=22 op=nft_register_rule pid=4160 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:21:03.832000 audit[4160]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc5227a60 a2=0 a3=1 items=0 ppid=2430 pid=4160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:03.848575 kernel: audit: type=1325 audit(1742235663.832:943): table=nat:94 family=2 entries=22 op=nft_register_rule pid=4160 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:21:03.848672 kernel: audit: type=1300 audit(1742235663.832:943): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc5227a60 a2=0 a3=1 items=0 ppid=2430 pid=4160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:03.832000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:21:03.854165 kernel: audit: type=1327 audit(1742235663.832:943): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:21:03.862000 audit[4162]: NETFILTER_CFG table=filter:95 family=2 entries=32 op=nft_register_rule pid=4162 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:21:03.862000 audit[4162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffc8af8bd0 a2=0 a3=1 items=0 ppid=2430 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:03.879513 kernel: audit: type=1325 audit(1742235663.862:944): table=filter:95 family=2 entries=32 op=nft_register_rule pid=4162 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:21:03.879602 kernel: audit: type=1300 audit(1742235663.862:944): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffc8af8bd0 a2=0 a3=1 items=0 ppid=2430 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:03.862000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:21:03.884702 kernel: audit: type=1327 audit(1742235663.862:944): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:21:03.884881 kernel: audit: type=1325 audit(1742235663.880:945): table=nat:96 family=2 entries=22 op=nft_register_rule pid=4162 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:21:03.880000 audit[4162]: NETFILTER_CFG table=nat:96 family=2 entries=22 op=nft_register_rule pid=4162 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:21:03.880000 audit[4162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc8af8bd0 a2=0 a3=1 items=0 ppid=2430 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:03.880000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:21:03.920488 kubelet[2212]: E0317 18:21:03.920406 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:03.963393 kubelet[2212]: I0317 18:21:03.963324 2212 topology_manager.go:215] "Topology Admit Handler" podUID="c23926fb-2434-4709-88a5-19cfd58620a6" podNamespace="default" podName="nfs-server-provisioner-0" Mar 17 18:21:03.973224 systemd[1]: Created slice kubepods-besteffort-podc23926fb_2434_4709_88a5_19cfd58620a6.slice. Mar 17 18:21:03.996942 kubelet[2212]: I0317 18:21:03.996881 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6l5hf\" (UniqueName: \"kubernetes.io/projected/c23926fb-2434-4709-88a5-19cfd58620a6-kube-api-access-6l5hf\") pod \"nfs-server-provisioner-0\" (UID: \"c23926fb-2434-4709-88a5-19cfd58620a6\") " pod="default/nfs-server-provisioner-0" Mar 17 18:21:03.997101 kubelet[2212]: I0317 18:21:03.996952 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/c23926fb-2434-4709-88a5-19cfd58620a6-data\") pod \"nfs-server-provisioner-0\" (UID: \"c23926fb-2434-4709-88a5-19cfd58620a6\") " pod="default/nfs-server-provisioner-0" Mar 17 18:21:04.278942 env[1818]: time="2025-03-17T18:21:04.278858809Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:c23926fb-2434-4709-88a5-19cfd58620a6,Namespace:default,Attempt:0,}" Mar 17 18:21:04.535661 systemd-networkd[1531]: cali60e51b789ff: Link UP Mar 17 18:21:04.541331 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:21:04.541429 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Mar 17 18:21:04.541307 systemd-networkd[1531]: cali60e51b789ff: Gained carrier Mar 17 18:21:04.547077 (udev-worker)[4184]: Network interface NamePolicy= disabled on kernel command line. Mar 17 18:21:04.578854 env[1818]: 2025-03-17 18:21:04.377 [INFO][4164] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.27-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default c23926fb-2434-4709-88a5-19cfd58620a6 1292 0 2025-03-17 18:21:03 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.22.27 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.27-k8s-nfs--server--provisioner--0-" Mar 17 18:21:04.578854 env[1818]: 2025-03-17 18:21:04.377 [INFO][4164] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.27-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:21:04.578854 env[1818]: 2025-03-17 18:21:04.429 [INFO][4177] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6" HandleID="k8s-pod-network.71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6" Workload="172.31.22.27-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:21:04.578854 env[1818]: 2025-03-17 18:21:04.456 [INFO][4177] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6" HandleID="k8s-pod-network.71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6" Workload="172.31.22.27-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000318960), Attrs:map[string]string{"namespace":"default", "node":"172.31.22.27", "pod":"nfs-server-provisioner-0", "timestamp":"2025-03-17 18:21:04.429742197 +0000 UTC"}, Hostname:"172.31.22.27", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:21:04.578854 env[1818]: 2025-03-17 18:21:04.456 [INFO][4177] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:21:04.578854 env[1818]: 2025-03-17 18:21:04.456 [INFO][4177] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:21:04.578854 env[1818]: 2025-03-17 18:21:04.456 [INFO][4177] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.27' Mar 17 18:21:04.578854 env[1818]: 2025-03-17 18:21:04.463 [INFO][4177] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6" host="172.31.22.27" Mar 17 18:21:04.578854 env[1818]: 2025-03-17 18:21:04.474 [INFO][4177] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.22.27" Mar 17 18:21:04.578854 env[1818]: 2025-03-17 18:21:04.485 [INFO][4177] ipam/ipam.go 489: Trying affinity for 192.168.27.0/26 host="172.31.22.27" Mar 17 18:21:04.578854 env[1818]: 2025-03-17 18:21:04.489 [INFO][4177] ipam/ipam.go 155: Attempting to load block cidr=192.168.27.0/26 host="172.31.22.27" Mar 17 18:21:04.578854 env[1818]: 2025-03-17 18:21:04.494 [INFO][4177] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.0/26 host="172.31.22.27" Mar 17 18:21:04.578854 env[1818]: 2025-03-17 18:21:04.495 [INFO][4177] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.0/26 handle="k8s-pod-network.71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6" host="172.31.22.27" Mar 17 18:21:04.578854 env[1818]: 2025-03-17 18:21:04.501 [INFO][4177] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6 Mar 17 18:21:04.578854 env[1818]: 2025-03-17 18:21:04.510 [INFO][4177] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.27.0/26 handle="k8s-pod-network.71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6" host="172.31.22.27" Mar 17 18:21:04.578854 env[1818]: 2025-03-17 18:21:04.527 [INFO][4177] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.27.3/26] block=192.168.27.0/26 handle="k8s-pod-network.71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6" host="172.31.22.27" Mar 17 18:21:04.578854 env[1818]: 2025-03-17 18:21:04.527 [INFO][4177] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.3/26] handle="k8s-pod-network.71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6" host="172.31.22.27" Mar 17 18:21:04.578854 env[1818]: 2025-03-17 18:21:04.527 [INFO][4177] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:21:04.578854 env[1818]: 2025-03-17 18:21:04.527 [INFO][4177] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.27.3/26] IPv6=[] ContainerID="71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6" HandleID="k8s-pod-network.71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6" Workload="172.31.22.27-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:21:04.580148 env[1818]: 2025-03-17 18:21:04.530 [INFO][4164] cni-plugin/k8s.go 386: Populated endpoint ContainerID="71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.27-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.27-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"c23926fb-2434-4709-88a5-19cfd58620a6", ResourceVersion:"1292", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 21, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.27", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.27.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:21:04.580148 env[1818]: 2025-03-17 18:21:04.530 [INFO][4164] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.27.3/32] ContainerID="71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.27-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:21:04.580148 env[1818]: 2025-03-17 18:21:04.531 [INFO][4164] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.27-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:21:04.580148 env[1818]: 2025-03-17 18:21:04.542 [INFO][4164] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.27-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:21:04.580532 env[1818]: 2025-03-17 18:21:04.542 [INFO][4164] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.27-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.27-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"c23926fb-2434-4709-88a5-19cfd58620a6", ResourceVersion:"1292", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 21, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.27", ContainerID:"71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.27.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"5e:eb:ff:82:da:8e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:21:04.580532 env[1818]: 2025-03-17 18:21:04.573 [INFO][4164] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.27-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:21:04.606000 audit[4204]: NETFILTER_CFG table=filter:97 family=2 entries=38 op=nft_register_chain pid=4204 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:21:04.606000 audit[4204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19820 a0=3 a1=ffffe3fa4490 a2=0 a3=ffffb0be8fa8 items=0 ppid=3968 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:04.606000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:21:04.608638 env[1818]: time="2025-03-17T18:21:04.608511207Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:21:04.608764 env[1818]: time="2025-03-17T18:21:04.608668688Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:21:04.608882 env[1818]: time="2025-03-17T18:21:04.608756713Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:21:04.609788 env[1818]: time="2025-03-17T18:21:04.609194219Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6 pid=4207 runtime=io.containerd.runc.v2 Mar 17 18:21:04.654971 systemd[1]: Started cri-containerd-71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6.scope. Mar 17 18:21:04.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.681000 audit: BPF prog-id=164 op=LOAD Mar 17 18:21:04.683000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.683000 audit[4217]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4207 pid=4217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:04.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731646136613863303761343866616231666263366433626666666439 Mar 17 18:21:04.683000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.683000 audit[4217]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4207 pid=4217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:04.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731646136613863303761343866616231666263366433626666666439 Mar 17 18:21:04.684000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.684000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.684000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.684000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.684000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.684000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.684000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.684000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.684000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.684000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.684000 audit: BPF prog-id=165 op=LOAD Mar 17 18:21:04.684000 audit[4217]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4207 pid=4217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:04.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731646136613863303761343866616231666263366433626666666439 Mar 17 18:21:04.685000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.685000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.685000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.685000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.685000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.685000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.685000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.685000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.685000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.685000 audit: BPF prog-id=166 op=LOAD Mar 17 18:21:04.685000 audit[4217]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4207 pid=4217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:04.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731646136613863303761343866616231666263366433626666666439 Mar 17 18:21:04.686000 audit: BPF prog-id=166 op=UNLOAD Mar 17 18:21:04.687000 audit: BPF prog-id=165 op=UNLOAD Mar 17 18:21:04.687000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.687000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.687000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.687000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.687000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.687000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.687000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.687000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.687000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.687000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:04.687000 audit: BPF prog-id=167 op=LOAD Mar 17 18:21:04.687000 audit[4217]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4207 pid=4217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:04.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731646136613863303761343866616231666263366433626666666439 Mar 17 18:21:04.730162 env[1818]: time="2025-03-17T18:21:04.730088315Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:c23926fb-2434-4709-88a5-19cfd58620a6,Namespace:default,Attempt:0,} returns sandbox id \"71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6\"" Mar 17 18:21:04.733077 env[1818]: time="2025-03-17T18:21:04.732976740Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Mar 17 18:21:04.923421 kubelet[2212]: E0317 18:21:04.921519 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:05.116581 systemd[1]: run-containerd-runc-k8s.io-71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6-runc.M6KGma.mount: Deactivated successfully. Mar 17 18:21:05.768248 systemd-networkd[1531]: cali60e51b789ff: Gained IPv6LL Mar 17 18:21:05.922310 kubelet[2212]: E0317 18:21:05.922215 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:06.922616 kubelet[2212]: E0317 18:21:06.922561 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:07.923835 kubelet[2212]: E0317 18:21:07.923743 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:07.964179 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2858625817.mount: Deactivated successfully. Mar 17 18:21:08.923997 kubelet[2212]: E0317 18:21:08.923917 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:09.924115 kubelet[2212]: E0317 18:21:09.924067 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:10.925639 kubelet[2212]: E0317 18:21:10.925563 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:11.505691 env[1818]: time="2025-03-17T18:21:11.505629085Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:21:11.508086 env[1818]: time="2025-03-17T18:21:11.508036850Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:21:11.511384 env[1818]: time="2025-03-17T18:21:11.511332609Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:21:11.514347 env[1818]: time="2025-03-17T18:21:11.514282570Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:21:11.516107 env[1818]: time="2025-03-17T18:21:11.516050601Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Mar 17 18:21:11.521710 env[1818]: time="2025-03-17T18:21:11.521635811Z" level=info msg="CreateContainer within sandbox \"71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Mar 17 18:21:11.540250 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount356813323.mount: Deactivated successfully. Mar 17 18:21:11.560615 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1225589998.mount: Deactivated successfully. Mar 17 18:21:11.561635 env[1818]: time="2025-03-17T18:21:11.560601017Z" level=info msg="CreateContainer within sandbox \"71da6a8c07a48fab1fbc6d3bfffd983c48f22869a461d2685c749653d4f15eb6\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"ebb437ba4809b7090d04361d0c6be872fb84837343718e8254ce8e9367eaffc9\"" Mar 17 18:21:11.562086 env[1818]: time="2025-03-17T18:21:11.562041960Z" level=info msg="StartContainer for \"ebb437ba4809b7090d04361d0c6be872fb84837343718e8254ce8e9367eaffc9\"" Mar 17 18:21:11.597866 systemd[1]: Started cri-containerd-ebb437ba4809b7090d04361d0c6be872fb84837343718e8254ce8e9367eaffc9.scope. Mar 17 18:21:11.632150 kernel: kauditd_printk_skb: 62 callbacks suppressed Mar 17 18:21:11.632303 kernel: audit: type=1400 audit(1742235671.629:965): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.647088 kernel: audit: type=1400 audit(1742235671.629:966): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.647239 kernel: audit: type=1400 audit(1742235671.629:967): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.661397 kernel: audit: type=1400 audit(1742235671.629:968): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.661527 kernel: audit: type=1400 audit(1742235671.629:969): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.676483 kernel: audit: type=1400 audit(1742235671.629:970): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.684078 kernel: audit: type=1400 audit(1742235671.629:971): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.691519 kernel: audit: type=1400 audit(1742235671.629:972): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.698845 kernel: audit: type=1400 audit(1742235671.629:973): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.706573 kernel: audit: type=1400 audit(1742235671.631:974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.631000 audit: BPF prog-id=168 op=LOAD Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4207 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:11.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562623433376261343830396237303930643034333631643063366265 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4207 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:11.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562623433376261343830396237303930643034333631643063366265 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit: BPF prog-id=169 op=LOAD Mar 17 18:21:11.638000 audit[4260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4207 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:11.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562623433376261343830396237303930643034333631643063366265 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit: BPF prog-id=170 op=LOAD Mar 17 18:21:11.638000 audit[4260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4207 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:11.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562623433376261343830396237303930643034333631643063366265 Mar 17 18:21:11.638000 audit: BPF prog-id=170 op=UNLOAD Mar 17 18:21:11.638000 audit: BPF prog-id=169 op=UNLOAD Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:11.638000 audit: BPF prog-id=171 op=LOAD Mar 17 18:21:11.638000 audit[4260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4207 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:11.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562623433376261343830396237303930643034333631643063366265 Mar 17 18:21:11.724177 env[1818]: time="2025-03-17T18:21:11.724096188Z" level=info msg="StartContainer for \"ebb437ba4809b7090d04361d0c6be872fb84837343718e8254ce8e9367eaffc9\" returns successfully" Mar 17 18:21:11.831000 audit[4287]: AVC avc: denied { search } for pid=4287 comm="rpcbind" name="crypto" dev="proc" ino=21208 scontext=system_u:system_r:svirt_lxc_net_t:s0:c743,c947 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Mar 17 18:21:11.831000 audit[4287]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb6c5f000 a2=0 a3=0 items=0 ppid=4271 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c743,c947 key=(null) Mar 17 18:21:11.831000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Mar 17 18:21:11.876730 kubelet[2212]: E0317 18:21:11.876644 2212 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:11.913000 audit[4292]: AVC avc: denied { search } for pid=4292 comm="dbus-daemon" name="crypto" dev="proc" ino=21208 scontext=system_u:system_r:svirt_lxc_net_t:s0:c743,c947 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Mar 17 18:21:11.913000 audit[4292]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffbefef000 a2=0 a3=0 items=0 ppid=4271 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c743,c947 key=(null) Mar 17 18:21:11.913000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Mar 17 18:21:11.919000 audit[4293]: AVC avc: denied { watch } for pid=4293 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538845 scontext=system_u:system_r:svirt_lxc_net_t:s0:c743,c947 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c743,c947 tclass=dir permissive=0 Mar 17 18:21:11.919000 audit[4293]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaab18dde010 a2=2c8 a3=aaab18db3a60 items=0 ppid=4271 pid=4293 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c743,c947 key=(null) Mar 17 18:21:11.919000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Mar 17 18:21:11.926550 kubelet[2212]: E0317 18:21:11.926484 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:11.928000 audit[4294]: AVC avc: denied { read } for pid=4294 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21720 scontext=system_u:system_r:svirt_lxc_net_t:s0:c743,c947 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Mar 17 18:21:11.928000 audit[4294]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffff9fc0a570 a2=80000 a3=0 items=0 ppid=4271 pid=4294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c743,c947 key=(null) Mar 17 18:21:11.928000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Mar 17 18:21:11.931000 audit[4294]: AVC avc: denied { search } for pid=4294 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21208 scontext=system_u:system_r:svirt_lxc_net_t:s0:c743,c947 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Mar 17 18:21:11.931000 audit[4294]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9ef9f000 a2=0 a3=0 items=0 ppid=4271 pid=4294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c743,c947 key=(null) Mar 17 18:21:11.931000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Mar 17 18:21:11.934448 env[1818]: time="2025-03-17T18:21:11.934376198Z" level=info msg="StopPodSandbox for \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\"" Mar 17 18:21:12.072804 env[1818]: 2025-03-17 18:21:12.007 [WARNING][4310] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.27-k8s-csi--node--driver--9k7db-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"18cae42e-0875-42b2-8913-ac2b39fe24a2", ResourceVersion:"1089", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 20, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.27", ContainerID:"87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27", Pod:"csi-node-driver-9k7db", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.27.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib0cbf338743", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:21:12.072804 env[1818]: 2025-03-17 18:21:12.007 [INFO][4310] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Mar 17 18:21:12.072804 env[1818]: 2025-03-17 18:21:12.008 [INFO][4310] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" iface="eth0" netns="" Mar 17 18:21:12.072804 env[1818]: 2025-03-17 18:21:12.008 [INFO][4310] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Mar 17 18:21:12.072804 env[1818]: 2025-03-17 18:21:12.008 [INFO][4310] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Mar 17 18:21:12.072804 env[1818]: 2025-03-17 18:21:12.046 [INFO][4316] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" HandleID="k8s-pod-network.f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Workload="172.31.22.27-k8s-csi--node--driver--9k7db-eth0" Mar 17 18:21:12.072804 env[1818]: 2025-03-17 18:21:12.046 [INFO][4316] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:21:12.072804 env[1818]: 2025-03-17 18:21:12.047 [INFO][4316] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:21:12.072804 env[1818]: 2025-03-17 18:21:12.065 [WARNING][4316] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" HandleID="k8s-pod-network.f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Workload="172.31.22.27-k8s-csi--node--driver--9k7db-eth0" Mar 17 18:21:12.072804 env[1818]: 2025-03-17 18:21:12.066 [INFO][4316] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" HandleID="k8s-pod-network.f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Workload="172.31.22.27-k8s-csi--node--driver--9k7db-eth0" Mar 17 18:21:12.072804 env[1818]: 2025-03-17 18:21:12.068 [INFO][4316] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:21:12.072804 env[1818]: 2025-03-17 18:21:12.070 [INFO][4310] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Mar 17 18:21:12.072804 env[1818]: time="2025-03-17T18:21:12.072874735Z" level=info msg="TearDown network for sandbox \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\" successfully" Mar 17 18:21:12.072804 env[1818]: time="2025-03-17T18:21:12.072920270Z" level=info msg="StopPodSandbox for \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\" returns successfully" Mar 17 18:21:12.074163 env[1818]: time="2025-03-17T18:21:12.073662366Z" level=info msg="RemovePodSandbox for \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\"" Mar 17 18:21:12.074163 env[1818]: time="2025-03-17T18:21:12.073712390Z" level=info msg="Forcibly stopping sandbox \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\"" Mar 17 18:21:12.236990 env[1818]: 2025-03-17 18:21:12.139 [WARNING][4334] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.27-k8s-csi--node--driver--9k7db-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"18cae42e-0875-42b2-8913-ac2b39fe24a2", ResourceVersion:"1089", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 20, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.27", ContainerID:"87861b542e04047305cde744925eba170a1740ddc77c2463bf28b3001923fb27", Pod:"csi-node-driver-9k7db", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.27.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib0cbf338743", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:21:12.236990 env[1818]: 2025-03-17 18:21:12.139 [INFO][4334] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Mar 17 18:21:12.236990 env[1818]: 2025-03-17 18:21:12.139 [INFO][4334] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" iface="eth0" netns="" Mar 17 18:21:12.236990 env[1818]: 2025-03-17 18:21:12.140 [INFO][4334] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Mar 17 18:21:12.236990 env[1818]: 2025-03-17 18:21:12.140 [INFO][4334] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Mar 17 18:21:12.236990 env[1818]: 2025-03-17 18:21:12.191 [INFO][4341] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" HandleID="k8s-pod-network.f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Workload="172.31.22.27-k8s-csi--node--driver--9k7db-eth0" Mar 17 18:21:12.236990 env[1818]: 2025-03-17 18:21:12.192 [INFO][4341] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:21:12.236990 env[1818]: 2025-03-17 18:21:12.192 [INFO][4341] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:21:12.236990 env[1818]: 2025-03-17 18:21:12.223 [WARNING][4341] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" HandleID="k8s-pod-network.f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Workload="172.31.22.27-k8s-csi--node--driver--9k7db-eth0" Mar 17 18:21:12.236990 env[1818]: 2025-03-17 18:21:12.223 [INFO][4341] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" HandleID="k8s-pod-network.f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Workload="172.31.22.27-k8s-csi--node--driver--9k7db-eth0" Mar 17 18:21:12.236990 env[1818]: 2025-03-17 18:21:12.226 [INFO][4341] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:21:12.236990 env[1818]: 2025-03-17 18:21:12.232 [INFO][4334] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521" Mar 17 18:21:12.237946 env[1818]: time="2025-03-17T18:21:12.237031209Z" level=info msg="TearDown network for sandbox \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\" successfully" Mar 17 18:21:12.240983 env[1818]: time="2025-03-17T18:21:12.240908169Z" level=info msg="RemovePodSandbox \"f1d975f892a5c071c648a80dbcd0ac0137b0f405a5d6309d17c89f660a268521\" returns successfully" Mar 17 18:21:12.241753 env[1818]: time="2025-03-17T18:21:12.241710683Z" level=info msg="StopPodSandbox for \"40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef\"" Mar 17 18:21:12.242393 env[1818]: time="2025-03-17T18:21:12.242326496Z" level=info msg="TearDown network for sandbox \"40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef\" successfully" Mar 17 18:21:12.242531 env[1818]: time="2025-03-17T18:21:12.242496430Z" level=info msg="StopPodSandbox for \"40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef\" returns successfully" Mar 17 18:21:12.243228 env[1818]: time="2025-03-17T18:21:12.243187710Z" level=info msg="RemovePodSandbox for \"40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef\"" Mar 17 18:21:12.243437 env[1818]: time="2025-03-17T18:21:12.243371842Z" level=info msg="Forcibly stopping sandbox \"40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef\"" Mar 17 18:21:12.243680 env[1818]: time="2025-03-17T18:21:12.243646996Z" level=info msg="TearDown network for sandbox \"40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef\" successfully" Mar 17 18:21:12.250950 env[1818]: time="2025-03-17T18:21:12.250770412Z" level=info msg="RemovePodSandbox \"40edc172158b09db43ce2d28f6c9e34183c2c0d8ee4d6ee8edf42cc5a24647ef\" returns successfully" Mar 17 18:21:12.252272 env[1818]: time="2025-03-17T18:21:12.252206069Z" level=info msg="StopPodSandbox for \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\"" Mar 17 18:21:12.374977 env[1818]: 2025-03-17 18:21:12.318 [WARNING][4362] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"5c6b8b2f-3eca-4f8a-8bcd-689f12cf1fb7", ResourceVersion:"1121", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 20, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.27", ContainerID:"b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4", Pod:"nginx-deployment-85f456d6dd-tx8sb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali796b21805e5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:21:12.374977 env[1818]: 2025-03-17 18:21:12.318 [INFO][4362] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Mar 17 18:21:12.374977 env[1818]: 2025-03-17 18:21:12.318 [INFO][4362] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" iface="eth0" netns="" Mar 17 18:21:12.374977 env[1818]: 2025-03-17 18:21:12.318 [INFO][4362] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Mar 17 18:21:12.374977 env[1818]: 2025-03-17 18:21:12.318 [INFO][4362] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Mar 17 18:21:12.374977 env[1818]: 2025-03-17 18:21:12.355 [INFO][4369] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" HandleID="k8s-pod-network.a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Workload="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0" Mar 17 18:21:12.374977 env[1818]: 2025-03-17 18:21:12.355 [INFO][4369] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:21:12.374977 env[1818]: 2025-03-17 18:21:12.356 [INFO][4369] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:21:12.374977 env[1818]: 2025-03-17 18:21:12.368 [WARNING][4369] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" HandleID="k8s-pod-network.a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Workload="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0" Mar 17 18:21:12.374977 env[1818]: 2025-03-17 18:21:12.368 [INFO][4369] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" HandleID="k8s-pod-network.a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Workload="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0" Mar 17 18:21:12.374977 env[1818]: 2025-03-17 18:21:12.370 [INFO][4369] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:21:12.374977 env[1818]: 2025-03-17 18:21:12.372 [INFO][4362] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Mar 17 18:21:12.375993 env[1818]: time="2025-03-17T18:21:12.375015557Z" level=info msg="TearDown network for sandbox \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\" successfully" Mar 17 18:21:12.375993 env[1818]: time="2025-03-17T18:21:12.375077775Z" level=info msg="StopPodSandbox for \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\" returns successfully" Mar 17 18:21:12.376686 env[1818]: time="2025-03-17T18:21:12.376621401Z" level=info msg="RemovePodSandbox for \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\"" Mar 17 18:21:12.376810 env[1818]: time="2025-03-17T18:21:12.376683618Z" level=info msg="Forcibly stopping sandbox \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\"" Mar 17 18:21:12.495000 audit[4402]: NETFILTER_CFG table=filter:98 family=2 entries=20 op=nft_register_rule pid=4402 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:21:12.495000 audit[4402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffff4b6b00 a2=0 a3=1 items=0 ppid=2430 pid=4402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:12.495000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:21:12.506000 audit[4402]: NETFILTER_CFG table=nat:99 family=2 entries=106 op=nft_register_chain pid=4402 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:21:12.506000 audit[4402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffff4b6b00 a2=0 a3=1 items=0 ppid=2430 pid=4402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:12.506000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:21:12.512045 env[1818]: 2025-03-17 18:21:12.440 [WARNING][4389] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"5c6b8b2f-3eca-4f8a-8bcd-689f12cf1fb7", ResourceVersion:"1121", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 20, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.27", ContainerID:"b057c6715c90adf7b01f3abda561de507f271d2aef8dd73e01748816ea8180a4", Pod:"nginx-deployment-85f456d6dd-tx8sb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali796b21805e5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:21:12.512045 env[1818]: 2025-03-17 18:21:12.440 [INFO][4389] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Mar 17 18:21:12.512045 env[1818]: 2025-03-17 18:21:12.440 [INFO][4389] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" iface="eth0" netns="" Mar 17 18:21:12.512045 env[1818]: 2025-03-17 18:21:12.440 [INFO][4389] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Mar 17 18:21:12.512045 env[1818]: 2025-03-17 18:21:12.440 [INFO][4389] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Mar 17 18:21:12.512045 env[1818]: 2025-03-17 18:21:12.488 [INFO][4396] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" HandleID="k8s-pod-network.a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Workload="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0" Mar 17 18:21:12.512045 env[1818]: 2025-03-17 18:21:12.489 [INFO][4396] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:21:12.512045 env[1818]: 2025-03-17 18:21:12.489 [INFO][4396] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:21:12.512045 env[1818]: 2025-03-17 18:21:12.504 [WARNING][4396] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" HandleID="k8s-pod-network.a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Workload="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0" Mar 17 18:21:12.512045 env[1818]: 2025-03-17 18:21:12.504 [INFO][4396] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" HandleID="k8s-pod-network.a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Workload="172.31.22.27-k8s-nginx--deployment--85f456d6dd--tx8sb-eth0" Mar 17 18:21:12.512045 env[1818]: 2025-03-17 18:21:12.507 [INFO][4396] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:21:12.512045 env[1818]: 2025-03-17 18:21:12.509 [INFO][4389] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535" Mar 17 18:21:12.512045 env[1818]: time="2025-03-17T18:21:12.511975850Z" level=info msg="TearDown network for sandbox \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\" successfully" Mar 17 18:21:12.515598 env[1818]: time="2025-03-17T18:21:12.515526156Z" level=info msg="RemovePodSandbox \"a224ba8a4da634bce82aaf6cbc40ec96e6c9662fd8a660422626d317ad2c6535\" returns successfully" Mar 17 18:21:12.927578 kubelet[2212]: E0317 18:21:12.927423 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:13.928367 kubelet[2212]: E0317 18:21:13.928322 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:14.929246 kubelet[2212]: E0317 18:21:14.929185 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:15.930260 kubelet[2212]: E0317 18:21:15.930182 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:16.931424 kubelet[2212]: E0317 18:21:16.931360 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:17.931606 kubelet[2212]: E0317 18:21:17.931531 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:18.931936 kubelet[2212]: E0317 18:21:18.931867 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:19.932382 kubelet[2212]: E0317 18:21:19.932336 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:20.933284 kubelet[2212]: E0317 18:21:20.933217 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:21.933646 kubelet[2212]: E0317 18:21:21.933572 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:22.934062 kubelet[2212]: E0317 18:21:22.934000 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:23.935139 kubelet[2212]: E0317 18:21:23.934880 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:24.935971 kubelet[2212]: E0317 18:21:24.935897 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:25.595069 systemd[1]: run-containerd-runc-k8s.io-d94677b419a8e848e500a0a10b9e5f2162ffc7722f79e98f08a788e19278ea5b-runc.ESkF2R.mount: Deactivated successfully. Mar 17 18:21:25.709246 kubelet[2212]: I0317 18:21:25.709148 2212 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=15.923482769 podStartE2EDuration="22.709127338s" podCreationTimestamp="2025-03-17 18:21:03 +0000 UTC" firstStartedPulling="2025-03-17 18:21:04.732439375 +0000 UTC m=+53.758050663" lastFinishedPulling="2025-03-17 18:21:11.518083956 +0000 UTC m=+60.543695232" observedRunningTime="2025-03-17 18:21:12.475174109 +0000 UTC m=+61.500785409" watchObservedRunningTime="2025-03-17 18:21:25.709127338 +0000 UTC m=+74.734738626" Mar 17 18:21:25.936310 kubelet[2212]: E0317 18:21:25.936177 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:26.937310 kubelet[2212]: E0317 18:21:26.937267 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:27.938874 kubelet[2212]: E0317 18:21:27.938831 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:28.940295 kubelet[2212]: E0317 18:21:28.940229 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:29.941453 kubelet[2212]: E0317 18:21:29.941392 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:30.621895 systemd[1]: Started sshd@7-172.31.22.27:22-60.188.44.206:56480.service. Mar 17 18:21:30.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.22.27:22-60.188.44.206:56480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:21:30.624616 kernel: kauditd_printk_skb: 68 callbacks suppressed Mar 17 18:21:30.624753 kernel: audit: type=1130 audit(1742235690.621:990): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.22.27:22-60.188.44.206:56480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:21:30.942172 kubelet[2212]: E0317 18:21:30.941597 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:31.875974 kubelet[2212]: E0317 18:21:31.875934 2212 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:31.943046 kubelet[2212]: E0317 18:21:31.942752 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:32.943457 kubelet[2212]: E0317 18:21:32.943353 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:33.097268 sshd[4459]: kex_exchange_identification: banner line contains invalid characters Mar 17 18:21:33.097803 sshd[4459]: banner exchange: Connection from 60.188.44.206 port 56480: invalid format Mar 17 18:21:33.098578 systemd[1]: sshd@7-172.31.22.27:22-60.188.44.206:56480.service: Deactivated successfully. Mar 17 18:21:33.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.22.27:22-60.188.44.206:56480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:21:33.107857 kernel: audit: type=1131 audit(1742235693.098:991): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.22.27:22-60.188.44.206:56480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:21:33.944152 kubelet[2212]: E0317 18:21:33.944108 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:34.945911 kubelet[2212]: E0317 18:21:34.945868 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:35.947388 kubelet[2212]: E0317 18:21:35.947323 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:36.593866 kubelet[2212]: I0317 18:21:36.593795 2212 topology_manager.go:215] "Topology Admit Handler" podUID="df360884-54fb-40cd-831b-fabd65b8a0bb" podNamespace="default" podName="test-pod-1" Mar 17 18:21:36.604145 systemd[1]: Created slice kubepods-besteffort-poddf360884_54fb_40cd_831b_fabd65b8a0bb.slice. Mar 17 18:21:36.623500 kubelet[2212]: I0317 18:21:36.623418 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-a8948073-7393-4e8e-9efd-c208a59bf038\" (UniqueName: \"kubernetes.io/nfs/df360884-54fb-40cd-831b-fabd65b8a0bb-pvc-a8948073-7393-4e8e-9efd-c208a59bf038\") pod \"test-pod-1\" (UID: \"df360884-54fb-40cd-831b-fabd65b8a0bb\") " pod="default/test-pod-1" Mar 17 18:21:36.623686 kubelet[2212]: I0317 18:21:36.623573 2212 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-72vqt\" (UniqueName: \"kubernetes.io/projected/df360884-54fb-40cd-831b-fabd65b8a0bb-kube-api-access-72vqt\") pod \"test-pod-1\" (UID: \"df360884-54fb-40cd-831b-fabd65b8a0bb\") " pod="default/test-pod-1" Mar 17 18:21:36.753000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.764307 kernel: audit: type=1400 audit(1742235696.753:992): avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.764405 kernel: Failed to create system directory netfs Mar 17 18:21:36.766348 kernel: Failed to create system directory netfs Mar 17 18:21:36.766420 kernel: audit: type=1400 audit(1742235696.753:992): avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.753000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.775618 kernel: Failed to create system directory netfs Mar 17 18:21:36.775689 kernel: audit: type=1400 audit(1742235696.753:992): avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.753000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.785011 kernel: Failed to create system directory netfs Mar 17 18:21:36.785086 kernel: audit: type=1400 audit(1742235696.753:992): avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.753000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.753000 audit[4464]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae8ebc5e0 a1=12c14 a2=aaaaad73e028 a3=aaaae8ead010 items=0 ppid=1657 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:36.804411 kernel: audit: type=1300 audit(1742235696.753:992): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae8ebc5e0 a1=12c14 a2=aaaaad73e028 a3=aaaae8ead010 items=0 ppid=1657 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:36.804578 kernel: audit: type=1327 audit(1742235696.753:992): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:21:36.753000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:21:36.793000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.819959 kernel: Failed to create system directory fscache Mar 17 18:21:36.820017 kernel: audit: type=1400 audit(1742235696.793:993): avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.820082 kernel: Failed to create system directory fscache Mar 17 18:21:36.820122 kernel: audit: type=1400 audit(1742235696.793:993): avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.793000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.829171 kernel: Failed to create system directory fscache Mar 17 18:21:36.829282 kernel: audit: type=1400 audit(1742235696.793:993): avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.793000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.838079 kernel: Failed to create system directory fscache Mar 17 18:21:36.838167 kernel: audit: type=1400 audit(1742235696.793:993): avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.793000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.845454 kernel: Failed to create system directory fscache Mar 17 18:21:36.793000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.793000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.848843 kernel: Failed to create system directory fscache Mar 17 18:21:36.848940 kernel: Failed to create system directory fscache Mar 17 18:21:36.793000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.793000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.852296 kernel: Failed to create system directory fscache Mar 17 18:21:36.852372 kernel: Failed to create system directory fscache Mar 17 18:21:36.793000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.793000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.855646 kernel: Failed to create system directory fscache Mar 17 18:21:36.855807 kernel: Failed to create system directory fscache Mar 17 18:21:36.793000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.793000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.859043 kernel: Failed to create system directory fscache Mar 17 18:21:36.859116 kernel: Failed to create system directory fscache Mar 17 18:21:36.793000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.793000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.862439 kernel: Failed to create system directory fscache Mar 17 18:21:36.793000 audit[4464]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae90cf210 a1=4c344 a2=aaaaad73e028 a3=aaaae8ead010 items=0 ppid=1657 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:36.864849 kernel: FS-Cache: Loaded Mar 17 18:21:36.793000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.903834 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.903948 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.904015 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.907391 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.909131 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.910884 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.912614 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.912711 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.916053 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.916139 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.919529 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.919621 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.923072 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.923134 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.926407 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.926492 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.929839 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.931547 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.931644 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.934974 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.936696 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.936783 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.940136 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.940276 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.943526 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.943609 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.945887 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.948613 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.948741 kubelet[2212]: E0317 18:21:36.948699 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.950466 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.952211 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.952310 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.955690 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.957467 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.959183 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.960893 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.962612 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.962761 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.966051 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.967765 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.967894 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.971257 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.971349 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.973019 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.974728 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.978062 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.978143 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.981369 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.981421 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.984569 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.984650 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.987888 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.987965 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.989435 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.991128 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.992694 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.994408 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.995961 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.997648 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.999222 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.000977 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.004252 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.004338 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.007505 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.007559 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.010825 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.010932 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.014017 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.014070 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.017229 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.017331 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.018782 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.020483 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.023763 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.023843 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.027028 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.027112 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.030333 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.030392 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.031916 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.035138 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.035226 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.036701 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.038401 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.039962 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.041647 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.043208 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.044901 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.046466 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.048187 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.049741 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.051429 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.052995 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.054678 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.056244 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.057982 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.059602 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.061165 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.062909 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.066202 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.066258 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.069490 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.069550 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.072791 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.072882 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.076126 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.078575 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.078635 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.080325 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.083685 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.083835 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.087045 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.087182 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.088563 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.090433 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.093670 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.093851 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.097050 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.097149 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.104205 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.104369 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.104416 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.104484 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.105787 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.109240 kernel: Failed to create system directory sunrpc Mar 17 18:21:37.109333 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.110882 kernel: Failed to create system directory sunrpc Mar 17 18:21:36.892000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.124896 kernel: RPC: Registered named UNIX socket transport module. Mar 17 18:21:37.125035 kernel: RPC: Registered udp transport module. Mar 17 18:21:37.125161 kernel: RPC: Registered tcp transport module. Mar 17 18:21:37.128662 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Mar 17 18:21:36.892000 audit[4464]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae911b560 a1=14a6e4 a2=aaaaad73e028 a3=aaaae8ead010 items=6 ppid=1657 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:36.892000 audit: CWD cwd="/" Mar 17 18:21:36.892000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:21:36.892000 audit: PATH item=1 name=(null) inode=23671 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:21:36.892000 audit: PATH item=2 name=(null) inode=23671 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:21:36.892000 audit: PATH item=3 name=(null) inode=23672 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:21:36.892000 audit: PATH item=4 name=(null) inode=23671 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:21:36.892000 audit: PATH item=5 name=(null) inode=23673 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:21:36.892000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.178701 kernel: Failed to create system directory nfs Mar 17 18:21:37.178761 kernel: Failed to create system directory nfs Mar 17 18:21:37.178861 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.182062 kernel: Failed to create system directory nfs Mar 17 18:21:37.182172 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.185259 kernel: Failed to create system directory nfs Mar 17 18:21:37.185347 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.188410 kernel: Failed to create system directory nfs Mar 17 18:21:37.188460 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.190021 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.191624 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.194868 kernel: Failed to create system directory nfs Mar 17 18:21:37.194958 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.198049 kernel: Failed to create system directory nfs Mar 17 18:21:37.198098 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.201229 kernel: Failed to create system directory nfs Mar 17 18:21:37.201338 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.204416 kernel: Failed to create system directory nfs Mar 17 18:21:37.204516 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.206089 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.209332 kernel: Failed to create system directory nfs Mar 17 18:21:37.209384 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.210923 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.214043 kernel: Failed to create system directory nfs Mar 17 18:21:37.214161 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.215714 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.217335 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.220606 kernel: Failed to create system directory nfs Mar 17 18:21:37.220718 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.223698 kernel: Failed to create system directory nfs Mar 17 18:21:37.223752 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.225399 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.228511 kernel: Failed to create system directory nfs Mar 17 18:21:37.228638 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.230301 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.233622 kernel: Failed to create system directory nfs Mar 17 18:21:37.233675 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.236884 kernel: Failed to create system directory nfs Mar 17 18:21:37.236934 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.240021 kernel: Failed to create system directory nfs Mar 17 18:21:37.240120 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.243231 kernel: Failed to create system directory nfs Mar 17 18:21:37.243357 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.246460 kernel: Failed to create system directory nfs Mar 17 18:21:37.246595 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.249712 kernel: Failed to create system directory nfs Mar 17 18:21:37.249891 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.252994 kernel: Failed to create system directory nfs Mar 17 18:21:37.253121 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.256241 kernel: Failed to create system directory nfs Mar 17 18:21:37.256410 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.259484 kernel: Failed to create system directory nfs Mar 17 18:21:37.259645 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.262755 kernel: Failed to create system directory nfs Mar 17 18:21:37.262895 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.266030 kernel: Failed to create system directory nfs Mar 17 18:21:37.266217 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.269268 kernel: Failed to create system directory nfs Mar 17 18:21:37.269464 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.168000 audit[4464]: AVC avc: denied { confidentiality } for pid=4464 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.272485 kernel: Failed to create system directory nfs Mar 17 18:21:37.168000 audit[4464]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae92c4980 a1=116284 a2=aaaaad73e028 a3=aaaae8ead010 items=0 ppid=1657 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:37.304945 kernel: FS-Cache: Netfs 'nfs' registered for caching Mar 17 18:21:37.168000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.360035 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.360136 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.360178 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.360257 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.362931 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.363047 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.364551 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.366157 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.367747 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.369349 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.370957 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.372520 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.374134 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.377442 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.377544 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.379294 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.382735 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.382858 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.384456 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.386085 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.387780 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.391052 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.391111 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.394256 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.394306 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.395861 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.397469 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.399062 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.400650 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.402278 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.403914 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.407108 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.407209 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.408677 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.410313 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.411938 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.413502 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.415120 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.418608 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.418670 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.420225 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.421806 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.423463 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.425153 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.426663 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.428284 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.429929 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.433273 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.433333 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.436389 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.436484 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.437988 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.439571 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.441166 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.442785 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.444404 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.446034 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.447594 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.449265 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.452733 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.452791 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.454387 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.455998 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.457562 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.459189 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.460787 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.462398 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.464013 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.465643 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.467211 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.468857 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.470466 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.472082 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.473601 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.475260 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.476865 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.478482 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.481664 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.481715 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.483202 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.484877 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.486493 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.488145 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.489831 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.491487 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.494674 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.494778 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.496299 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.497924 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.499522 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.502697 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.502799 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.504310 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.505957 kernel: Failed to create system directory nfs4 Mar 17 18:21:37.343000 audit[4469]: AVC avc: denied { confidentiality } for pid=4469 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.714073 kernel: NFS: Registering the id_resolver key type Mar 17 18:21:37.714217 kernel: Key type id_resolver registered Mar 17 18:21:37.714262 kernel: Key type id_legacy registered Mar 17 18:21:37.343000 audit[4469]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff83d2a010 a1=19c514 a2=aaaae93de028 a3=aaab02d1b010 items=0 ppid=1657 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:37.343000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.737066 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.737152 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.737214 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.738592 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.740399 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.741924 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.743477 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.745192 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.748620 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.748717 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.751972 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.752074 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.753509 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.755191 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.758486 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.758536 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.760051 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.761735 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.765013 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.765064 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.768289 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.768394 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.769921 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.773155 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.773244 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.774722 kernel: Failed to create system directory rpcgss Mar 17 18:21:37.729000 audit[4470]: AVC avc: denied { confidentiality } for pid=4470 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:21:37.729000 audit[4470]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff8aaa2010 a1=5ee5c a2=aaaae21fe028 a3=aaab0d3b5010 items=0 ppid=1657 pid=4470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:37.729000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Mar 17 18:21:37.805867 nfsidmap[4477]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Mar 17 18:21:37.812349 nfsidmap[4478]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Mar 17 18:21:37.837000 audit[2016]: AVC avc: denied { watch_reads } for pid=2016 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3043 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:21:37.837000 audit[2016]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab08a26490 a2=10 a3=0 items=0 ppid=1 pid=2016 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:37.837000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Mar 17 18:21:37.837000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3043 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:21:37.837000 audit[2016]: AVC avc: denied { watch_reads } for pid=2016 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3043 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:21:37.837000 audit[2016]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab08a26490 a2=10 a3=0 items=0 ppid=1 pid=2016 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:37.837000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Mar 17 18:21:37.837000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3043 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:21:37.949014 kubelet[2212]: E0317 18:21:37.948951 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:38.110032 env[1818]: time="2025-03-17T18:21:38.109870503Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:df360884-54fb-40cd-831b-fabd65b8a0bb,Namespace:default,Attempt:0,}" Mar 17 18:21:38.355606 (udev-worker)[4465]: Network interface NamePolicy= disabled on kernel command line. Mar 17 18:21:38.362412 systemd-networkd[1531]: cali5ec59c6bf6e: Link UP Mar 17 18:21:38.368937 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:21:38.369073 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Mar 17 18:21:38.369330 systemd-networkd[1531]: cali5ec59c6bf6e: Gained carrier Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.215 [INFO][4483] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.27-k8s-test--pod--1-eth0 default df360884-54fb-40cd-831b-fabd65b8a0bb 1424 0 2025-03-17 18:21:04 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.22.27 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.27-k8s-test--pod--1-" Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.216 [INFO][4483] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.27-k8s-test--pod--1-eth0" Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.272 [INFO][4495] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef" HandleID="k8s-pod-network.dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef" Workload="172.31.22.27-k8s-test--pod--1-eth0" Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.292 [INFO][4495] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef" HandleID="k8s-pod-network.dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef" Workload="172.31.22.27-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400011d3f0), Attrs:map[string]string{"namespace":"default", "node":"172.31.22.27", "pod":"test-pod-1", "timestamp":"2025-03-17 18:21:38.272668375 +0000 UTC"}, Hostname:"172.31.22.27", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.292 [INFO][4495] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.293 [INFO][4495] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.293 [INFO][4495] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.27' Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.296 [INFO][4495] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef" host="172.31.22.27" Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.303 [INFO][4495] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.22.27" Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.312 [INFO][4495] ipam/ipam.go 489: Trying affinity for 192.168.27.0/26 host="172.31.22.27" Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.318 [INFO][4495] ipam/ipam.go 155: Attempting to load block cidr=192.168.27.0/26 host="172.31.22.27" Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.323 [INFO][4495] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.0/26 host="172.31.22.27" Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.323 [INFO][4495] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.0/26 handle="k8s-pod-network.dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef" host="172.31.22.27" Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.326 [INFO][4495] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.337 [INFO][4495] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.27.0/26 handle="k8s-pod-network.dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef" host="172.31.22.27" Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.349 [INFO][4495] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.27.4/26] block=192.168.27.0/26 handle="k8s-pod-network.dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef" host="172.31.22.27" Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.349 [INFO][4495] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.4/26] handle="k8s-pod-network.dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef" host="172.31.22.27" Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.349 [INFO][4495] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.349 [INFO][4495] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.27.4/26] IPv6=[] ContainerID="dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef" HandleID="k8s-pod-network.dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef" Workload="172.31.22.27-k8s-test--pod--1-eth0" Mar 17 18:21:38.396748 env[1818]: 2025-03-17 18:21:38.352 [INFO][4483] cni-plugin/k8s.go 386: Populated endpoint ContainerID="dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.27-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.27-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"df360884-54fb-40cd-831b-fabd65b8a0bb", ResourceVersion:"1424", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 21, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.27", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:21:38.398298 env[1818]: 2025-03-17 18:21:38.352 [INFO][4483] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.27.4/32] ContainerID="dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.27-k8s-test--pod--1-eth0" Mar 17 18:21:38.398298 env[1818]: 2025-03-17 18:21:38.352 [INFO][4483] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.27-k8s-test--pod--1-eth0" Mar 17 18:21:38.398298 env[1818]: 2025-03-17 18:21:38.371 [INFO][4483] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.27-k8s-test--pod--1-eth0" Mar 17 18:21:38.398298 env[1818]: 2025-03-17 18:21:38.378 [INFO][4483] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.27-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.27-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"df360884-54fb-40cd-831b-fabd65b8a0bb", ResourceVersion:"1424", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 21, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.27", ContainerID:"dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"2a:c6:33:36:e1:93", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:21:38.398298 env[1818]: 2025-03-17 18:21:38.393 [INFO][4483] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.27-k8s-test--pod--1-eth0" Mar 17 18:21:38.420381 env[1818]: time="2025-03-17T18:21:38.420257216Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:21:38.420714 env[1818]: time="2025-03-17T18:21:38.420658396Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:21:38.420941 env[1818]: time="2025-03-17T18:21:38.420880499Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:21:38.421457 env[1818]: time="2025-03-17T18:21:38.421391945Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef pid=4521 runtime=io.containerd.runc.v2 Mar 17 18:21:38.421000 audit[4518]: NETFILTER_CFG table=filter:100 family=2 entries=38 op=nft_register_chain pid=4518 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:21:38.421000 audit[4518]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19400 a0=3 a1=ffffed65c310 a2=0 a3=ffff8579bfa8 items=0 ppid=3968 pid=4518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:38.421000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:21:38.460007 systemd[1]: Started cri-containerd-dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef.scope. Mar 17 18:21:38.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.502000 audit: BPF prog-id=172 op=LOAD Mar 17 18:21:38.504000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.504000 audit[4532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4521 pid=4532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:38.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463306136303762393263313134633637646235343334396664393266 Mar 17 18:21:38.504000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.504000 audit[4532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4521 pid=4532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:38.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463306136303762393263313134633637646235343334396664393266 Mar 17 18:21:38.505000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.505000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.505000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.505000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.505000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.505000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.505000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.505000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.505000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.505000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.505000 audit: BPF prog-id=173 op=LOAD Mar 17 18:21:38.505000 audit[4532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4521 pid=4532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:38.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463306136303762393263313134633637646235343334396664393266 Mar 17 18:21:38.506000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.506000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.506000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.506000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.506000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.506000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.506000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.506000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.506000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.506000 audit: BPF prog-id=174 op=LOAD Mar 17 18:21:38.506000 audit[4532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4521 pid=4532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:38.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463306136303762393263313134633637646235343334396664393266 Mar 17 18:21:38.507000 audit: BPF prog-id=174 op=UNLOAD Mar 17 18:21:38.507000 audit: BPF prog-id=173 op=UNLOAD Mar 17 18:21:38.507000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.507000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.507000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.507000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.507000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.507000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.507000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.507000 audit[4532]: AVC avc: denied { perfmon } for pid=4532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.507000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.507000 audit[4532]: AVC avc: denied { bpf } for pid=4532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:38.507000 audit: BPF prog-id=175 op=LOAD Mar 17 18:21:38.507000 audit[4532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4521 pid=4532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:38.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463306136303762393263313134633637646235343334396664393266 Mar 17 18:21:38.554391 env[1818]: time="2025-03-17T18:21:38.554331626Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:df360884-54fb-40cd-831b-fabd65b8a0bb,Namespace:default,Attempt:0,} returns sandbox id \"dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef\"" Mar 17 18:21:38.557460 env[1818]: time="2025-03-17T18:21:38.557401007Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Mar 17 18:21:38.896312 env[1818]: time="2025-03-17T18:21:38.896247456Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:21:38.898444 env[1818]: time="2025-03-17T18:21:38.898380839Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:f660a383148a8217a75a455efeb8bfd4cbe3afa737712cc0e25f27c03b770dd4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:21:38.901861 env[1818]: time="2025-03-17T18:21:38.901762215Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:21:38.906350 env[1818]: time="2025-03-17T18:21:38.906297889Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:b927c62cc716b99bce51774b46a63feb63f5414c6f985fb80cacd1933bbd0e06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:21:38.908238 env[1818]: time="2025-03-17T18:21:38.908180133Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f660a383148a8217a75a455efeb8bfd4cbe3afa737712cc0e25f27c03b770dd4\"" Mar 17 18:21:38.912925 env[1818]: time="2025-03-17T18:21:38.912863940Z" level=info msg="CreateContainer within sandbox \"dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef\" for container &ContainerMetadata{Name:test,Attempt:0,}" Mar 17 18:21:38.933891 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2527641561.mount: Deactivated successfully. Mar 17 18:21:38.947535 env[1818]: time="2025-03-17T18:21:38.947451123Z" level=info msg="CreateContainer within sandbox \"dc0a607b92c114c67db54349fd92f044af600334f6daf4d00f1d2aaec6e6e7ef\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"0b6a4eaaaf339c56007bff80eabd27743ba388d9fb484dfe418196218823b231\"" Mar 17 18:21:38.948489 env[1818]: time="2025-03-17T18:21:38.948422145Z" level=info msg="StartContainer for \"0b6a4eaaaf339c56007bff80eabd27743ba388d9fb484dfe418196218823b231\"" Mar 17 18:21:38.949462 kubelet[2212]: E0317 18:21:38.949408 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:38.991967 systemd[1]: Started cri-containerd-0b6a4eaaaf339c56007bff80eabd27743ba388d9fb484dfe418196218823b231.scope. Mar 17 18:21:39.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.024000 audit: BPF prog-id=176 op=LOAD Mar 17 18:21:39.025000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.025000 audit[4565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4521 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:39.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062366134656161616633333963353630303762666638306561626432 Mar 17 18:21:39.026000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.026000 audit[4565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4521 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:39.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062366134656161616633333963353630303762666638306561626432 Mar 17 18:21:39.027000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.027000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.027000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.027000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.027000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.027000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.027000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.027000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.027000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.027000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.027000 audit: BPF prog-id=177 op=LOAD Mar 17 18:21:39.027000 audit[4565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4521 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:39.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062366134656161616633333963353630303762666638306561626432 Mar 17 18:21:39.028000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.028000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.028000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.028000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.028000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.028000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.028000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.028000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.028000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.028000 audit: BPF prog-id=178 op=LOAD Mar 17 18:21:39.028000 audit[4565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4521 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:39.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062366134656161616633333963353630303762666638306561626432 Mar 17 18:21:39.030000 audit: BPF prog-id=178 op=UNLOAD Mar 17 18:21:39.030000 audit: BPF prog-id=177 op=UNLOAD Mar 17 18:21:39.030000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.030000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.030000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.030000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.030000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.030000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.030000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.030000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.030000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.030000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:21:39.030000 audit: BPF prog-id=179 op=LOAD Mar 17 18:21:39.030000 audit[4565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4521 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:21:39.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062366134656161616633333963353630303762666638306561626432 Mar 17 18:21:39.058150 env[1818]: time="2025-03-17T18:21:39.058086927Z" level=info msg="StartContainer for \"0b6a4eaaaf339c56007bff80eabd27743ba388d9fb484dfe418196218823b231\" returns successfully" Mar 17 18:21:39.545512 kubelet[2212]: I0317 18:21:39.545434 2212 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=35.191664812 podStartE2EDuration="35.545413935s" podCreationTimestamp="2025-03-17 18:21:04 +0000 UTC" firstStartedPulling="2025-03-17 18:21:38.556755203 +0000 UTC m=+87.582366479" lastFinishedPulling="2025-03-17 18:21:38.910504314 +0000 UTC m=+87.936115602" observedRunningTime="2025-03-17 18:21:39.545282635 +0000 UTC m=+88.570893923" watchObservedRunningTime="2025-03-17 18:21:39.545413935 +0000 UTC m=+88.571025211" Mar 17 18:21:39.816773 systemd-networkd[1531]: cali5ec59c6bf6e: Gained IPv6LL Mar 17 18:21:39.950235 kubelet[2212]: E0317 18:21:39.950192 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:40.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.22.27:22-60.188.44.206:12698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:21:40.552516 systemd[1]: Started sshd@8-172.31.22.27:22-60.188.44.206:12698.service. Mar 17 18:21:40.951519 kubelet[2212]: E0317 18:21:40.951371 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:41.952415 kubelet[2212]: E0317 18:21:41.952356 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:42.952910 kubelet[2212]: E0317 18:21:42.952867 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:43.091461 sshd[4613]: Received disconnect from 60.188.44.206 port 12698:11: Bye Bye [preauth] Mar 17 18:21:43.091461 sshd[4613]: Disconnected from 60.188.44.206 port 12698 [preauth] Mar 17 18:21:43.093224 systemd[1]: sshd@8-172.31.22.27:22-60.188.44.206:12698.service: Deactivated successfully. Mar 17 18:21:43.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.22.27:22-60.188.44.206:12698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:21:43.096019 kernel: kauditd_printk_skb: 459 callbacks suppressed Mar 17 18:21:43.096079 kernel: audit: type=1131 audit(1742235703.092:1040): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.22.27:22-60.188.44.206:12698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:21:43.953973 kubelet[2212]: E0317 18:21:43.953903 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:44.954569 kubelet[2212]: E0317 18:21:44.954504 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:21:45.955516 kubelet[2212]: E0317 18:21:45.955471 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"