Sep 6 00:23:42.002379 kernel: Linux version 5.15.190-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Sep 5 22:53:38 -00 2025 Sep 6 00:23:42.002416 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 00:23:42.002434 kernel: BIOS-provided physical RAM map: Sep 6 00:23:42.002446 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Sep 6 00:23:42.002457 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000786cdfff] usable Sep 6 00:23:42.002468 kernel: BIOS-e820: [mem 0x00000000786ce000-0x000000007894dfff] reserved Sep 6 00:23:42.002482 kernel: BIOS-e820: [mem 0x000000007894e000-0x000000007895dfff] ACPI data Sep 6 00:23:42.002494 kernel: BIOS-e820: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS Sep 6 00:23:42.002508 kernel: BIOS-e820: [mem 0x00000000789de000-0x000000007c97bfff] usable Sep 6 00:23:42.002520 kernel: BIOS-e820: [mem 0x000000007c97c000-0x000000007c9fffff] reserved Sep 6 00:23:42.002532 kernel: NX (Execute Disable) protection: active Sep 6 00:23:42.002543 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable Sep 6 00:23:42.002555 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable Sep 6 00:23:42.002583 kernel: extended physical RAM map: Sep 6 00:23:42.002601 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Sep 6 00:23:42.002613 kernel: reserve setup_data: [mem 0x0000000000100000-0x0000000076813017] usable Sep 6 00:23:42.002626 kernel: reserve setup_data: [mem 0x0000000076813018-0x000000007681be57] usable Sep 6 00:23:42.002639 kernel: reserve setup_data: [mem 0x000000007681be58-0x00000000786cdfff] usable Sep 6 00:23:42.002651 kernel: reserve setup_data: [mem 0x00000000786ce000-0x000000007894dfff] reserved Sep 6 00:23:42.002664 kernel: reserve setup_data: [mem 0x000000007894e000-0x000000007895dfff] ACPI data Sep 6 00:23:42.002677 kernel: reserve setup_data: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS Sep 6 00:23:42.002690 kernel: reserve setup_data: [mem 0x00000000789de000-0x000000007c97bfff] usable Sep 6 00:23:42.002702 kernel: reserve setup_data: [mem 0x000000007c97c000-0x000000007c9fffff] reserved Sep 6 00:23:42.002715 kernel: efi: EFI v2.70 by EDK II Sep 6 00:23:42.002730 kernel: efi: SMBIOS=0x7886a000 ACPI=0x7895d000 ACPI 2.0=0x7895d014 MEMATTR=0x77004a98 Sep 6 00:23:42.002743 kernel: SMBIOS 2.7 present. Sep 6 00:23:42.002755 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Sep 6 00:23:42.002768 kernel: Hypervisor detected: KVM Sep 6 00:23:42.002780 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Sep 6 00:23:42.002793 kernel: kvm-clock: cpu 0, msr 4819f001, primary cpu clock Sep 6 00:23:42.002806 kernel: kvm-clock: using sched offset of 4558754906 cycles Sep 6 00:23:42.002819 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Sep 6 00:23:42.002832 kernel: tsc: Detected 2500.028 MHz processor Sep 6 00:23:42.002846 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 6 00:23:42.002858 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 6 00:23:42.002874 kernel: last_pfn = 0x7c97c max_arch_pfn = 0x400000000 Sep 6 00:23:42.002887 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 6 00:23:42.002900 kernel: Using GB pages for direct mapping Sep 6 00:23:42.002913 kernel: Secure boot disabled Sep 6 00:23:42.002926 kernel: ACPI: Early table checksum verification disabled Sep 6 00:23:42.002945 kernel: ACPI: RSDP 0x000000007895D014 000024 (v02 AMAZON) Sep 6 00:23:42.002959 kernel: ACPI: XSDT 0x000000007895C0E8 00006C (v01 AMAZON AMZNFACP 00000001 01000013) Sep 6 00:23:42.002976 kernel: ACPI: FACP 0x0000000078955000 000114 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Sep 6 00:23:42.002989 kernel: ACPI: DSDT 0x0000000078956000 00115A (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Sep 6 00:23:42.003003 kernel: ACPI: FACS 0x00000000789D0000 000040 Sep 6 00:23:42.003017 kernel: ACPI: WAET 0x000000007895B000 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Sep 6 00:23:42.003031 kernel: ACPI: SLIT 0x000000007895A000 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Sep 6 00:23:42.003043 kernel: ACPI: APIC 0x0000000078959000 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Sep 6 00:23:42.003054 kernel: ACPI: SRAT 0x0000000078958000 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Sep 6 00:23:42.003068 kernel: ACPI: HPET 0x0000000078954000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Sep 6 00:23:42.003081 kernel: ACPI: SSDT 0x0000000078953000 000759 (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Sep 6 00:23:42.003093 kernel: ACPI: SSDT 0x0000000078952000 00007F (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Sep 6 00:23:42.003105 kernel: ACPI: BGRT 0x0000000078951000 000038 (v01 AMAZON AMAZON 00000002 01000013) Sep 6 00:23:42.003118 kernel: ACPI: Reserving FACP table memory at [mem 0x78955000-0x78955113] Sep 6 00:23:42.003130 kernel: ACPI: Reserving DSDT table memory at [mem 0x78956000-0x78957159] Sep 6 00:23:42.003142 kernel: ACPI: Reserving FACS table memory at [mem 0x789d0000-0x789d003f] Sep 6 00:23:42.003155 kernel: ACPI: Reserving WAET table memory at [mem 0x7895b000-0x7895b027] Sep 6 00:23:42.003167 kernel: ACPI: Reserving SLIT table memory at [mem 0x7895a000-0x7895a06b] Sep 6 00:23:42.003181 kernel: ACPI: Reserving APIC table memory at [mem 0x78959000-0x78959075] Sep 6 00:23:42.003194 kernel: ACPI: Reserving SRAT table memory at [mem 0x78958000-0x7895809f] Sep 6 00:23:42.003206 kernel: ACPI: Reserving HPET table memory at [mem 0x78954000-0x78954037] Sep 6 00:23:42.003218 kernel: ACPI: Reserving SSDT table memory at [mem 0x78953000-0x78953758] Sep 6 00:23:42.003231 kernel: ACPI: Reserving SSDT table memory at [mem 0x78952000-0x7895207e] Sep 6 00:23:42.003243 kernel: ACPI: Reserving BGRT table memory at [mem 0x78951000-0x78951037] Sep 6 00:23:42.003255 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Sep 6 00:23:42.003267 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Sep 6 00:23:42.003279 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Sep 6 00:23:42.003294 kernel: NUMA: Initialized distance table, cnt=1 Sep 6 00:23:42.003306 kernel: NODE_DATA(0) allocated [mem 0x7a8ef000-0x7a8f4fff] Sep 6 00:23:42.003318 kernel: Zone ranges: Sep 6 00:23:42.003331 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 6 00:23:42.003342 kernel: DMA32 [mem 0x0000000001000000-0x000000007c97bfff] Sep 6 00:23:42.003354 kernel: Normal empty Sep 6 00:23:42.003366 kernel: Movable zone start for each node Sep 6 00:23:42.003378 kernel: Early memory node ranges Sep 6 00:23:42.003390 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Sep 6 00:23:42.003405 kernel: node 0: [mem 0x0000000000100000-0x00000000786cdfff] Sep 6 00:23:42.003417 kernel: node 0: [mem 0x00000000789de000-0x000000007c97bfff] Sep 6 00:23:42.003430 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007c97bfff] Sep 6 00:23:42.003443 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 6 00:23:42.003455 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Sep 6 00:23:42.003467 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Sep 6 00:23:42.003480 kernel: On node 0, zone DMA32: 13956 pages in unavailable ranges Sep 6 00:23:42.003492 kernel: ACPI: PM-Timer IO Port: 0xb008 Sep 6 00:23:42.003504 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Sep 6 00:23:42.003518 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Sep 6 00:23:42.003530 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Sep 6 00:23:42.003543 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 6 00:23:42.003555 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Sep 6 00:23:42.003595 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Sep 6 00:23:42.003615 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 6 00:23:42.003626 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Sep 6 00:23:42.003638 kernel: TSC deadline timer available Sep 6 00:23:42.003651 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Sep 6 00:23:42.003666 kernel: [mem 0x7ca00000-0xffffffff] available for PCI devices Sep 6 00:23:42.003678 kernel: Booting paravirtualized kernel on KVM Sep 6 00:23:42.003691 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 6 00:23:42.003703 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Sep 6 00:23:42.003715 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Sep 6 00:23:42.003727 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Sep 6 00:23:42.003739 kernel: pcpu-alloc: [0] 0 1 Sep 6 00:23:42.003751 kernel: kvm-guest: stealtime: cpu 0, msr 7a41c0c0 Sep 6 00:23:42.003764 kernel: kvm-guest: PV spinlocks enabled Sep 6 00:23:42.003779 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Sep 6 00:23:42.003791 kernel: Built 1 zonelists, mobility grouping on. Total pages: 501318 Sep 6 00:23:42.003803 kernel: Policy zone: DMA32 Sep 6 00:23:42.003817 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 00:23:42.003830 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 6 00:23:42.003842 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 6 00:23:42.003855 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Sep 6 00:23:42.003866 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 6 00:23:42.003883 kernel: Memory: 1876640K/2037804K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47492K init, 4088K bss, 160904K reserved, 0K cma-reserved) Sep 6 00:23:42.003895 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Sep 6 00:23:42.003907 kernel: Kernel/User page tables isolation: enabled Sep 6 00:23:42.003919 kernel: ftrace: allocating 34612 entries in 136 pages Sep 6 00:23:42.003931 kernel: ftrace: allocated 136 pages with 2 groups Sep 6 00:23:42.003943 kernel: rcu: Hierarchical RCU implementation. Sep 6 00:23:42.003957 kernel: rcu: RCU event tracing is enabled. Sep 6 00:23:42.003983 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Sep 6 00:23:42.003997 kernel: Rude variant of Tasks RCU enabled. Sep 6 00:23:42.004010 kernel: Tracing variant of Tasks RCU enabled. Sep 6 00:23:42.004023 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 6 00:23:42.004035 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Sep 6 00:23:42.004050 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Sep 6 00:23:42.004063 kernel: random: crng init done Sep 6 00:23:42.004076 kernel: Console: colour dummy device 80x25 Sep 6 00:23:42.004088 kernel: printk: console [tty0] enabled Sep 6 00:23:42.004101 kernel: printk: console [ttyS0] enabled Sep 6 00:23:42.004114 kernel: ACPI: Core revision 20210730 Sep 6 00:23:42.004127 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Sep 6 00:23:42.004141 kernel: APIC: Switch to symmetric I/O mode setup Sep 6 00:23:42.004153 kernel: x2apic enabled Sep 6 00:23:42.004166 kernel: Switched APIC routing to physical x2apic. Sep 6 00:23:42.004215 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24095442462, max_idle_ns: 440795230051 ns Sep 6 00:23:42.004228 kernel: Calibrating delay loop (skipped) preset value.. 5000.05 BogoMIPS (lpj=2500028) Sep 6 00:23:42.004267 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Sep 6 00:23:42.004280 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 Sep 6 00:23:42.004321 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 6 00:23:42.004334 kernel: Spectre V2 : Mitigation: Retpolines Sep 6 00:23:42.004347 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Sep 6 00:23:42.004386 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Sep 6 00:23:42.004399 kernel: RETBleed: Vulnerable Sep 6 00:23:42.004439 kernel: Speculative Store Bypass: Vulnerable Sep 6 00:23:42.004453 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Sep 6 00:23:42.004491 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Sep 6 00:23:42.004504 kernel: GDS: Unknown: Dependent on hypervisor status Sep 6 00:23:42.004517 kernel: active return thunk: its_return_thunk Sep 6 00:23:42.004553 kernel: ITS: Mitigation: Aligned branch/return thunks Sep 6 00:23:42.004580 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 6 00:23:42.004594 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 6 00:23:42.004608 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 6 00:23:42.004622 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Sep 6 00:23:42.004636 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Sep 6 00:23:42.004650 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Sep 6 00:23:42.004665 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Sep 6 00:23:42.004680 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Sep 6 00:23:42.004694 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Sep 6 00:23:42.004709 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 6 00:23:42.004724 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Sep 6 00:23:42.004741 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Sep 6 00:23:42.004756 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Sep 6 00:23:42.004771 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Sep 6 00:23:42.004786 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Sep 6 00:23:42.004801 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Sep 6 00:23:42.004815 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Sep 6 00:23:42.004830 kernel: Freeing SMP alternatives memory: 32K Sep 6 00:23:42.004845 kernel: pid_max: default: 32768 minimum: 301 Sep 6 00:23:42.004859 kernel: LSM: Security Framework initializing Sep 6 00:23:42.004874 kernel: SELinux: Initializing. Sep 6 00:23:42.004889 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 6 00:23:42.004906 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 6 00:23:42.004921 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Sep 6 00:23:42.004937 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Sep 6 00:23:42.004952 kernel: signal: max sigframe size: 3632 Sep 6 00:23:42.004966 kernel: rcu: Hierarchical SRCU implementation. Sep 6 00:23:42.004981 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Sep 6 00:23:42.004996 kernel: smp: Bringing up secondary CPUs ... Sep 6 00:23:42.005011 kernel: x86: Booting SMP configuration: Sep 6 00:23:42.005026 kernel: .... node #0, CPUs: #1 Sep 6 00:23:42.005040 kernel: kvm-clock: cpu 1, msr 4819f041, secondary cpu clock Sep 6 00:23:42.005058 kernel: kvm-guest: stealtime: cpu 1, msr 7a51c0c0 Sep 6 00:23:42.005075 kernel: Transient Scheduler Attacks: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Sep 6 00:23:42.005090 kernel: Transient Scheduler Attacks: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Sep 6 00:23:42.005105 kernel: smp: Brought up 1 node, 2 CPUs Sep 6 00:23:42.005120 kernel: smpboot: Max logical packages: 1 Sep 6 00:23:42.005135 kernel: smpboot: Total of 2 processors activated (10000.11 BogoMIPS) Sep 6 00:23:42.005150 kernel: devtmpfs: initialized Sep 6 00:23:42.005165 kernel: x86/mm: Memory block size: 128MB Sep 6 00:23:42.005183 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7895e000-0x789ddfff] (524288 bytes) Sep 6 00:23:42.005198 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 6 00:23:42.005213 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Sep 6 00:23:42.005228 kernel: pinctrl core: initialized pinctrl subsystem Sep 6 00:23:42.005243 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 6 00:23:42.005258 kernel: audit: initializing netlink subsys (disabled) Sep 6 00:23:42.005273 kernel: audit: type=2000 audit(1757118222.257:1): state=initialized audit_enabled=0 res=1 Sep 6 00:23:42.005287 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 6 00:23:42.005303 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 6 00:23:42.005320 kernel: cpuidle: using governor menu Sep 6 00:23:42.005335 kernel: ACPI: bus type PCI registered Sep 6 00:23:42.005351 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 6 00:23:42.005366 kernel: dca service started, version 1.12.1 Sep 6 00:23:42.005381 kernel: PCI: Using configuration type 1 for base access Sep 6 00:23:42.005396 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 6 00:23:42.005411 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 6 00:23:42.005426 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 6 00:23:42.005441 kernel: ACPI: Added _OSI(Module Device) Sep 6 00:23:42.005459 kernel: ACPI: Added _OSI(Processor Device) Sep 6 00:23:42.005474 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 6 00:23:42.005489 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 6 00:23:42.005504 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 6 00:23:42.005519 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 6 00:23:42.005533 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Sep 6 00:23:42.005548 kernel: ACPI: Interpreter enabled Sep 6 00:23:42.005577 kernel: ACPI: PM: (supports S0 S5) Sep 6 00:23:42.005589 kernel: ACPI: Using IOAPIC for interrupt routing Sep 6 00:23:42.005605 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 6 00:23:42.005618 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Sep 6 00:23:42.005631 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Sep 6 00:23:42.005839 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Sep 6 00:23:42.005967 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Sep 6 00:23:42.005983 kernel: acpiphp: Slot [3] registered Sep 6 00:23:42.005997 kernel: acpiphp: Slot [4] registered Sep 6 00:23:42.006009 kernel: acpiphp: Slot [5] registered Sep 6 00:23:42.006025 kernel: acpiphp: Slot [6] registered Sep 6 00:23:42.006038 kernel: acpiphp: Slot [7] registered Sep 6 00:23:42.006051 kernel: acpiphp: Slot [8] registered Sep 6 00:23:42.006064 kernel: acpiphp: Slot [9] registered Sep 6 00:23:42.006076 kernel: acpiphp: Slot [10] registered Sep 6 00:23:42.006090 kernel: acpiphp: Slot [11] registered Sep 6 00:23:42.006103 kernel: acpiphp: Slot [12] registered Sep 6 00:23:42.006116 kernel: acpiphp: Slot [13] registered Sep 6 00:23:42.006129 kernel: acpiphp: Slot [14] registered Sep 6 00:23:42.006144 kernel: acpiphp: Slot [15] registered Sep 6 00:23:42.006157 kernel: acpiphp: Slot [16] registered Sep 6 00:23:42.006171 kernel: acpiphp: Slot [17] registered Sep 6 00:23:42.006184 kernel: acpiphp: Slot [18] registered Sep 6 00:23:42.006197 kernel: acpiphp: Slot [19] registered Sep 6 00:23:42.006209 kernel: acpiphp: Slot [20] registered Sep 6 00:23:42.006222 kernel: acpiphp: Slot [21] registered Sep 6 00:23:42.006234 kernel: acpiphp: Slot [22] registered Sep 6 00:23:42.006248 kernel: acpiphp: Slot [23] registered Sep 6 00:23:42.006260 kernel: acpiphp: Slot [24] registered Sep 6 00:23:42.006275 kernel: acpiphp: Slot [25] registered Sep 6 00:23:42.006288 kernel: acpiphp: Slot [26] registered Sep 6 00:23:42.006301 kernel: acpiphp: Slot [27] registered Sep 6 00:23:42.006315 kernel: acpiphp: Slot [28] registered Sep 6 00:23:42.006328 kernel: acpiphp: Slot [29] registered Sep 6 00:23:42.006340 kernel: acpiphp: Slot [30] registered Sep 6 00:23:42.006353 kernel: acpiphp: Slot [31] registered Sep 6 00:23:42.006366 kernel: PCI host bridge to bus 0000:00 Sep 6 00:23:42.006484 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Sep 6 00:23:42.006611 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Sep 6 00:23:42.006718 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Sep 6 00:23:42.006826 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Sep 6 00:23:42.006931 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x2000ffffffff window] Sep 6 00:23:42.007039 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Sep 6 00:23:42.007173 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Sep 6 00:23:42.012658 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Sep 6 00:23:42.012844 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Sep 6 00:23:42.012978 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Sep 6 00:23:42.013109 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Sep 6 00:23:42.013238 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Sep 6 00:23:42.013367 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Sep 6 00:23:42.013496 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Sep 6 00:23:42.013692 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Sep 6 00:23:42.013818 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Sep 6 00:23:42.013948 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Sep 6 00:23:42.014070 kernel: pci 0000:00:03.0: reg 0x10: [mem 0x80000000-0x803fffff pref] Sep 6 00:23:42.014186 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Sep 6 00:23:42.014302 kernel: pci 0000:00:03.0: BAR 0: assigned to efifb Sep 6 00:23:42.014417 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Sep 6 00:23:42.014551 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Sep 6 00:23:42.014682 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80404000-0x80407fff] Sep 6 00:23:42.014804 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Sep 6 00:23:42.014942 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80400000-0x80403fff] Sep 6 00:23:42.014962 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Sep 6 00:23:42.014978 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Sep 6 00:23:42.014993 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Sep 6 00:23:42.015012 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Sep 6 00:23:42.015027 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Sep 6 00:23:42.015041 kernel: iommu: Default domain type: Translated Sep 6 00:23:42.015056 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 6 00:23:42.015183 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Sep 6 00:23:42.016693 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Sep 6 00:23:42.016848 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Sep 6 00:23:42.016869 kernel: vgaarb: loaded Sep 6 00:23:42.016891 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 6 00:23:42.016907 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 6 00:23:42.016922 kernel: PTP clock support registered Sep 6 00:23:42.016938 kernel: Registered efivars operations Sep 6 00:23:42.016953 kernel: PCI: Using ACPI for IRQ routing Sep 6 00:23:42.016968 kernel: PCI: pci_cache_line_size set to 64 bytes Sep 6 00:23:42.016984 kernel: e820: reserve RAM buffer [mem 0x76813018-0x77ffffff] Sep 6 00:23:42.016998 kernel: e820: reserve RAM buffer [mem 0x786ce000-0x7bffffff] Sep 6 00:23:42.017014 kernel: e820: reserve RAM buffer [mem 0x7c97c000-0x7fffffff] Sep 6 00:23:42.017031 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Sep 6 00:23:42.017046 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Sep 6 00:23:42.017062 kernel: clocksource: Switched to clocksource kvm-clock Sep 6 00:23:42.017077 kernel: VFS: Disk quotas dquot_6.6.0 Sep 6 00:23:42.017092 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 6 00:23:42.017108 kernel: pnp: PnP ACPI init Sep 6 00:23:42.017123 kernel: pnp: PnP ACPI: found 5 devices Sep 6 00:23:42.017138 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 6 00:23:42.017153 kernel: NET: Registered PF_INET protocol family Sep 6 00:23:42.017171 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 6 00:23:42.017186 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Sep 6 00:23:42.017201 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 6 00:23:42.017217 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 6 00:23:42.017232 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Sep 6 00:23:42.017247 kernel: TCP: Hash tables configured (established 16384 bind 16384) Sep 6 00:23:42.017262 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 6 00:23:42.017278 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 6 00:23:42.017292 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 6 00:23:42.017311 kernel: NET: Registered PF_XDP protocol family Sep 6 00:23:42.017454 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Sep 6 00:23:42.017596 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Sep 6 00:23:42.017724 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Sep 6 00:23:42.017850 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Sep 6 00:23:42.017974 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x2000ffffffff window] Sep 6 00:23:42.018116 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Sep 6 00:23:42.018254 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Sep 6 00:23:42.018277 kernel: PCI: CLS 0 bytes, default 64 Sep 6 00:23:42.018293 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Sep 6 00:23:42.018308 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24095442462, max_idle_ns: 440795230051 ns Sep 6 00:23:42.018323 kernel: clocksource: Switched to clocksource tsc Sep 6 00:23:42.018338 kernel: Initialise system trusted keyrings Sep 6 00:23:42.018352 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Sep 6 00:23:42.018368 kernel: Key type asymmetric registered Sep 6 00:23:42.018382 kernel: Asymmetric key parser 'x509' registered Sep 6 00:23:42.018400 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 6 00:23:42.018415 kernel: io scheduler mq-deadline registered Sep 6 00:23:42.018431 kernel: io scheduler kyber registered Sep 6 00:23:42.018446 kernel: io scheduler bfq registered Sep 6 00:23:42.018461 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 6 00:23:42.018476 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 6 00:23:42.018492 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 6 00:23:42.018507 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Sep 6 00:23:42.018522 kernel: i8042: Warning: Keylock active Sep 6 00:23:42.018539 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Sep 6 00:23:42.018554 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Sep 6 00:23:42.018724 kernel: rtc_cmos 00:00: RTC can wake from S4 Sep 6 00:23:42.018856 kernel: rtc_cmos 00:00: registered as rtc0 Sep 6 00:23:42.018982 kernel: rtc_cmos 00:00: setting system clock to 2025-09-06T00:23:41 UTC (1757118221) Sep 6 00:23:42.019107 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Sep 6 00:23:42.019126 kernel: intel_pstate: CPU model not supported Sep 6 00:23:42.019141 kernel: efifb: probing for efifb Sep 6 00:23:42.019160 kernel: efifb: framebuffer at 0x80000000, using 1876k, total 1875k Sep 6 00:23:42.019175 kernel: efifb: mode is 800x600x32, linelength=3200, pages=1 Sep 6 00:23:42.019190 kernel: efifb: scrolling: redraw Sep 6 00:23:42.019205 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Sep 6 00:23:42.019220 kernel: Console: switching to colour frame buffer device 100x37 Sep 6 00:23:42.019236 kernel: fb0: EFI VGA frame buffer device Sep 6 00:23:42.019275 kernel: pstore: Registered efi as persistent store backend Sep 6 00:23:42.019292 kernel: NET: Registered PF_INET6 protocol family Sep 6 00:23:42.019303 kernel: Segment Routing with IPv6 Sep 6 00:23:42.019318 kernel: In-situ OAM (IOAM) with IPv6 Sep 6 00:23:42.019332 kernel: NET: Registered PF_PACKET protocol family Sep 6 00:23:42.019346 kernel: Key type dns_resolver registered Sep 6 00:23:42.019359 kernel: IPI shorthand broadcast: enabled Sep 6 00:23:42.019373 kernel: sched_clock: Marking stable (355252477, 137101879)->(578041049, -85686693) Sep 6 00:23:42.019387 kernel: registered taskstats version 1 Sep 6 00:23:42.019401 kernel: Loading compiled-in X.509 certificates Sep 6 00:23:42.019414 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.190-flatcar: 59a3efd48c75422889eb056cb9758fbe471623cb' Sep 6 00:23:42.019428 kernel: Key type .fscrypt registered Sep 6 00:23:42.019444 kernel: Key type fscrypt-provisioning registered Sep 6 00:23:42.019458 kernel: pstore: Using crash dump compression: deflate Sep 6 00:23:42.019471 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 6 00:23:42.019485 kernel: ima: Allocated hash algorithm: sha1 Sep 6 00:23:42.019498 kernel: ima: No architecture policies found Sep 6 00:23:42.019512 kernel: clk: Disabling unused clocks Sep 6 00:23:42.019526 kernel: Freeing unused kernel image (initmem) memory: 47492K Sep 6 00:23:42.019539 kernel: Write protecting the kernel read-only data: 28672k Sep 6 00:23:42.019553 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Sep 6 00:23:42.022878 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Sep 6 00:23:42.022893 kernel: Run /init as init process Sep 6 00:23:42.022910 kernel: with arguments: Sep 6 00:23:42.022923 kernel: /init Sep 6 00:23:42.022936 kernel: with environment: Sep 6 00:23:42.022950 kernel: HOME=/ Sep 6 00:23:42.022964 kernel: TERM=linux Sep 6 00:23:42.022978 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 6 00:23:42.022997 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 00:23:42.023018 systemd[1]: Detected virtualization amazon. Sep 6 00:23:42.023032 systemd[1]: Detected architecture x86-64. Sep 6 00:23:42.023047 systemd[1]: Running in initrd. Sep 6 00:23:42.023060 systemd[1]: No hostname configured, using default hostname. Sep 6 00:23:42.023073 systemd[1]: Hostname set to . Sep 6 00:23:42.023088 systemd[1]: Initializing machine ID from VM UUID. Sep 6 00:23:42.023103 systemd[1]: Queued start job for default target initrd.target. Sep 6 00:23:42.023120 systemd[1]: Started systemd-ask-password-console.path. Sep 6 00:23:42.023136 systemd[1]: Reached target cryptsetup.target. Sep 6 00:23:42.023152 systemd[1]: Reached target paths.target. Sep 6 00:23:42.023168 systemd[1]: Reached target slices.target. Sep 6 00:23:42.023184 systemd[1]: Reached target swap.target. Sep 6 00:23:42.023204 systemd[1]: Reached target timers.target. Sep 6 00:23:42.023220 systemd[1]: Listening on iscsid.socket. Sep 6 00:23:42.023237 systemd[1]: Listening on iscsiuio.socket. Sep 6 00:23:42.023254 systemd[1]: Listening on systemd-journald-audit.socket. Sep 6 00:23:42.023271 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 6 00:23:42.023288 systemd[1]: Listening on systemd-journald.socket. Sep 6 00:23:42.023305 systemd[1]: Listening on systemd-networkd.socket. Sep 6 00:23:42.023322 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 00:23:42.023341 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 00:23:42.023360 systemd[1]: Reached target sockets.target. Sep 6 00:23:42.023377 systemd[1]: Starting kmod-static-nodes.service... Sep 6 00:23:42.023395 systemd[1]: Finished network-cleanup.service. Sep 6 00:23:42.023411 systemd[1]: Starting systemd-fsck-usr.service... Sep 6 00:23:42.023428 systemd[1]: Starting systemd-journald.service... Sep 6 00:23:42.023445 systemd[1]: Starting systemd-modules-load.service... Sep 6 00:23:42.023462 systemd[1]: Starting systemd-resolved.service... Sep 6 00:23:42.023480 systemd[1]: Starting systemd-vconsole-setup.service... Sep 6 00:23:42.023499 systemd[1]: Finished kmod-static-nodes.service. Sep 6 00:23:42.023516 kernel: audit: type=1130 audit(1757118221.994:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.023533 systemd[1]: Finished systemd-fsck-usr.service. Sep 6 00:23:42.023550 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Sep 6 00:23:42.023577 kernel: audit: type=1130 audit(1757118222.014:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.023597 systemd-journald[185]: Journal started Sep 6 00:23:42.023686 systemd-journald[185]: Runtime Journal (/run/log/journal/ec28dec6cb56c70d68d38e7d079ef519) is 4.8M, max 38.3M, 33.5M free. Sep 6 00:23:41.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.004244 systemd-modules-load[186]: Inserted module 'overlay' Sep 6 00:23:42.037159 systemd[1]: Finished systemd-vconsole-setup.service. Sep 6 00:23:42.037194 systemd[1]: Started systemd-journald.service. Sep 6 00:23:42.037216 kernel: audit: type=1130 audit(1757118222.026:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.045068 systemd[1]: Starting dracut-cmdline-ask.service... Sep 6 00:23:42.050593 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 6 00:23:42.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.067168 systemd-resolved[187]: Positive Trust Anchors: Sep 6 00:23:42.073315 kernel: audit: type=1130 audit(1757118222.042:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.067411 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 00:23:42.067470 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 00:23:42.071273 systemd-resolved[187]: Defaulting to hostname 'linux'. Sep 6 00:23:42.073923 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 6 00:23:42.086199 systemd[1]: Started systemd-resolved.service. Sep 6 00:23:42.088845 systemd[1]: Finished dracut-cmdline-ask.service. Sep 6 00:23:42.091277 systemd[1]: Reached target nss-lookup.target. Sep 6 00:23:42.094652 systemd[1]: Starting dracut-cmdline.service... Sep 6 00:23:42.126712 kernel: audit: type=1130 audit(1757118222.084:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.126746 kernel: audit: type=1130 audit(1757118222.087:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.126767 kernel: audit: type=1130 audit(1757118222.089:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.126792 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 6 00:23:42.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.126985 dracut-cmdline[202]: dracut-dracut-053 Sep 6 00:23:42.126985 dracut-cmdline[202]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Sep 6 00:23:42.126985 dracut-cmdline[202]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 00:23:42.142358 kernel: Bridge firewalling registered Sep 6 00:23:42.135311 systemd-modules-load[186]: Inserted module 'br_netfilter' Sep 6 00:23:42.166585 kernel: SCSI subsystem initialized Sep 6 00:23:42.188385 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 6 00:23:42.188457 kernel: device-mapper: uevent: version 1.0.3 Sep 6 00:23:42.192586 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 6 00:23:42.196214 systemd-modules-load[186]: Inserted module 'dm_multipath' Sep 6 00:23:42.197752 systemd[1]: Finished systemd-modules-load.service. Sep 6 00:23:42.207657 kernel: audit: type=1130 audit(1757118222.197:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.200104 systemd[1]: Starting systemd-sysctl.service... Sep 6 00:23:42.216823 systemd[1]: Finished systemd-sysctl.service. Sep 6 00:23:42.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.226589 kernel: audit: type=1130 audit(1757118222.216:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.228586 kernel: Loading iSCSI transport class v2.0-870. Sep 6 00:23:42.247606 kernel: iscsi: registered transport (tcp) Sep 6 00:23:42.273143 kernel: iscsi: registered transport (qla4xxx) Sep 6 00:23:42.273222 kernel: QLogic iSCSI HBA Driver Sep 6 00:23:42.305272 systemd[1]: Finished dracut-cmdline.service. Sep 6 00:23:42.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.307205 systemd[1]: Starting dracut-pre-udev.service... Sep 6 00:23:42.358591 kernel: raid6: avx512x4 gen() 18073 MB/s Sep 6 00:23:42.376589 kernel: raid6: avx512x4 xor() 8063 MB/s Sep 6 00:23:42.394595 kernel: raid6: avx512x2 gen() 18266 MB/s Sep 6 00:23:42.412599 kernel: raid6: avx512x2 xor() 24090 MB/s Sep 6 00:23:42.430584 kernel: raid6: avx512x1 gen() 18309 MB/s Sep 6 00:23:42.448588 kernel: raid6: avx512x1 xor() 21806 MB/s Sep 6 00:23:42.466582 kernel: raid6: avx2x4 gen() 18178 MB/s Sep 6 00:23:42.484586 kernel: raid6: avx2x4 xor() 7522 MB/s Sep 6 00:23:42.502580 kernel: raid6: avx2x2 gen() 18156 MB/s Sep 6 00:23:42.520587 kernel: raid6: avx2x2 xor() 18065 MB/s Sep 6 00:23:42.538586 kernel: raid6: avx2x1 gen() 13999 MB/s Sep 6 00:23:42.556588 kernel: raid6: avx2x1 xor() 15752 MB/s Sep 6 00:23:42.574582 kernel: raid6: sse2x4 gen() 9543 MB/s Sep 6 00:23:42.592590 kernel: raid6: sse2x4 xor() 6123 MB/s Sep 6 00:23:42.610582 kernel: raid6: sse2x2 gen() 10538 MB/s Sep 6 00:23:42.628589 kernel: raid6: sse2x2 xor() 6132 MB/s Sep 6 00:23:42.646581 kernel: raid6: sse2x1 gen() 9474 MB/s Sep 6 00:23:42.664996 kernel: raid6: sse2x1 xor() 4819 MB/s Sep 6 00:23:42.665036 kernel: raid6: using algorithm avx512x1 gen() 18309 MB/s Sep 6 00:23:42.665055 kernel: raid6: .... xor() 21806 MB/s, rmw enabled Sep 6 00:23:42.666097 kernel: raid6: using avx512x2 recovery algorithm Sep 6 00:23:42.680593 kernel: xor: automatically using best checksumming function avx Sep 6 00:23:42.781596 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Sep 6 00:23:42.790694 systemd[1]: Finished dracut-pre-udev.service. Sep 6 00:23:42.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.790000 audit: BPF prog-id=7 op=LOAD Sep 6 00:23:42.790000 audit: BPF prog-id=8 op=LOAD Sep 6 00:23:42.792201 systemd[1]: Starting systemd-udevd.service... Sep 6 00:23:42.805335 systemd-udevd[385]: Using default interface naming scheme 'v252'. Sep 6 00:23:42.810555 systemd[1]: Started systemd-udevd.service. Sep 6 00:23:42.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.816031 systemd[1]: Starting dracut-pre-trigger.service... Sep 6 00:23:42.833213 dracut-pre-trigger[397]: rd.md=0: removing MD RAID activation Sep 6 00:23:42.865006 systemd[1]: Finished dracut-pre-trigger.service. Sep 6 00:23:42.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.866463 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 00:23:42.911983 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 00:23:42.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:42.968584 kernel: cryptd: max_cpu_qlen set to 1000 Sep 6 00:23:43.004863 kernel: ena 0000:00:05.0: ENA device version: 0.10 Sep 6 00:23:43.027417 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Sep 6 00:23:43.027613 kernel: AVX2 version of gcm_enc/dec engaged. Sep 6 00:23:43.027633 kernel: AES CTR mode by8 optimization enabled Sep 6 00:23:43.027650 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Sep 6 00:23:43.027809 kernel: nvme nvme0: pci function 0000:00:04.0 Sep 6 00:23:43.028002 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Sep 6 00:23:43.028023 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80400000, mac addr 06:ac:10:c3:12:87 Sep 6 00:23:43.030590 kernel: nvme nvme0: 2/0/0 default/read/poll queues Sep 6 00:23:43.038886 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 6 00:23:43.038952 kernel: GPT:9289727 != 16777215 Sep 6 00:23:43.038972 kernel: GPT:Alternate GPT header not at the end of the disk. Sep 6 00:23:43.041349 kernel: GPT:9289727 != 16777215 Sep 6 00:23:43.041405 kernel: GPT: Use GNU Parted to correct GPT errors. Sep 6 00:23:43.043983 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 6 00:23:43.048367 (udev-worker)[439]: Network interface NamePolicy= disabled on kernel command line. Sep 6 00:23:43.114586 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/nvme0n1p6 scanned by (udev-worker) (442) Sep 6 00:23:43.155824 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 6 00:23:43.167775 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 6 00:23:43.169115 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 6 00:23:43.175899 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 6 00:23:43.181058 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 00:23:43.186160 systemd[1]: Starting disk-uuid.service... Sep 6 00:23:43.192915 disk-uuid[594]: Primary Header is updated. Sep 6 00:23:43.192915 disk-uuid[594]: Secondary Entries is updated. Sep 6 00:23:43.192915 disk-uuid[594]: Secondary Header is updated. Sep 6 00:23:43.200598 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 6 00:23:43.204586 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 6 00:23:43.212581 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 6 00:23:44.219751 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 6 00:23:44.220158 disk-uuid[595]: The operation has completed successfully. Sep 6 00:23:44.330372 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 6 00:23:44.330496 systemd[1]: Finished disk-uuid.service. Sep 6 00:23:44.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:44.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:44.336891 systemd[1]: Starting verity-setup.service... Sep 6 00:23:44.356859 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Sep 6 00:23:44.446488 systemd[1]: Found device dev-mapper-usr.device. Sep 6 00:23:44.447843 systemd[1]: Mounting sysusr-usr.mount... Sep 6 00:23:44.450519 systemd[1]: Finished verity-setup.service. Sep 6 00:23:44.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:44.542586 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 6 00:23:44.542936 systemd[1]: Mounted sysusr-usr.mount. Sep 6 00:23:44.543711 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 6 00:23:44.544395 systemd[1]: Starting ignition-setup.service... Sep 6 00:23:44.546952 systemd[1]: Starting parse-ip-for-networkd.service... Sep 6 00:23:44.573193 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Sep 6 00:23:44.573252 kernel: BTRFS info (device nvme0n1p6): using free space tree Sep 6 00:23:44.573265 kernel: BTRFS info (device nvme0n1p6): has skinny extents Sep 6 00:23:44.613604 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Sep 6 00:23:44.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:44.624000 audit: BPF prog-id=9 op=LOAD Sep 6 00:23:44.624591 systemd[1]: Finished parse-ip-for-networkd.service. Sep 6 00:23:44.626505 systemd[1]: Starting systemd-networkd.service... Sep 6 00:23:44.628521 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 6 00:23:44.642841 systemd[1]: Finished ignition-setup.service. Sep 6 00:23:44.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:44.644959 systemd[1]: Starting ignition-fetch-offline.service... Sep 6 00:23:44.649056 systemd-networkd[1105]: lo: Link UP Sep 6 00:23:44.649068 systemd-networkd[1105]: lo: Gained carrier Sep 6 00:23:44.649793 systemd-networkd[1105]: Enumeration completed Sep 6 00:23:44.649871 systemd[1]: Started systemd-networkd.service. Sep 6 00:23:44.650172 systemd-networkd[1105]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 00:23:44.653007 systemd[1]: Reached target network.target. Sep 6 00:23:44.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:44.654420 systemd-networkd[1105]: eth0: Link UP Sep 6 00:23:44.654425 systemd-networkd[1105]: eth0: Gained carrier Sep 6 00:23:44.654723 systemd[1]: Starting iscsiuio.service... Sep 6 00:23:44.660455 systemd[1]: Started iscsiuio.service. Sep 6 00:23:44.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:44.661872 systemd[1]: Starting iscsid.service... Sep 6 00:23:44.665516 iscsid[1112]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 6 00:23:44.665516 iscsid[1112]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 6 00:23:44.665516 iscsid[1112]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 6 00:23:44.665516 iscsid[1112]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 6 00:23:44.665516 iscsid[1112]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 6 00:23:44.665516 iscsid[1112]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 6 00:23:44.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:44.667348 systemd[1]: Started iscsid.service. Sep 6 00:23:44.668983 systemd[1]: Starting dracut-initqueue.service... Sep 6 00:23:44.673730 systemd-networkd[1105]: eth0: DHCPv4 address 172.31.25.70/20, gateway 172.31.16.1 acquired from 172.31.16.1 Sep 6 00:23:44.683135 systemd[1]: Finished dracut-initqueue.service. Sep 6 00:23:44.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:44.684049 systemd[1]: Reached target remote-fs-pre.target. Sep 6 00:23:44.685111 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 00:23:44.686204 systemd[1]: Reached target remote-fs.target. Sep 6 00:23:44.688273 systemd[1]: Starting dracut-pre-mount.service... Sep 6 00:23:44.697712 systemd[1]: Finished dracut-pre-mount.service. Sep 6 00:23:44.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:45.209165 ignition[1107]: Ignition 2.14.0 Sep 6 00:23:45.209179 ignition[1107]: Stage: fetch-offline Sep 6 00:23:45.209296 ignition[1107]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:23:45.209329 ignition[1107]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 6 00:23:45.228454 ignition[1107]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 6 00:23:45.229041 ignition[1107]: Ignition finished successfully Sep 6 00:23:45.231043 systemd[1]: Finished ignition-fetch-offline.service. Sep 6 00:23:45.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:45.233018 systemd[1]: Starting ignition-fetch.service... Sep 6 00:23:45.242161 ignition[1131]: Ignition 2.14.0 Sep 6 00:23:45.242173 ignition[1131]: Stage: fetch Sep 6 00:23:45.242361 ignition[1131]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:23:45.242396 ignition[1131]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 6 00:23:45.250206 ignition[1131]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 6 00:23:45.251004 ignition[1131]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 6 00:23:45.264622 ignition[1131]: INFO : PUT result: OK Sep 6 00:23:45.266761 ignition[1131]: DEBUG : parsed url from cmdline: "" Sep 6 00:23:45.266761 ignition[1131]: INFO : no config URL provided Sep 6 00:23:45.266761 ignition[1131]: INFO : reading system config file "/usr/lib/ignition/user.ign" Sep 6 00:23:45.266761 ignition[1131]: INFO : no config at "/usr/lib/ignition/user.ign" Sep 6 00:23:45.269106 ignition[1131]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 6 00:23:45.270273 ignition[1131]: INFO : PUT result: OK Sep 6 00:23:45.270891 ignition[1131]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Sep 6 00:23:45.271946 ignition[1131]: INFO : GET result: OK Sep 6 00:23:45.271946 ignition[1131]: DEBUG : parsing config with SHA512: d19f60a05fcc46e180c56a7dfca183a714a32c8b24632086c4d1c5e9add106893d4969a85637543d5938de244037f7b06d4a006114d9d167ab807fd8e435ddc7 Sep 6 00:23:45.274226 unknown[1131]: fetched base config from "system" Sep 6 00:23:45.274879 unknown[1131]: fetched base config from "system" Sep 6 00:23:45.274893 unknown[1131]: fetched user config from "aws" Sep 6 00:23:45.275344 ignition[1131]: fetch: fetch complete Sep 6 00:23:45.276836 systemd[1]: Finished ignition-fetch.service. Sep 6 00:23:45.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:45.275349 ignition[1131]: fetch: fetch passed Sep 6 00:23:45.278609 systemd[1]: Starting ignition-kargs.service... Sep 6 00:23:45.275395 ignition[1131]: Ignition finished successfully Sep 6 00:23:45.288242 ignition[1137]: Ignition 2.14.0 Sep 6 00:23:45.288253 ignition[1137]: Stage: kargs Sep 6 00:23:45.288397 ignition[1137]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:23:45.288424 ignition[1137]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 6 00:23:45.298968 ignition[1137]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 6 00:23:45.300047 ignition[1137]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 6 00:23:45.300840 ignition[1137]: INFO : PUT result: OK Sep 6 00:23:45.302392 ignition[1137]: kargs: kargs passed Sep 6 00:23:45.302459 ignition[1137]: Ignition finished successfully Sep 6 00:23:45.303890 systemd[1]: Finished ignition-kargs.service. Sep 6 00:23:45.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:45.305897 systemd[1]: Starting ignition-disks.service... Sep 6 00:23:45.315234 ignition[1143]: Ignition 2.14.0 Sep 6 00:23:45.315247 ignition[1143]: Stage: disks Sep 6 00:23:45.315459 ignition[1143]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:23:45.315494 ignition[1143]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 6 00:23:45.322902 ignition[1143]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 6 00:23:45.323961 ignition[1143]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 6 00:23:45.324842 ignition[1143]: INFO : PUT result: OK Sep 6 00:23:45.326214 ignition[1143]: disks: disks passed Sep 6 00:23:45.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:45.327717 systemd[1]: Finished ignition-disks.service. Sep 6 00:23:45.326280 ignition[1143]: Ignition finished successfully Sep 6 00:23:45.328339 systemd[1]: Reached target initrd-root-device.target. Sep 6 00:23:45.328957 systemd[1]: Reached target local-fs-pre.target. Sep 6 00:23:45.329890 systemd[1]: Reached target local-fs.target. Sep 6 00:23:45.330838 systemd[1]: Reached target sysinit.target. Sep 6 00:23:45.331910 systemd[1]: Reached target basic.target. Sep 6 00:23:45.334058 systemd[1]: Starting systemd-fsck-root.service... Sep 6 00:23:45.372550 systemd-fsck[1151]: ROOT: clean, 629/553520 files, 56028/553472 blocks Sep 6 00:23:45.375761 systemd[1]: Finished systemd-fsck-root.service. Sep 6 00:23:45.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:45.377485 systemd[1]: Mounting sysroot.mount... Sep 6 00:23:45.399610 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 6 00:23:45.400420 systemd[1]: Mounted sysroot.mount. Sep 6 00:23:45.402303 systemd[1]: Reached target initrd-root-fs.target. Sep 6 00:23:45.410769 systemd[1]: Mounting sysroot-usr.mount... Sep 6 00:23:45.412645 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Sep 6 00:23:45.413411 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 6 00:23:45.413439 systemd[1]: Reached target ignition-diskful.target. Sep 6 00:23:45.415192 systemd[1]: Mounted sysroot-usr.mount. Sep 6 00:23:45.419003 systemd[1]: Starting initrd-setup-root.service... Sep 6 00:23:45.430761 initrd-setup-root[1172]: cut: /sysroot/etc/passwd: No such file or directory Sep 6 00:23:45.461278 initrd-setup-root[1180]: cut: /sysroot/etc/group: No such file or directory Sep 6 00:23:45.466375 initrd-setup-root[1188]: cut: /sysroot/etc/shadow: No such file or directory Sep 6 00:23:45.471179 initrd-setup-root[1196]: cut: /sysroot/etc/gshadow: No such file or directory Sep 6 00:23:45.476658 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 6 00:23:45.498607 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/nvme0n1p6 scanned by mount (1204) Sep 6 00:23:45.503186 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Sep 6 00:23:45.503250 kernel: BTRFS info (device nvme0n1p6): using free space tree Sep 6 00:23:45.503263 kernel: BTRFS info (device nvme0n1p6): has skinny extents Sep 6 00:23:45.513852 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Sep 6 00:23:45.522730 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 6 00:23:45.629382 systemd[1]: Finished initrd-setup-root.service. Sep 6 00:23:45.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:45.630819 systemd[1]: Starting ignition-mount.service... Sep 6 00:23:45.632118 systemd[1]: Starting sysroot-boot.service... Sep 6 00:23:45.639973 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Sep 6 00:23:45.640071 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Sep 6 00:23:45.652440 ignition[1233]: INFO : Ignition 2.14.0 Sep 6 00:23:45.652440 ignition[1233]: INFO : Stage: mount Sep 6 00:23:45.653769 ignition[1233]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:23:45.653769 ignition[1233]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 6 00:23:45.659049 ignition[1233]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 6 00:23:45.660540 ignition[1233]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 6 00:23:45.666166 ignition[1233]: INFO : PUT result: OK Sep 6 00:23:45.669339 ignition[1233]: INFO : mount: mount passed Sep 6 00:23:45.669999 ignition[1233]: INFO : Ignition finished successfully Sep 6 00:23:45.671851 systemd[1]: Finished ignition-mount.service. Sep 6 00:23:45.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:45.673521 systemd[1]: Starting ignition-files.service... Sep 6 00:23:45.678309 systemd[1]: Finished sysroot-boot.service. Sep 6 00:23:45.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:45.683377 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 6 00:23:45.709592 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by mount (1243) Sep 6 00:23:45.712980 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Sep 6 00:23:45.713045 kernel: BTRFS info (device nvme0n1p6): using free space tree Sep 6 00:23:45.713058 kernel: BTRFS info (device nvme0n1p6): has skinny extents Sep 6 00:23:45.728601 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Sep 6 00:23:45.732629 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 6 00:23:45.743879 ignition[1262]: INFO : Ignition 2.14.0 Sep 6 00:23:45.743879 ignition[1262]: INFO : Stage: files Sep 6 00:23:45.746222 ignition[1262]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:23:45.746222 ignition[1262]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 6 00:23:45.752840 ignition[1262]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 6 00:23:45.753730 ignition[1262]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 6 00:23:45.754717 ignition[1262]: INFO : PUT result: OK Sep 6 00:23:45.758033 ignition[1262]: DEBUG : files: compiled without relabeling support, skipping Sep 6 00:23:45.764768 ignition[1262]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 6 00:23:45.764768 ignition[1262]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 6 00:23:45.787858 ignition[1262]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 6 00:23:45.789040 ignition[1262]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 6 00:23:45.790290 unknown[1262]: wrote ssh authorized keys file for user: core Sep 6 00:23:45.791063 ignition[1262]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 6 00:23:45.792277 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Sep 6 00:23:45.792277 ignition[1262]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 6 00:23:45.799962 ignition[1262]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1005453458" Sep 6 00:23:45.801411 ignition[1262]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1005453458": device or resource busy Sep 6 00:23:45.801411 ignition[1262]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1005453458", trying btrfs: device or resource busy Sep 6 00:23:45.801411 ignition[1262]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1005453458" Sep 6 00:23:45.801411 ignition[1262]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1005453458" Sep 6 00:23:45.814691 ignition[1262]: INFO : op(3): [started] unmounting "/mnt/oem1005453458" Sep 6 00:23:45.814691 ignition[1262]: INFO : op(3): [finished] unmounting "/mnt/oem1005453458" Sep 6 00:23:45.816398 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Sep 6 00:23:45.816398 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Sep 6 00:23:45.816398 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Sep 6 00:23:45.816398 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 00:23:45.816398 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 00:23:45.816398 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 6 00:23:45.816398 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 6 00:23:45.816398 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Sep 6 00:23:45.816398 ignition[1262]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 6 00:23:45.829864 ignition[1262]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2806148323" Sep 6 00:23:45.829864 ignition[1262]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2806148323": device or resource busy Sep 6 00:23:45.829864 ignition[1262]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2806148323", trying btrfs: device or resource busy Sep 6 00:23:45.829864 ignition[1262]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2806148323" Sep 6 00:23:45.829864 ignition[1262]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2806148323" Sep 6 00:23:45.829864 ignition[1262]: INFO : op(6): [started] unmounting "/mnt/oem2806148323" Sep 6 00:23:45.829864 ignition[1262]: INFO : op(6): [finished] unmounting "/mnt/oem2806148323" Sep 6 00:23:45.829864 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Sep 6 00:23:45.829864 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Sep 6 00:23:45.829864 ignition[1262]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 6 00:23:45.842335 ignition[1262]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem417288465" Sep 6 00:23:45.842335 ignition[1262]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem417288465": device or resource busy Sep 6 00:23:45.842335 ignition[1262]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem417288465", trying btrfs: device or resource busy Sep 6 00:23:45.842335 ignition[1262]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem417288465" Sep 6 00:23:45.842335 ignition[1262]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem417288465" Sep 6 00:23:45.842335 ignition[1262]: INFO : op(9): [started] unmounting "/mnt/oem417288465" Sep 6 00:23:45.842335 ignition[1262]: INFO : op(9): [finished] unmounting "/mnt/oem417288465" Sep 6 00:23:45.842335 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Sep 6 00:23:45.842335 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 6 00:23:45.842335 ignition[1262]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 6 00:23:45.842335 ignition[1262]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem114709616" Sep 6 00:23:45.842335 ignition[1262]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem114709616": device or resource busy Sep 6 00:23:45.842335 ignition[1262]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem114709616", trying btrfs: device or resource busy Sep 6 00:23:45.842335 ignition[1262]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem114709616" Sep 6 00:23:45.842335 ignition[1262]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem114709616" Sep 6 00:23:45.842335 ignition[1262]: INFO : op(c): [started] unmounting "/mnt/oem114709616" Sep 6 00:23:45.842335 ignition[1262]: INFO : op(c): [finished] unmounting "/mnt/oem114709616" Sep 6 00:23:45.842335 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 6 00:23:45.842335 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 6 00:23:45.842335 ignition[1262]: INFO : GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Sep 6 00:23:46.295713 ignition[1262]: INFO : GET result: OK Sep 6 00:23:46.676220 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 6 00:23:46.676220 ignition[1262]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Sep 6 00:23:46.676220 ignition[1262]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Sep 6 00:23:46.676220 ignition[1262]: INFO : files: op(c): [started] processing unit "amazon-ssm-agent.service" Sep 6 00:23:46.682310 ignition[1262]: INFO : files: op(c): op(d): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Sep 6 00:23:46.682310 ignition[1262]: INFO : files: op(c): op(d): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Sep 6 00:23:46.682310 ignition[1262]: INFO : files: op(c): [finished] processing unit "amazon-ssm-agent.service" Sep 6 00:23:46.682310 ignition[1262]: INFO : files: op(e): [started] processing unit "nvidia.service" Sep 6 00:23:46.682310 ignition[1262]: INFO : files: op(e): [finished] processing unit "nvidia.service" Sep 6 00:23:46.682310 ignition[1262]: INFO : files: op(f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 6 00:23:46.682310 ignition[1262]: INFO : files: op(f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 6 00:23:46.682310 ignition[1262]: INFO : files: op(10): [started] setting preset to enabled for "amazon-ssm-agent.service" Sep 6 00:23:46.682310 ignition[1262]: INFO : files: op(10): [finished] setting preset to enabled for "amazon-ssm-agent.service" Sep 6 00:23:46.682310 ignition[1262]: INFO : files: op(11): [started] setting preset to enabled for "nvidia.service" Sep 6 00:23:46.682310 ignition[1262]: INFO : files: op(11): [finished] setting preset to enabled for "nvidia.service" Sep 6 00:23:46.708418 kernel: kauditd_printk_skb: 26 callbacks suppressed Sep 6 00:23:46.708457 kernel: audit: type=1130 audit(1757118226.687:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.679669 systemd-networkd[1105]: eth0: Gained IPv6LL Sep 6 00:23:46.709387 ignition[1262]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 6 00:23:46.709387 ignition[1262]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 6 00:23:46.709387 ignition[1262]: INFO : files: files passed Sep 6 00:23:46.709387 ignition[1262]: INFO : Ignition finished successfully Sep 6 00:23:46.735604 kernel: audit: type=1130 audit(1757118226.708:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.735653 kernel: audit: type=1131 audit(1757118226.708:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.735677 kernel: audit: type=1130 audit(1757118226.722:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.687747 systemd[1]: Finished ignition-files.service. Sep 6 00:23:46.692698 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 6 00:23:46.738769 initrd-setup-root-after-ignition[1288]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 6 00:23:46.697477 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 6 00:23:46.698327 systemd[1]: Starting ignition-quench.service... Sep 6 00:23:46.702189 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 6 00:23:46.702294 systemd[1]: Finished ignition-quench.service. Sep 6 00:23:46.718395 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 6 00:23:46.724132 systemd[1]: Reached target ignition-complete.target. Sep 6 00:23:46.733149 systemd[1]: Starting initrd-parse-etc.service... Sep 6 00:23:46.754544 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 6 00:23:46.754685 systemd[1]: Finished initrd-parse-etc.service. Sep 6 00:23:46.766369 kernel: audit: type=1130 audit(1757118226.754:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.766418 kernel: audit: type=1131 audit(1757118226.754:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.756343 systemd[1]: Reached target initrd-fs.target. Sep 6 00:23:46.767158 systemd[1]: Reached target initrd.target. Sep 6 00:23:46.768590 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 6 00:23:46.769913 systemd[1]: Starting dracut-pre-pivot.service... Sep 6 00:23:46.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.782928 systemd[1]: Finished dracut-pre-pivot.service. Sep 6 00:23:46.793296 kernel: audit: type=1130 audit(1757118226.782:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.784586 systemd[1]: Starting initrd-cleanup.service... Sep 6 00:23:46.799857 systemd[1]: Stopped target nss-lookup.target. Sep 6 00:23:46.800782 systemd[1]: Stopped target remote-cryptsetup.target. Sep 6 00:23:46.802117 systemd[1]: Stopped target timers.target. Sep 6 00:23:46.803351 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 6 00:23:46.809995 kernel: audit: type=1131 audit(1757118226.803:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.803727 systemd[1]: Stopped dracut-pre-pivot.service. Sep 6 00:23:46.804966 systemd[1]: Stopped target initrd.target. Sep 6 00:23:46.810904 systemd[1]: Stopped target basic.target. Sep 6 00:23:46.812267 systemd[1]: Stopped target ignition-complete.target. Sep 6 00:23:46.813524 systemd[1]: Stopped target ignition-diskful.target. Sep 6 00:23:46.814753 systemd[1]: Stopped target initrd-root-device.target. Sep 6 00:23:46.816028 systemd[1]: Stopped target remote-fs.target. Sep 6 00:23:46.817195 systemd[1]: Stopped target remote-fs-pre.target. Sep 6 00:23:46.818403 systemd[1]: Stopped target sysinit.target. Sep 6 00:23:46.819704 systemd[1]: Stopped target local-fs.target. Sep 6 00:23:46.820844 systemd[1]: Stopped target local-fs-pre.target. Sep 6 00:23:46.822013 systemd[1]: Stopped target swap.target. Sep 6 00:23:46.830191 kernel: audit: type=1131 audit(1757118226.822:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.823125 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 6 00:23:46.823329 systemd[1]: Stopped dracut-pre-mount.service. Sep 6 00:23:46.838270 kernel: audit: type=1131 audit(1757118226.830:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.824631 systemd[1]: Stopped target cryptsetup.target. Sep 6 00:23:46.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.830981 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 6 00:23:46.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.831196 systemd[1]: Stopped dracut-initqueue.service. Sep 6 00:23:46.832511 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 6 00:23:46.832749 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 6 00:23:46.839236 systemd[1]: ignition-files.service: Deactivated successfully. Sep 6 00:23:46.839440 systemd[1]: Stopped ignition-files.service. Sep 6 00:23:46.841857 systemd[1]: Stopping ignition-mount.service... Sep 6 00:23:46.849023 iscsid[1112]: iscsid shutting down. Sep 6 00:23:46.850268 systemd[1]: Stopping iscsid.service... Sep 6 00:23:46.855594 systemd[1]: Stopping sysroot-boot.service... Sep 6 00:23:46.857911 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 6 00:23:46.859627 systemd[1]: Stopped systemd-udev-trigger.service. Sep 6 00:23:46.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.862403 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 6 00:23:46.863799 systemd[1]: Stopped dracut-pre-trigger.service. Sep 6 00:23:46.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.866724 ignition[1301]: INFO : Ignition 2.14.0 Sep 6 00:23:46.868785 systemd[1]: iscsid.service: Deactivated successfully. Sep 6 00:23:46.868917 systemd[1]: Stopped iscsid.service. Sep 6 00:23:46.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.877480 ignition[1301]: INFO : Stage: umount Sep 6 00:23:46.877480 ignition[1301]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:23:46.877480 ignition[1301]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 6 00:23:46.881318 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 6 00:23:46.881450 systemd[1]: Finished initrd-cleanup.service. Sep 6 00:23:46.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.888961 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 6 00:23:46.890872 ignition[1301]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 6 00:23:46.892269 ignition[1301]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 6 00:23:46.892996 systemd[1]: Stopping iscsiuio.service... Sep 6 00:23:46.896277 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 6 00:23:46.896747 systemd[1]: Stopped iscsiuio.service. Sep 6 00:23:46.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.898467 ignition[1301]: INFO : PUT result: OK Sep 6 00:23:46.900523 ignition[1301]: INFO : umount: umount passed Sep 6 00:23:46.901203 ignition[1301]: INFO : Ignition finished successfully Sep 6 00:23:46.902692 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 6 00:23:46.902819 systemd[1]: Stopped ignition-mount.service. Sep 6 00:23:46.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.904169 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 6 00:23:46.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.904239 systemd[1]: Stopped ignition-disks.service. Sep 6 00:23:46.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.905279 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 6 00:23:46.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.905337 systemd[1]: Stopped ignition-kargs.service. Sep 6 00:23:46.906432 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 6 00:23:46.906486 systemd[1]: Stopped ignition-fetch.service. Sep 6 00:23:46.908425 systemd[1]: Stopped target network.target. Sep 6 00:23:46.908953 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 6 00:23:46.909000 systemd[1]: Stopped ignition-fetch-offline.service. Sep 6 00:23:46.910705 systemd[1]: Stopped target paths.target. Sep 6 00:23:46.912156 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 6 00:23:46.913875 systemd[1]: Stopped systemd-ask-password-console.path. Sep 6 00:23:46.914415 systemd[1]: Stopped target slices.target. Sep 6 00:23:46.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.915033 systemd[1]: Stopped target sockets.target. Sep 6 00:23:46.916213 systemd[1]: iscsid.socket: Deactivated successfully. Sep 6 00:23:46.916269 systemd[1]: Closed iscsid.socket. Sep 6 00:23:46.917296 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 6 00:23:46.917342 systemd[1]: Closed iscsiuio.socket. Sep 6 00:23:46.918359 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 6 00:23:46.918421 systemd[1]: Stopped ignition-setup.service. Sep 6 00:23:46.919698 systemd[1]: Stopping systemd-networkd.service... Sep 6 00:23:46.920928 systemd[1]: Stopping systemd-resolved.service... Sep 6 00:23:46.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.924623 systemd-networkd[1105]: eth0: DHCPv6 lease lost Sep 6 00:23:46.929000 audit: BPF prog-id=9 op=UNLOAD Sep 6 00:23:46.926138 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 6 00:23:46.926274 systemd[1]: Stopped systemd-networkd.service. Sep 6 00:23:46.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.927288 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 6 00:23:46.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.927348 systemd[1]: Closed systemd-networkd.socket. Sep 6 00:23:46.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.929254 systemd[1]: Stopping network-cleanup.service... Sep 6 00:23:46.931865 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 6 00:23:46.931941 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 6 00:23:46.933825 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 6 00:23:46.933890 systemd[1]: Stopped systemd-sysctl.service. Sep 6 00:23:46.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.935094 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 6 00:23:46.935152 systemd[1]: Stopped systemd-modules-load.service. Sep 6 00:23:46.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.936341 systemd[1]: Stopping systemd-udevd.service... Sep 6 00:23:46.949000 audit: BPF prog-id=6 op=UNLOAD Sep 6 00:23:46.945264 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 6 00:23:46.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.946071 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 6 00:23:46.946217 systemd[1]: Stopped systemd-resolved.service. Sep 6 00:23:46.948305 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 6 00:23:46.948481 systemd[1]: Stopped systemd-udevd.service. Sep 6 00:23:46.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.950882 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 6 00:23:46.950943 systemd[1]: Closed systemd-udevd-control.socket. Sep 6 00:23:46.954268 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 6 00:23:46.954315 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 6 00:23:46.954850 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 6 00:23:46.954895 systemd[1]: Stopped dracut-pre-udev.service. Sep 6 00:23:46.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:46.955445 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 6 00:23:46.955557 systemd[1]: Stopped dracut-cmdline.service. Sep 6 00:23:46.956130 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 6 00:23:46.956168 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 6 00:23:46.958344 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 6 00:23:46.960307 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 6 00:23:46.960402 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Sep 6 00:23:46.962849 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 6 00:23:46.962910 systemd[1]: Stopped kmod-static-nodes.service. Sep 6 00:23:46.969883 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 6 00:23:46.969934 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 6 00:23:46.971378 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Sep 6 00:23:46.971974 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 6 00:23:46.972063 systemd[1]: Stopped network-cleanup.service. Sep 6 00:23:46.972809 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 6 00:23:46.972900 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 6 00:23:47.008302 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 6 00:23:47.008421 systemd[1]: Stopped sysroot-boot.service. Sep 6 00:23:47.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:47.009719 systemd[1]: Reached target initrd-switch-root.target. Sep 6 00:23:47.010716 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 6 00:23:47.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:47.010789 systemd[1]: Stopped initrd-setup-root.service. Sep 6 00:23:47.013000 systemd[1]: Starting initrd-switch-root.service... Sep 6 00:23:47.025818 systemd[1]: Switching root. Sep 6 00:23:47.047060 systemd-journald[185]: Journal stopped Sep 6 00:23:51.496751 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Sep 6 00:23:51.496841 kernel: SELinux: Class mctp_socket not defined in policy. Sep 6 00:23:51.496863 kernel: SELinux: Class anon_inode not defined in policy. Sep 6 00:23:51.496882 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 6 00:23:51.496906 kernel: SELinux: policy capability network_peer_controls=1 Sep 6 00:23:51.496924 kernel: SELinux: policy capability open_perms=1 Sep 6 00:23:51.496942 kernel: SELinux: policy capability extended_socket_class=1 Sep 6 00:23:51.496964 kernel: SELinux: policy capability always_check_network=0 Sep 6 00:23:51.496982 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 6 00:23:51.497000 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 6 00:23:51.497017 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 6 00:23:51.497039 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 6 00:23:51.497058 systemd[1]: Successfully loaded SELinux policy in 112.769ms. Sep 6 00:23:51.497088 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.196ms. Sep 6 00:23:51.497109 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 00:23:51.497127 systemd[1]: Detected virtualization amazon. Sep 6 00:23:51.497152 systemd[1]: Detected architecture x86-64. Sep 6 00:23:51.497169 systemd[1]: Detected first boot. Sep 6 00:23:51.497188 systemd[1]: Initializing machine ID from VM UUID. Sep 6 00:23:51.497207 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 6 00:23:51.497224 systemd[1]: Populated /etc with preset unit settings. Sep 6 00:23:51.497243 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 00:23:51.497267 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 00:23:51.497291 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 00:23:51.497311 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 6 00:23:51.497329 systemd[1]: Stopped initrd-switch-root.service. Sep 6 00:23:51.497348 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 6 00:23:51.497367 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 6 00:23:51.497386 systemd[1]: Created slice system-addon\x2drun.slice. Sep 6 00:23:51.497404 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Sep 6 00:23:51.497423 systemd[1]: Created slice system-getty.slice. Sep 6 00:23:51.497445 systemd[1]: Created slice system-modprobe.slice. Sep 6 00:23:51.497464 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 6 00:23:51.497483 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 6 00:23:51.497502 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 6 00:23:51.497523 systemd[1]: Created slice user.slice. Sep 6 00:23:51.497542 systemd[1]: Started systemd-ask-password-console.path. Sep 6 00:23:51.497574 systemd[1]: Started systemd-ask-password-wall.path. Sep 6 00:23:51.497593 systemd[1]: Set up automount boot.automount. Sep 6 00:23:51.497611 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 6 00:23:51.497633 systemd[1]: Stopped target initrd-switch-root.target. Sep 6 00:23:51.497651 systemd[1]: Stopped target initrd-fs.target. Sep 6 00:23:51.497670 systemd[1]: Stopped target initrd-root-fs.target. Sep 6 00:23:51.497689 systemd[1]: Reached target integritysetup.target. Sep 6 00:23:51.497708 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 00:23:51.497727 systemd[1]: Reached target remote-fs.target. Sep 6 00:23:51.497745 systemd[1]: Reached target slices.target. Sep 6 00:23:51.497763 systemd[1]: Reached target swap.target. Sep 6 00:23:51.497784 systemd[1]: Reached target torcx.target. Sep 6 00:23:51.497804 systemd[1]: Reached target veritysetup.target. Sep 6 00:23:51.497822 systemd[1]: Listening on systemd-coredump.socket. Sep 6 00:23:51.497846 systemd[1]: Listening on systemd-initctl.socket. Sep 6 00:23:51.497864 systemd[1]: Listening on systemd-networkd.socket. Sep 6 00:23:51.497884 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 00:23:51.497905 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 00:23:51.497927 systemd[1]: Listening on systemd-userdbd.socket. Sep 6 00:23:51.497948 systemd[1]: Mounting dev-hugepages.mount... Sep 6 00:23:51.497969 systemd[1]: Mounting dev-mqueue.mount... Sep 6 00:23:51.497997 systemd[1]: Mounting media.mount... Sep 6 00:23:51.498018 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:23:51.498040 systemd[1]: Mounting sys-kernel-debug.mount... Sep 6 00:23:51.498060 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 6 00:23:51.498081 systemd[1]: Mounting tmp.mount... Sep 6 00:23:51.498103 systemd[1]: Starting flatcar-tmpfiles.service... Sep 6 00:23:51.498123 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:23:51.498145 systemd[1]: Starting kmod-static-nodes.service... Sep 6 00:23:51.498180 systemd[1]: Starting modprobe@configfs.service... Sep 6 00:23:51.498201 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:23:51.498223 systemd[1]: Starting modprobe@drm.service... Sep 6 00:23:51.498245 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:23:51.498267 systemd[1]: Starting modprobe@fuse.service... Sep 6 00:23:51.498291 systemd[1]: Starting modprobe@loop.service... Sep 6 00:23:51.498314 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 6 00:23:51.498335 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 6 00:23:51.498357 systemd[1]: Stopped systemd-fsck-root.service. Sep 6 00:23:51.498378 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 6 00:23:51.498399 systemd[1]: Stopped systemd-fsck-usr.service. Sep 6 00:23:51.498420 systemd[1]: Stopped systemd-journald.service. Sep 6 00:23:51.498442 systemd[1]: Starting systemd-journald.service... Sep 6 00:23:51.498465 systemd[1]: Starting systemd-modules-load.service... Sep 6 00:23:51.498488 systemd[1]: Starting systemd-network-generator.service... Sep 6 00:23:51.498510 systemd[1]: Starting systemd-remount-fs.service... Sep 6 00:23:51.498536 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 00:23:51.498557 systemd[1]: verity-setup.service: Deactivated successfully. Sep 6 00:23:51.498592 systemd[1]: Stopped verity-setup.service. Sep 6 00:23:51.498613 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:23:51.498635 systemd[1]: Mounted dev-hugepages.mount. Sep 6 00:23:51.498657 systemd[1]: Mounted dev-mqueue.mount. Sep 6 00:23:51.498678 systemd[1]: Mounted media.mount. Sep 6 00:23:51.498702 systemd[1]: Mounted sys-kernel-debug.mount. Sep 6 00:23:51.498722 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 6 00:23:51.498750 systemd-journald[1413]: Journal started Sep 6 00:23:51.498834 systemd-journald[1413]: Runtime Journal (/run/log/journal/ec28dec6cb56c70d68d38e7d079ef519) is 4.8M, max 38.3M, 33.5M free. Sep 6 00:23:47.772000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 6 00:23:47.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 00:23:47.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 00:23:47.942000 audit: BPF prog-id=10 op=LOAD Sep 6 00:23:47.942000 audit: BPF prog-id=10 op=UNLOAD Sep 6 00:23:47.942000 audit: BPF prog-id=11 op=LOAD Sep 6 00:23:47.942000 audit: BPF prog-id=11 op=UNLOAD Sep 6 00:23:48.149000 audit[1334]: AVC avc: denied { associate } for pid=1334 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 6 00:23:48.149000 audit[1334]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d89c a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1317 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:48.149000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 00:23:48.153000 audit[1334]: AVC avc: denied { associate } for pid=1334 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 6 00:23:48.153000 audit[1334]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d975 a2=1ed a3=0 items=2 ppid=1317 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:48.153000 audit: CWD cwd="/" Sep 6 00:23:48.153000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:51.506626 systemd[1]: Started systemd-journald.service. Sep 6 00:23:48.153000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:48.153000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 00:23:51.262000 audit: BPF prog-id=12 op=LOAD Sep 6 00:23:51.262000 audit: BPF prog-id=3 op=UNLOAD Sep 6 00:23:51.262000 audit: BPF prog-id=13 op=LOAD Sep 6 00:23:51.262000 audit: BPF prog-id=14 op=LOAD Sep 6 00:23:51.262000 audit: BPF prog-id=4 op=UNLOAD Sep 6 00:23:51.262000 audit: BPF prog-id=5 op=UNLOAD Sep 6 00:23:51.263000 audit: BPF prog-id=15 op=LOAD Sep 6 00:23:51.263000 audit: BPF prog-id=12 op=UNLOAD Sep 6 00:23:51.263000 audit: BPF prog-id=16 op=LOAD Sep 6 00:23:51.264000 audit: BPF prog-id=17 op=LOAD Sep 6 00:23:51.264000 audit: BPF prog-id=13 op=UNLOAD Sep 6 00:23:51.264000 audit: BPF prog-id=14 op=UNLOAD Sep 6 00:23:51.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.269000 audit: BPF prog-id=15 op=UNLOAD Sep 6 00:23:51.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.427000 audit: BPF prog-id=18 op=LOAD Sep 6 00:23:51.427000 audit: BPF prog-id=19 op=LOAD Sep 6 00:23:51.427000 audit: BPF prog-id=20 op=LOAD Sep 6 00:23:51.427000 audit: BPF prog-id=16 op=UNLOAD Sep 6 00:23:51.427000 audit: BPF prog-id=17 op=UNLOAD Sep 6 00:23:51.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.478000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 6 00:23:51.478000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd8ad73c70 a2=4000 a3=7ffd8ad73d0c items=0 ppid=1 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:51.478000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 6 00:23:51.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.261777 systemd[1]: Queued start job for default target multi-user.target. Sep 6 00:23:48.138118 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 00:23:51.261790 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. Sep 6 00:23:48.138964 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:48Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 00:23:51.266216 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 6 00:23:48.138994 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:48Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 00:23:51.505028 systemd[1]: Mounted tmp.mount. Sep 6 00:23:48.139044 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:48Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 6 00:23:51.506829 systemd[1]: Finished kmod-static-nodes.service. Sep 6 00:23:48.139060 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:48Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 6 00:23:48.139104 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:48Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 6 00:23:48.139125 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:48Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 6 00:23:48.139408 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:48Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 6 00:23:48.139624 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:48Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 00:23:48.139646 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:48Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 00:23:48.141168 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:48Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 6 00:23:48.141206 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:48Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 6 00:23:48.141226 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:48Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 6 00:23:48.141241 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:48Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 6 00:23:48.141260 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:48Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 6 00:23:48.141274 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:48Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 6 00:23:50.694178 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:50Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:23:50.694427 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:50Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:23:50.694540 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:50Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:23:50.694744 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:50Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:23:50.694794 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:50Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 6 00:23:50.694849 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2025-09-06T00:23:50Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 6 00:23:51.513586 kernel: fuse: init (API version 7.34) Sep 6 00:23:51.515328 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 6 00:23:51.515558 systemd[1]: Finished modprobe@configfs.service. Sep 6 00:23:51.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.516995 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:23:51.517287 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:23:51.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.518784 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 00:23:51.518986 systemd[1]: Finished modprobe@drm.service. Sep 6 00:23:51.520358 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:23:51.520546 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:23:51.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.522372 systemd[1]: Finished systemd-network-generator.service. Sep 6 00:23:51.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.524228 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 6 00:23:51.524453 systemd[1]: Finished modprobe@fuse.service. Sep 6 00:23:51.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.532043 kernel: loop: module loaded Sep 6 00:23:51.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.528698 systemd[1]: Finished systemd-remount-fs.service. Sep 6 00:23:51.530458 systemd[1]: Reached target network-pre.target. Sep 6 00:23:51.534685 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 6 00:23:51.541400 systemd[1]: Mounting sys-kernel-config.mount... Sep 6 00:23:51.542769 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 6 00:23:51.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.547809 systemd[1]: Starting systemd-hwdb-update.service... Sep 6 00:23:51.550217 systemd[1]: Starting systemd-journal-flush.service... Sep 6 00:23:51.551107 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:23:51.554930 systemd[1]: Starting systemd-random-seed.service... Sep 6 00:23:51.557932 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:23:51.558115 systemd[1]: Finished modprobe@loop.service. Sep 6 00:23:51.559529 systemd[1]: Finished systemd-modules-load.service. Sep 6 00:23:51.561077 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 6 00:23:51.562340 systemd[1]: Mounted sys-kernel-config.mount. Sep 6 00:23:51.564734 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:23:51.566170 systemd[1]: Starting systemd-sysctl.service... Sep 6 00:23:51.576780 systemd-journald[1413]: Time spent on flushing to /var/log/journal/ec28dec6cb56c70d68d38e7d079ef519 is 76.716ms for 1200 entries. Sep 6 00:23:51.576780 systemd-journald[1413]: System Journal (/var/log/journal/ec28dec6cb56c70d68d38e7d079ef519) is 8.0M, max 195.6M, 187.6M free. Sep 6 00:23:51.670477 systemd-journald[1413]: Received client request to flush runtime journal. Sep 6 00:23:51.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.589715 systemd[1]: Finished systemd-random-seed.service. Sep 6 00:23:51.590659 systemd[1]: Reached target first-boot-complete.target. Sep 6 00:23:51.673429 udevadm[1452]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Sep 6 00:23:51.621912 systemd[1]: Finished systemd-sysctl.service. Sep 6 00:23:51.626548 systemd[1]: Finished flatcar-tmpfiles.service. Sep 6 00:23:51.628974 systemd[1]: Starting systemd-sysusers.service... Sep 6 00:23:51.650753 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 00:23:51.653155 systemd[1]: Starting systemd-udev-settle.service... Sep 6 00:23:51.671666 systemd[1]: Finished systemd-journal-flush.service. Sep 6 00:23:51.740459 kernel: kauditd_printk_skb: 100 callbacks suppressed Sep 6 00:23:51.740622 kernel: audit: type=1130 audit(1757118231.725:138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.726153 systemd[1]: Finished systemd-sysusers.service. Sep 6 00:23:51.728556 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 6 00:23:51.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.845783 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 6 00:23:51.853598 kernel: audit: type=1130 audit(1757118231.845:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.218769 systemd[1]: Finished systemd-hwdb-update.service. Sep 6 00:23:52.225484 kernel: audit: type=1130 audit(1757118232.217:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.225599 kernel: audit: type=1334 audit(1757118232.222:141): prog-id=21 op=LOAD Sep 6 00:23:52.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.222000 audit: BPF prog-id=21 op=LOAD Sep 6 00:23:52.224000 audit: BPF prog-id=22 op=LOAD Sep 6 00:23:52.224000 audit: BPF prog-id=7 op=UNLOAD Sep 6 00:23:52.224000 audit: BPF prog-id=8 op=UNLOAD Sep 6 00:23:52.226164 systemd[1]: Starting systemd-udevd.service... Sep 6 00:23:52.227590 kernel: audit: type=1334 audit(1757118232.224:142): prog-id=22 op=LOAD Sep 6 00:23:52.227628 kernel: audit: type=1334 audit(1757118232.224:143): prog-id=7 op=UNLOAD Sep 6 00:23:52.227646 kernel: audit: type=1334 audit(1757118232.224:144): prog-id=8 op=UNLOAD Sep 6 00:23:52.245462 systemd-udevd[1456]: Using default interface naming scheme 'v252'. Sep 6 00:23:52.306771 kernel: audit: type=1130 audit(1757118232.298:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.306857 kernel: audit: type=1334 audit(1757118232.299:146): prog-id=23 op=LOAD Sep 6 00:23:52.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.299000 audit: BPF prog-id=23 op=LOAD Sep 6 00:23:52.298991 systemd[1]: Started systemd-udevd.service. Sep 6 00:23:52.301353 systemd[1]: Starting systemd-networkd.service... Sep 6 00:23:52.322000 audit: BPF prog-id=24 op=LOAD Sep 6 00:23:52.322000 audit: BPF prog-id=25 op=LOAD Sep 6 00:23:52.323000 audit: BPF prog-id=26 op=LOAD Sep 6 00:23:52.325257 systemd[1]: Starting systemd-userdbd.service... Sep 6 00:23:52.328611 kernel: audit: type=1334 audit(1757118232.322:147): prog-id=24 op=LOAD Sep 6 00:23:52.342940 (udev-worker)[1462]: Network interface NamePolicy= disabled on kernel command line. Sep 6 00:23:52.345496 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 6 00:23:52.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.365328 systemd[1]: Started systemd-userdbd.service. Sep 6 00:23:52.412601 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Sep 6 00:23:52.422583 kernel: ACPI: button: Power Button [PWRF] Sep 6 00:23:52.426301 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Sep 6 00:23:52.408000 audit[1471]: AVC avc: denied { confidentiality } for pid=1471 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 6 00:23:52.408000 audit[1471]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c4bfbba540 a1=338ec a2=7fdb9a693bc5 a3=5 items=110 ppid=1456 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:52.408000 audit: CWD cwd="/" Sep 6 00:23:52.408000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=1 name=(null) inode=14004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=2 name=(null) inode=14004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=3 name=(null) inode=14005 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.439779 kernel: ACPI: button: Sleep Button [SLPF] Sep 6 00:23:52.408000 audit: PATH item=4 name=(null) inode=14004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=5 name=(null) inode=14006 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=6 name=(null) inode=14004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=7 name=(null) inode=14007 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=8 name=(null) inode=14007 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=9 name=(null) inode=14008 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=10 name=(null) inode=14007 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=11 name=(null) inode=14009 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=12 name=(null) inode=14007 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=13 name=(null) inode=14010 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=14 name=(null) inode=14007 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=15 name=(null) inode=14011 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=16 name=(null) inode=14007 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=17 name=(null) inode=14012 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=18 name=(null) inode=14004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=19 name=(null) inode=14013 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=20 name=(null) inode=14013 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=21 name=(null) inode=14014 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=22 name=(null) inode=14013 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=23 name=(null) inode=14015 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=24 name=(null) inode=14013 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=25 name=(null) inode=14016 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=26 name=(null) inode=14013 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=27 name=(null) inode=14017 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=28 name=(null) inode=14013 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=29 name=(null) inode=14018 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=30 name=(null) inode=14004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=31 name=(null) inode=14019 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=32 name=(null) inode=14019 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=33 name=(null) inode=14020 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=34 name=(null) inode=14019 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=35 name=(null) inode=14021 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=36 name=(null) inode=14019 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=37 name=(null) inode=14022 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=38 name=(null) inode=14019 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=39 name=(null) inode=14023 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=40 name=(null) inode=14019 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=41 name=(null) inode=14024 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=42 name=(null) inode=14004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=43 name=(null) inode=14025 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=44 name=(null) inode=14025 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=45 name=(null) inode=14026 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=46 name=(null) inode=14025 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=47 name=(null) inode=14027 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=48 name=(null) inode=14025 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=49 name=(null) inode=14028 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=50 name=(null) inode=14025 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=51 name=(null) inode=14029 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=52 name=(null) inode=14025 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=53 name=(null) inode=14030 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=55 name=(null) inode=14031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=56 name=(null) inode=14031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=57 name=(null) inode=14032 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=58 name=(null) inode=14031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=59 name=(null) inode=14033 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=60 name=(null) inode=14031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=61 name=(null) inode=14034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=62 name=(null) inode=14034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=63 name=(null) inode=14035 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=64 name=(null) inode=14034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=65 name=(null) inode=14036 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=66 name=(null) inode=14034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=67 name=(null) inode=14037 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=68 name=(null) inode=14034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=69 name=(null) inode=14038 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=70 name=(null) inode=14034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=71 name=(null) inode=14039 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=72 name=(null) inode=14031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=73 name=(null) inode=14040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=74 name=(null) inode=14040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=75 name=(null) inode=14041 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=76 name=(null) inode=14040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=77 name=(null) inode=14042 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=78 name=(null) inode=14040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=79 name=(null) inode=14043 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=80 name=(null) inode=14040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=81 name=(null) inode=14044 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=82 name=(null) inode=14040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=83 name=(null) inode=14045 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=84 name=(null) inode=14031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=85 name=(null) inode=14046 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=86 name=(null) inode=14046 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=87 name=(null) inode=14047 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=88 name=(null) inode=14046 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=89 name=(null) inode=14048 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=90 name=(null) inode=14046 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=91 name=(null) inode=14049 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=92 name=(null) inode=14046 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=93 name=(null) inode=14050 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=94 name=(null) inode=14046 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=95 name=(null) inode=14051 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=96 name=(null) inode=14031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=97 name=(null) inode=14052 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=98 name=(null) inode=14052 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=99 name=(null) inode=14053 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=100 name=(null) inode=14052 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=101 name=(null) inode=14054 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=102 name=(null) inode=14052 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=103 name=(null) inode=14055 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=104 name=(null) inode=14052 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=105 name=(null) inode=14056 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=106 name=(null) inode=14052 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=107 name=(null) inode=14057 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PATH item=109 name=(null) inode=14058 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:52.408000 audit: PROCTITLE proctitle="(udev-worker)" Sep 6 00:23:52.466591 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 Sep 6 00:23:52.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.470149 systemd-networkd[1465]: lo: Link UP Sep 6 00:23:52.470157 systemd-networkd[1465]: lo: Gained carrier Sep 6 00:23:52.470559 systemd-networkd[1465]: Enumeration completed Sep 6 00:23:52.470678 systemd[1]: Started systemd-networkd.service. Sep 6 00:23:52.472537 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 6 00:23:52.474553 systemd-networkd[1465]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 00:23:52.479008 systemd-networkd[1465]: eth0: Link UP Sep 6 00:23:52.479256 systemd-networkd[1465]: eth0: Gained carrier Sep 6 00:23:52.479579 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:23:52.485989 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Sep 6 00:23:52.490003 kernel: mousedev: PS/2 mouse device common for all mice Sep 6 00:23:52.492734 systemd-networkd[1465]: eth0: DHCPv4 address 172.31.25.70/20, gateway 172.31.16.1 acquired from 172.31.16.1 Sep 6 00:23:52.571601 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 00:23:52.573940 systemd[1]: Finished systemd-udev-settle.service. Sep 6 00:23:52.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.576088 systemd[1]: Starting lvm2-activation-early.service... Sep 6 00:23:52.637308 lvm[1570]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 00:23:52.667922 systemd[1]: Finished lvm2-activation-early.service. Sep 6 00:23:52.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.668715 systemd[1]: Reached target cryptsetup.target. Sep 6 00:23:52.670428 systemd[1]: Starting lvm2-activation.service... Sep 6 00:23:52.675485 lvm[1571]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 00:23:52.694798 systemd[1]: Finished lvm2-activation.service. Sep 6 00:23:52.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.695766 systemd[1]: Reached target local-fs-pre.target. Sep 6 00:23:52.696397 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 6 00:23:52.696437 systemd[1]: Reached target local-fs.target. Sep 6 00:23:52.697062 systemd[1]: Reached target machines.target. Sep 6 00:23:52.698929 systemd[1]: Starting ldconfig.service... Sep 6 00:23:52.701011 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:23:52.701069 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:23:52.702227 systemd[1]: Starting systemd-boot-update.service... Sep 6 00:23:52.704472 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 6 00:23:52.706680 systemd[1]: Starting systemd-machine-id-commit.service... Sep 6 00:23:52.709020 systemd[1]: Starting systemd-sysext.service... Sep 6 00:23:52.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.722626 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 6 00:23:52.725963 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1573 (bootctl) Sep 6 00:23:52.728084 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 6 00:23:52.729823 systemd[1]: Unmounting usr-share-oem.mount... Sep 6 00:23:52.736850 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 6 00:23:52.737031 systemd[1]: Unmounted usr-share-oem.mount. Sep 6 00:23:52.750597 kernel: loop0: detected capacity change from 0 to 224512 Sep 6 00:23:52.865353 systemd-fsck[1582]: fsck.fat 4.2 (2021-01-31) Sep 6 00:23:52.865353 systemd-fsck[1582]: /dev/nvme0n1p1: 790 files, 120761/258078 clusters Sep 6 00:23:52.867813 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 6 00:23:52.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.870000 systemd[1]: Mounting boot.mount... Sep 6 00:23:52.894583 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 6 00:23:52.901053 systemd[1]: Mounted boot.mount. Sep 6 00:23:52.906235 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 6 00:23:52.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.907709 systemd[1]: Finished systemd-machine-id-commit.service. Sep 6 00:23:52.913598 kernel: loop1: detected capacity change from 0 to 224512 Sep 6 00:23:52.930763 systemd[1]: Finished systemd-boot-update.service. Sep 6 00:23:52.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.938070 (sd-sysext)[1594]: Using extensions 'kubernetes'. Sep 6 00:23:52.938479 (sd-sysext)[1594]: Merged extensions into '/usr'. Sep 6 00:23:52.957112 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:23:52.958614 systemd[1]: Mounting usr-share-oem.mount... Sep 6 00:23:52.959445 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:23:52.961994 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:23:52.964338 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:23:52.966007 systemd[1]: Starting modprobe@loop.service... Sep 6 00:23:52.966541 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:23:52.966694 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:23:52.966820 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:23:52.969410 systemd[1]: Mounted usr-share-oem.mount. Sep 6 00:23:52.970291 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:23:52.970427 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:23:52.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.971494 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:23:52.971703 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:23:52.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.972541 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:23:52.972775 systemd[1]: Finished modprobe@loop.service. Sep 6 00:23:52.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.973654 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:23:52.973755 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:23:52.974904 systemd[1]: Finished systemd-sysext.service. Sep 6 00:23:52.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:52.976591 systemd[1]: Starting ensure-sysext.service... Sep 6 00:23:52.978180 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 6 00:23:52.984141 systemd[1]: Reloading. Sep 6 00:23:52.991060 systemd-tmpfiles[1605]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 6 00:23:52.994083 systemd-tmpfiles[1605]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 6 00:23:53.003555 systemd-tmpfiles[1605]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 6 00:23:53.078543 /usr/lib/systemd/system-generators/torcx-generator[1624]: time="2025-09-06T00:23:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 00:23:53.083876 /usr/lib/systemd/system-generators/torcx-generator[1624]: time="2025-09-06T00:23:53Z" level=info msg="torcx already run" Sep 6 00:23:53.226544 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 00:23:53.226823 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 00:23:53.261322 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 00:23:53.359000 audit: BPF prog-id=27 op=LOAD Sep 6 00:23:53.359000 audit: BPF prog-id=23 op=UNLOAD Sep 6 00:23:53.360000 audit: BPF prog-id=28 op=LOAD Sep 6 00:23:53.360000 audit: BPF prog-id=29 op=LOAD Sep 6 00:23:53.360000 audit: BPF prog-id=21 op=UNLOAD Sep 6 00:23:53.360000 audit: BPF prog-id=22 op=UNLOAD Sep 6 00:23:53.362000 audit: BPF prog-id=30 op=LOAD Sep 6 00:23:53.362000 audit: BPF prog-id=18 op=UNLOAD Sep 6 00:23:53.362000 audit: BPF prog-id=31 op=LOAD Sep 6 00:23:53.362000 audit: BPF prog-id=32 op=LOAD Sep 6 00:23:53.362000 audit: BPF prog-id=19 op=UNLOAD Sep 6 00:23:53.362000 audit: BPF prog-id=20 op=UNLOAD Sep 6 00:23:53.364000 audit: BPF prog-id=33 op=LOAD Sep 6 00:23:53.364000 audit: BPF prog-id=24 op=UNLOAD Sep 6 00:23:53.364000 audit: BPF prog-id=34 op=LOAD Sep 6 00:23:53.364000 audit: BPF prog-id=35 op=LOAD Sep 6 00:23:53.364000 audit: BPF prog-id=25 op=UNLOAD Sep 6 00:23:53.364000 audit: BPF prog-id=26 op=UNLOAD Sep 6 00:23:53.370070 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 6 00:23:53.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.376166 systemd[1]: Starting audit-rules.service... Sep 6 00:23:53.378361 systemd[1]: Starting clean-ca-certificates.service... Sep 6 00:23:53.382685 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 6 00:23:53.382000 audit: BPF prog-id=36 op=LOAD Sep 6 00:23:53.386000 audit: BPF prog-id=37 op=LOAD Sep 6 00:23:53.386510 systemd[1]: Starting systemd-resolved.service... Sep 6 00:23:53.389653 systemd[1]: Starting systemd-timesyncd.service... Sep 6 00:23:53.393686 systemd[1]: Starting systemd-update-utmp.service... Sep 6 00:23:53.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.403706 systemd[1]: Finished clean-ca-certificates.service. Sep 6 00:23:53.404592 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 00:23:53.408000 audit[1686]: SYSTEM_BOOT pid=1686 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.414853 systemd[1]: Finished systemd-update-utmp.service. Sep 6 00:23:53.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.422339 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:23:53.424999 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:23:53.428868 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:23:53.433110 systemd[1]: Starting modprobe@loop.service... Sep 6 00:23:53.433899 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:23:53.434088 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:23:53.434285 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 00:23:53.435626 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:23:53.435820 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:23:53.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.438163 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:23:53.438332 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:23:53.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.440092 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:23:53.445384 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:23:53.445558 systemd[1]: Finished modprobe@loop.service. Sep 6 00:23:53.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.447038 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:23:53.448914 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:23:53.452658 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:23:53.453968 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:23:53.454150 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:23:53.454316 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 00:23:53.456040 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:23:53.456214 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:23:53.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.458009 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:23:53.458177 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:23:53.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.461073 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:23:53.461221 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:23:53.466870 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:23:53.468802 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:23:53.471809 systemd[1]: Starting modprobe@drm.service... Sep 6 00:23:53.475168 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:23:53.478275 systemd[1]: Starting modprobe@loop.service... Sep 6 00:23:53.479495 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:23:53.479707 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:23:53.479926 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 00:23:53.481378 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:23:53.481606 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:23:53.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.485292 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 00:23:53.485507 systemd[1]: Finished modprobe@drm.service. Sep 6 00:23:53.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.489414 systemd[1]: Finished ensure-sysext.service. Sep 6 00:23:53.492008 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:23:53.492187 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:23:53.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.492949 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:23:53.498177 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:23:53.498354 systemd[1]: Finished modprobe@loop.service. Sep 6 00:23:53.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.499139 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:23:53.539000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 6 00:23:53.539000 audit[1710]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffde6c6c840 a2=420 a3=0 items=0 ppid=1681 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:53.539000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 6 00:23:53.540949 augenrules[1710]: No rules Sep 6 00:23:53.541750 systemd[1]: Finished audit-rules.service. Sep 6 00:23:53.545662 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 6 00:23:53.574957 systemd[1]: Started systemd-timesyncd.service. Sep 6 00:23:53.575622 systemd[1]: Reached target time-set.target. Sep 6 00:23:53.586851 ldconfig[1572]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 6 00:23:53.590950 systemd-networkd[1465]: eth0: Gained IPv6LL Sep 6 00:23:53.593047 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 6 00:23:53.595831 systemd-resolved[1684]: Positive Trust Anchors: Sep 6 00:23:53.596103 systemd-resolved[1684]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 00:23:53.596206 systemd-resolved[1684]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 00:23:53.596412 systemd[1]: Finished ldconfig.service. Sep 6 00:23:53.598059 systemd[1]: Starting systemd-update-done.service... Sep 6 00:23:53.605846 systemd[1]: Finished systemd-update-done.service. Sep 6 00:23:53.632411 systemd-resolved[1684]: Defaulting to hostname 'linux'. Sep 6 00:23:53.634075 systemd[1]: Started systemd-resolved.service. Sep 6 00:23:53.634523 systemd[1]: Reached target network.target. Sep 6 00:23:53.634866 systemd[1]: Reached target network-online.target. Sep 6 00:23:53.635188 systemd[1]: Reached target nss-lookup.target. Sep 6 00:23:53.635594 systemd[1]: Reached target sysinit.target. Sep 6 00:23:53.635983 systemd[1]: Started motdgen.path. Sep 6 00:23:53.636314 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 6 00:23:53.636804 systemd[1]: Started logrotate.timer. Sep 6 00:23:53.637202 systemd[1]: Started mdadm.timer. Sep 6 00:23:53.637512 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 6 00:23:53.637831 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 6 00:23:53.637862 systemd[1]: Reached target paths.target. Sep 6 00:23:53.638161 systemd[1]: Reached target timers.target. Sep 6 00:23:53.638749 systemd[1]: Listening on dbus.socket. Sep 6 00:23:53.640150 systemd[1]: Starting docker.socket... Sep 6 00:23:53.644152 systemd[1]: Listening on sshd.socket. Sep 6 00:23:53.644639 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:23:53.645125 systemd[1]: Listening on docker.socket. Sep 6 00:23:53.645529 systemd[1]: Reached target sockets.target. Sep 6 00:23:53.645855 systemd[1]: Reached target basic.target. Sep 6 00:23:53.646190 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 00:23:53.646218 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 00:23:53.647234 systemd[1]: Started amazon-ssm-agent.service. Sep 6 00:23:53.648812 systemd[1]: Starting containerd.service... Sep 6 00:23:53.651026 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Sep 6 00:23:53.652440 systemd[1]: Starting dbus.service... Sep 6 00:23:53.654045 systemd[1]: Starting enable-oem-cloudinit.service... Sep 6 00:23:53.657962 systemd[1]: Starting extend-filesystems.service... Sep 6 00:23:53.658693 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 6 00:23:53.662419 systemd[1]: Starting kubelet.service... Sep 6 00:23:53.665008 jq[1723]: false Sep 6 00:23:53.667168 systemd[1]: Starting motdgen.service... Sep 6 00:23:53.670607 systemd[1]: Started nvidia.service. Sep 6 00:23:53.672135 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 6 00:23:53.675041 systemd[1]: Starting sshd-keygen.service... Sep 6 00:23:53.677898 systemd[1]: Starting systemd-logind.service... Sep 6 00:23:53.680130 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:23:53.710700 jq[1737]: true Sep 6 00:23:53.680205 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 6 00:23:53.686040 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 6 00:23:53.686901 systemd[1]: Starting update-engine.service... Sep 6 00:23:53.690115 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 6 00:23:53.695712 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 6 00:23:53.695901 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 6 00:23:53.699083 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 6 00:23:53.699259 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 6 00:23:53.744641 jq[1740]: true Sep 6 00:23:53.737616 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:23:53.737639 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:23:53.744531 systemd[1]: motdgen.service: Deactivated successfully. Sep 6 00:23:53.744728 systemd[1]: Finished motdgen.service. Sep 6 00:23:53.851627 dbus-daemon[1722]: [system] SELinux support is enabled Sep 6 00:23:53.851791 systemd[1]: Started dbus.service. Sep 6 00:23:53.853960 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 6 00:23:53.853994 systemd[1]: Reached target system-config.target. Sep 6 00:23:53.854371 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 6 00:23:53.854396 systemd[1]: Reached target user-config.target. Sep 6 00:23:53.857637 dbus-daemon[1722]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1465 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Sep 6 00:23:53.860120 extend-filesystems[1724]: Found loop1 Sep 6 00:23:53.861093 extend-filesystems[1724]: Found nvme0n1 Sep 6 00:23:53.861096 systemd[1]: Starting systemd-hostnamed.service... Sep 6 00:23:53.862408 extend-filesystems[1724]: Found nvme0n1p1 Sep 6 00:23:53.862868 extend-filesystems[1724]: Found nvme0n1p2 Sep 6 00:23:53.863491 extend-filesystems[1724]: Found nvme0n1p3 Sep 6 00:23:53.864299 bash[1770]: Updated "/home/core/.ssh/authorized_keys" Sep 6 00:23:53.864996 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 6 00:23:53.865592 extend-filesystems[1724]: Found usr Sep 6 00:23:53.866034 extend-filesystems[1724]: Found nvme0n1p4 Sep 6 00:23:53.869851 extend-filesystems[1724]: Found nvme0n1p6 Sep 6 00:23:53.870859 extend-filesystems[1724]: Found nvme0n1p7 Sep 6 00:23:53.871681 extend-filesystems[1724]: Found nvme0n1p9 Sep 6 00:23:53.875064 extend-filesystems[1724]: Checking size of /dev/nvme0n1p9 Sep 6 00:23:55.153692 systemd-resolved[1684]: Clock change detected. Flushing caches. Sep 6 00:23:55.153860 systemd-timesyncd[1685]: Contacted time server 45.83.234.123:123 (0.flatcar.pool.ntp.org). Sep 6 00:23:55.154064 systemd-timesyncd[1685]: Initial clock synchronization to Sat 2025-09-06 00:23:55.153428 UTC. Sep 6 00:23:55.161609 amazon-ssm-agent[1719]: 2025/09/06 00:23:55 Failed to load instance info from vault. RegistrationKey does not exist. Sep 6 00:23:55.162489 amazon-ssm-agent[1719]: Initializing new seelog logger Sep 6 00:23:55.163065 amazon-ssm-agent[1719]: New Seelog Logger Creation Complete Sep 6 00:23:55.163135 amazon-ssm-agent[1719]: 2025/09/06 00:23:55 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Sep 6 00:23:55.163135 amazon-ssm-agent[1719]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Sep 6 00:23:55.163276 amazon-ssm-agent[1719]: 2025/09/06 00:23:55 processing appconfig overrides Sep 6 00:23:55.181057 update_engine[1736]: I0906 00:23:55.179999 1736 main.cc:92] Flatcar Update Engine starting Sep 6 00:23:55.186428 systemd[1]: Started update-engine.service. Sep 6 00:23:55.188503 systemd[1]: Started locksmithd.service. Sep 6 00:23:55.192747 update_engine[1736]: I0906 00:23:55.192716 1736 update_check_scheduler.cc:74] Next update check in 9m40s Sep 6 00:23:55.195885 extend-filesystems[1724]: Resized partition /dev/nvme0n1p9 Sep 6 00:23:55.208403 extend-filesystems[1791]: resize2fs 1.46.5 (30-Dec-2021) Sep 6 00:23:55.222546 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Sep 6 00:23:55.228978 systemd[1]: nvidia.service: Deactivated successfully. Sep 6 00:23:55.247701 env[1743]: time="2025-09-06T00:23:55.247653649Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 6 00:23:55.291948 systemd-logind[1733]: Watching system buttons on /dev/input/event1 (Power Button) Sep 6 00:23:55.292246 systemd-logind[1733]: Watching system buttons on /dev/input/event2 (Sleep Button) Sep 6 00:23:55.292313 systemd-logind[1733]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 6 00:23:55.294601 systemd-logind[1733]: New seat seat0. Sep 6 00:23:55.300344 systemd[1]: Started systemd-logind.service. Sep 6 00:23:55.352368 env[1743]: time="2025-09-06T00:23:55.352259243Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 6 00:23:55.353537 env[1743]: time="2025-09-06T00:23:55.353465756Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:23:55.356046 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Sep 6 00:23:55.356244 env[1743]: time="2025-09-06T00:23:55.356215518Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.190-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 6 00:23:55.371978 env[1743]: time="2025-09-06T00:23:55.356244409Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:23:55.366582 systemd[1]: Started systemd-hostnamed.service. Sep 6 00:23:55.366422 dbus-daemon[1722]: [system] Successfully activated service 'org.freedesktop.hostname1' Sep 6 00:23:55.370990 systemd[1]: Starting polkit.service... Sep 6 00:23:55.367967 dbus-daemon[1722]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1775 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Sep 6 00:23:55.372586 env[1743]: time="2025-09-06T00:23:55.372461322Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 00:23:55.372586 env[1743]: time="2025-09-06T00:23:55.372491738Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 6 00:23:55.372586 env[1743]: time="2025-09-06T00:23:55.372506738Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 6 00:23:55.372586 env[1743]: time="2025-09-06T00:23:55.372531489Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 6 00:23:55.372707 env[1743]: time="2025-09-06T00:23:55.372629932Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:23:55.373008 env[1743]: time="2025-09-06T00:23:55.372888330Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:23:55.373062 env[1743]: time="2025-09-06T00:23:55.373045907Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 00:23:55.373105 env[1743]: time="2025-09-06T00:23:55.373075852Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 6 00:23:55.373129 env[1743]: time="2025-09-06T00:23:55.373119752Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 6 00:23:55.373163 env[1743]: time="2025-09-06T00:23:55.373130632Z" level=info msg="metadata content store policy set" policy=shared Sep 6 00:23:55.376346 extend-filesystems[1791]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Sep 6 00:23:55.376346 extend-filesystems[1791]: old_desc_blocks = 1, new_desc_blocks = 1 Sep 6 00:23:55.376346 extend-filesystems[1791]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Sep 6 00:23:55.378767 extend-filesystems[1724]: Resized filesystem in /dev/nvme0n1p9 Sep 6 00:23:55.377366 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 6 00:23:55.377547 systemd[1]: Finished extend-filesystems.service. Sep 6 00:23:55.384606 env[1743]: time="2025-09-06T00:23:55.384566846Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 6 00:23:55.384713 env[1743]: time="2025-09-06T00:23:55.384620563Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 6 00:23:55.384713 env[1743]: time="2025-09-06T00:23:55.384634255Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 6 00:23:55.384713 env[1743]: time="2025-09-06T00:23:55.384670373Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 6 00:23:55.384796 env[1743]: time="2025-09-06T00:23:55.384725143Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 6 00:23:55.384796 env[1743]: time="2025-09-06T00:23:55.384740015Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 6 00:23:55.384796 env[1743]: time="2025-09-06T00:23:55.384752530Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 6 00:23:55.384796 env[1743]: time="2025-09-06T00:23:55.384768446Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 6 00:23:55.384796 env[1743]: time="2025-09-06T00:23:55.384791661Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 6 00:23:55.384908 env[1743]: time="2025-09-06T00:23:55.384804846Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 6 00:23:55.384908 env[1743]: time="2025-09-06T00:23:55.384816894Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 6 00:23:55.384908 env[1743]: time="2025-09-06T00:23:55.384828209Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 6 00:23:55.384973 env[1743]: time="2025-09-06T00:23:55.384952963Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 6 00:23:55.385039 env[1743]: time="2025-09-06T00:23:55.385024245Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 6 00:23:55.385311 env[1743]: time="2025-09-06T00:23:55.385293824Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 6 00:23:55.385351 env[1743]: time="2025-09-06T00:23:55.385322435Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 6 00:23:55.385351 env[1743]: time="2025-09-06T00:23:55.385335998Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 6 00:23:55.385400 env[1743]: time="2025-09-06T00:23:55.385387043Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 6 00:23:55.385425 env[1743]: time="2025-09-06T00:23:55.385401138Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 6 00:23:55.385500 env[1743]: time="2025-09-06T00:23:55.385485527Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 6 00:23:55.385546 env[1743]: time="2025-09-06T00:23:55.385503602Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 6 00:23:55.385657 env[1743]: time="2025-09-06T00:23:55.385642603Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 6 00:23:55.385696 env[1743]: time="2025-09-06T00:23:55.385661543Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 6 00:23:55.385696 env[1743]: time="2025-09-06T00:23:55.385676720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 6 00:23:55.385696 env[1743]: time="2025-09-06T00:23:55.385687730Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 6 00:23:55.385767 env[1743]: time="2025-09-06T00:23:55.385702060Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 6 00:23:55.385841 env[1743]: time="2025-09-06T00:23:55.385826430Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 6 00:23:55.385868 env[1743]: time="2025-09-06T00:23:55.385846161Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 6 00:23:55.385868 env[1743]: time="2025-09-06T00:23:55.385858876Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 6 00:23:55.385913 env[1743]: time="2025-09-06T00:23:55.385870348Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 6 00:23:55.385913 env[1743]: time="2025-09-06T00:23:55.385885475Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 6 00:23:55.385913 env[1743]: time="2025-09-06T00:23:55.385896704Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 6 00:23:55.385982 env[1743]: time="2025-09-06T00:23:55.385914252Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 6 00:23:55.385982 env[1743]: time="2025-09-06T00:23:55.385948270Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 6 00:23:55.386178 env[1743]: time="2025-09-06T00:23:55.386133692Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 6 00:23:55.389386 env[1743]: time="2025-09-06T00:23:55.386188563Z" level=info msg="Connect containerd service" Sep 6 00:23:55.389386 env[1743]: time="2025-09-06T00:23:55.386223296Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 6 00:23:55.389386 env[1743]: time="2025-09-06T00:23:55.387146040Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 6 00:23:55.389386 env[1743]: time="2025-09-06T00:23:55.388312946Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 6 00:23:55.389386 env[1743]: time="2025-09-06T00:23:55.388358164Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 6 00:23:55.388476 systemd[1]: Started containerd.service. Sep 6 00:23:55.390777 env[1743]: time="2025-09-06T00:23:55.390712542Z" level=info msg="containerd successfully booted in 0.143814s" Sep 6 00:23:55.390879 env[1743]: time="2025-09-06T00:23:55.390852966Z" level=info msg="Start subscribing containerd event" Sep 6 00:23:55.391027 env[1743]: time="2025-09-06T00:23:55.390905301Z" level=info msg="Start recovering state" Sep 6 00:23:55.391027 env[1743]: time="2025-09-06T00:23:55.390969305Z" level=info msg="Start event monitor" Sep 6 00:23:55.391027 env[1743]: time="2025-09-06T00:23:55.390979459Z" level=info msg="Start snapshots syncer" Sep 6 00:23:55.391027 env[1743]: time="2025-09-06T00:23:55.390989364Z" level=info msg="Start cni network conf syncer for default" Sep 6 00:23:55.391027 env[1743]: time="2025-09-06T00:23:55.390996692Z" level=info msg="Start streaming server" Sep 6 00:23:55.405552 polkitd[1826]: Started polkitd version 121 Sep 6 00:23:55.424776 coreos-metadata[1721]: Sep 06 00:23:55.424 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Sep 6 00:23:55.427726 coreos-metadata[1721]: Sep 06 00:23:55.427 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Sep 6 00:23:55.432582 coreos-metadata[1721]: Sep 06 00:23:55.432 INFO Fetch successful Sep 6 00:23:55.432582 coreos-metadata[1721]: Sep 06 00:23:55.432 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Sep 6 00:23:55.433913 coreos-metadata[1721]: Sep 06 00:23:55.433 INFO Fetch successful Sep 6 00:23:55.434814 polkitd[1826]: Loading rules from directory /etc/polkit-1/rules.d Sep 6 00:23:55.434876 polkitd[1826]: Loading rules from directory /usr/share/polkit-1/rules.d Sep 6 00:23:55.437143 unknown[1721]: wrote ssh authorized keys file for user: core Sep 6 00:23:55.437898 polkitd[1826]: Finished loading, compiling and executing 2 rules Sep 6 00:23:55.438392 dbus-daemon[1722]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Sep 6 00:23:55.438548 systemd[1]: Started polkit.service. Sep 6 00:23:55.439847 polkitd[1826]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Sep 6 00:23:55.455854 update-ssh-keys[1843]: Updated "/home/core/.ssh/authorized_keys" Sep 6 00:23:55.456253 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Sep 6 00:23:55.466831 systemd-hostnamed[1775]: Hostname set to (transient) Sep 6 00:23:55.466938 systemd-resolved[1684]: System hostname changed to 'ip-172-31-25-70'. Sep 6 00:23:55.588196 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO Create new startup processor Sep 6 00:23:55.588466 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [LongRunningPluginsManager] registered plugins: {} Sep 6 00:23:55.588551 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO Initializing bookkeeping folders Sep 6 00:23:55.588606 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO removing the completed state files Sep 6 00:23:55.588656 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO Initializing bookkeeping folders for long running plugins Sep 6 00:23:55.588700 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Sep 6 00:23:55.588763 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO Initializing healthcheck folders for long running plugins Sep 6 00:23:55.588806 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO Initializing locations for inventory plugin Sep 6 00:23:55.588863 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO Initializing default location for custom inventory Sep 6 00:23:55.588997 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO Initializing default location for file inventory Sep 6 00:23:55.588997 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO Initializing default location for role inventory Sep 6 00:23:55.588997 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO Init the cloudwatchlogs publisher Sep 6 00:23:55.588997 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [instanceID=i-0c96dc42fac461404] Successfully loaded platform independent plugin aws:updateSsmAgent Sep 6 00:23:55.588997 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [instanceID=i-0c96dc42fac461404] Successfully loaded platform independent plugin aws:runPowerShellScript Sep 6 00:23:55.588997 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [instanceID=i-0c96dc42fac461404] Successfully loaded platform independent plugin aws:configureDocker Sep 6 00:23:55.588997 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [instanceID=i-0c96dc42fac461404] Successfully loaded platform independent plugin aws:runDockerAction Sep 6 00:23:55.588997 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [instanceID=i-0c96dc42fac461404] Successfully loaded platform independent plugin aws:refreshAssociation Sep 6 00:23:55.588997 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [instanceID=i-0c96dc42fac461404] Successfully loaded platform independent plugin aws:configurePackage Sep 6 00:23:55.588997 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [instanceID=i-0c96dc42fac461404] Successfully loaded platform independent plugin aws:downloadContent Sep 6 00:23:55.590106 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [instanceID=i-0c96dc42fac461404] Successfully loaded platform independent plugin aws:runDocument Sep 6 00:23:55.590106 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [instanceID=i-0c96dc42fac461404] Successfully loaded platform independent plugin aws:softwareInventory Sep 6 00:23:55.590106 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [instanceID=i-0c96dc42fac461404] Successfully loaded platform dependent plugin aws:runShellScript Sep 6 00:23:55.590106 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Sep 6 00:23:55.590106 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO OS: linux, Arch: amd64 Sep 6 00:23:55.590106 amazon-ssm-agent[1719]: datastore file /var/lib/amazon/ssm/i-0c96dc42fac461404/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Sep 6 00:23:55.593402 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [MessagingDeliveryService] Starting document processing engine... Sep 6 00:23:55.689177 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [MessagingDeliveryService] [EngineProcessor] Starting Sep 6 00:23:55.783435 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Sep 6 00:23:55.790431 locksmithd[1787]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 6 00:23:55.878563 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [MessagingDeliveryService] Starting message polling Sep 6 00:23:55.883529 sshd_keygen[1762]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 6 00:23:55.911047 systemd[1]: Finished sshd-keygen.service. Sep 6 00:23:55.913698 systemd[1]: Starting issuegen.service... Sep 6 00:23:55.921967 systemd[1]: issuegen.service: Deactivated successfully. Sep 6 00:23:55.922187 systemd[1]: Finished issuegen.service. Sep 6 00:23:55.925004 systemd[1]: Starting systemd-user-sessions.service... Sep 6 00:23:55.933140 systemd[1]: Finished systemd-user-sessions.service. Sep 6 00:23:55.936143 systemd[1]: Started getty@tty1.service. Sep 6 00:23:55.938680 systemd[1]: Started serial-getty@ttyS0.service. Sep 6 00:23:55.939944 systemd[1]: Reached target getty.target. Sep 6 00:23:55.972635 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [MessagingDeliveryService] Starting send replies to MDS Sep 6 00:23:56.067575 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [instanceID=i-0c96dc42fac461404] Starting association polling Sep 6 00:23:56.162784 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Sep 6 00:23:56.257968 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [MessagingDeliveryService] [Association] Launching response handler Sep 6 00:23:56.353434 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Sep 6 00:23:56.449202 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Sep 6 00:23:56.545089 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Sep 6 00:23:56.641109 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [OfflineService] Starting document processing engine... Sep 6 00:23:56.737612 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [OfflineService] [EngineProcessor] Starting Sep 6 00:23:56.834092 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [OfflineService] [EngineProcessor] Initial processing Sep 6 00:23:56.930694 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [OfflineService] Starting message polling Sep 6 00:23:56.984809 systemd[1]: Created slice system-sshd.slice. Sep 6 00:23:56.986698 systemd[1]: Started sshd@0-172.31.25.70:22-139.178.68.195:43140.service. Sep 6 00:23:57.027743 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [OfflineService] Starting send replies to MDS Sep 6 00:23:57.124735 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [LongRunningPluginsManager] starting long running plugin manager Sep 6 00:23:57.174699 sshd[1925]: Accepted publickey for core from 139.178.68.195 port 43140 ssh2: RSA SHA256:XzAVKqTn5JA8LhAwCCkjW+qfEc9zGxl5jKXGmKv4mAc Sep 6 00:23:57.177728 sshd[1925]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:23:57.192634 systemd[1]: Created slice user-500.slice. Sep 6 00:23:57.194526 systemd[1]: Starting user-runtime-dir@500.service... Sep 6 00:23:57.198151 systemd-logind[1733]: New session 1 of user core. Sep 6 00:23:57.206381 systemd[1]: Finished user-runtime-dir@500.service. Sep 6 00:23:57.208482 systemd[1]: Starting user@500.service... Sep 6 00:23:57.214606 (systemd)[1928]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:23:57.222001 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Sep 6 00:23:57.300169 systemd[1]: Started kubelet.service. Sep 6 00:23:57.301600 systemd[1]: Reached target multi-user.target. Sep 6 00:23:57.304394 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 6 00:23:57.319330 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 6 00:23:57.319575 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [HealthCheck] HealthCheck reporting agent health. Sep 6 00:23:57.319556 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 6 00:23:57.336753 systemd[1928]: Queued start job for default target default.target. Sep 6 00:23:57.337418 systemd[1928]: Reached target paths.target. Sep 6 00:23:57.337448 systemd[1928]: Reached target sockets.target. Sep 6 00:23:57.337466 systemd[1928]: Reached target timers.target. Sep 6 00:23:57.337483 systemd[1928]: Reached target basic.target. Sep 6 00:23:57.337633 systemd[1]: Started user@500.service. Sep 6 00:23:57.339600 systemd[1928]: Reached target default.target. Sep 6 00:23:57.339662 systemd[1928]: Startup finished in 117ms. Sep 6 00:23:57.339774 systemd[1]: Started session-1.scope. Sep 6 00:23:57.340451 systemd[1]: Startup finished in 597ms (kernel) + 5.863s (initrd) + 8.455s (userspace) = 14.916s. Sep 6 00:23:57.417041 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [MessageGatewayService] Starting session document processing engine... Sep 6 00:23:57.487470 systemd[1]: Started sshd@1-172.31.25.70:22-139.178.68.195:43142.service. Sep 6 00:23:57.514883 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [MessageGatewayService] [EngineProcessor] Starting Sep 6 00:23:57.613254 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Sep 6 00:23:57.655162 sshd[1941]: Accepted publickey for core from 139.178.68.195 port 43142 ssh2: RSA SHA256:XzAVKqTn5JA8LhAwCCkjW+qfEc9zGxl5jKXGmKv4mAc Sep 6 00:23:57.656199 sshd[1941]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:23:57.662921 systemd[1]: Started session-2.scope. Sep 6 00:23:57.664482 systemd-logind[1733]: New session 2 of user core. Sep 6 00:23:57.711169 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0c96dc42fac461404, requestId: de1f0e0b-7f7f-40ba-859c-f8bb2ef3187a Sep 6 00:23:57.787115 sshd[1941]: pam_unix(sshd:session): session closed for user core Sep 6 00:23:57.790586 systemd[1]: sshd@1-172.31.25.70:22-139.178.68.195:43142.service: Deactivated successfully. Sep 6 00:23:57.791533 systemd[1]: session-2.scope: Deactivated successfully. Sep 6 00:23:57.792483 systemd-logind[1733]: Session 2 logged out. Waiting for processes to exit. Sep 6 00:23:57.793558 systemd-logind[1733]: Removed session 2. Sep 6 00:23:57.810757 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Sep 6 00:23:57.813271 systemd[1]: Started sshd@2-172.31.25.70:22-139.178.68.195:43150.service. Sep 6 00:23:57.909412 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [MessageGatewayService] listening reply. Sep 6 00:23:57.981865 sshd[1951]: Accepted publickey for core from 139.178.68.195 port 43150 ssh2: RSA SHA256:XzAVKqTn5JA8LhAwCCkjW+qfEc9zGxl5jKXGmKv4mAc Sep 6 00:23:57.983399 sshd[1951]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:23:57.988619 systemd[1]: Started session-3.scope. Sep 6 00:23:57.989476 systemd-logind[1733]: New session 3 of user core. Sep 6 00:23:58.008194 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [StartupProcessor] Executing startup processor tasks Sep 6 00:23:58.107198 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Sep 6 00:23:58.116181 sshd[1951]: pam_unix(sshd:session): session closed for user core Sep 6 00:23:58.119489 systemd[1]: sshd@2-172.31.25.70:22-139.178.68.195:43150.service: Deactivated successfully. Sep 6 00:23:58.120396 systemd[1]: session-3.scope: Deactivated successfully. Sep 6 00:23:58.121412 systemd-logind[1733]: Session 3 logged out. Waiting for processes to exit. Sep 6 00:23:58.123018 systemd-logind[1733]: Removed session 3. Sep 6 00:23:58.139390 systemd[1]: Started sshd@3-172.31.25.70:22-139.178.68.195:43166.service. Sep 6 00:23:58.206575 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Sep 6 00:23:58.300921 kubelet[1936]: E0906 00:23:58.300841 1936 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:23:58.301486 sshd[1957]: Accepted publickey for core from 139.178.68.195 port 43166 ssh2: RSA SHA256:XzAVKqTn5JA8LhAwCCkjW+qfEc9zGxl5jKXGmKv4mAc Sep 6 00:23:58.303035 sshd[1957]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:23:58.303118 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:23:58.303242 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:23:58.303488 systemd[1]: kubelet.service: Consumed 1.056s CPU time. Sep 6 00:23:58.306047 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.8 Sep 6 00:23:58.309540 systemd[1]: Started session-4.scope. Sep 6 00:23:58.310042 systemd-logind[1733]: New session 4 of user core. Sep 6 00:23:58.405552 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0c96dc42fac461404?role=subscribe&stream=input Sep 6 00:23:58.437984 sshd[1957]: pam_unix(sshd:session): session closed for user core Sep 6 00:23:58.440891 systemd[1]: sshd@3-172.31.25.70:22-139.178.68.195:43166.service: Deactivated successfully. Sep 6 00:23:58.441589 systemd[1]: session-4.scope: Deactivated successfully. Sep 6 00:23:58.442082 systemd-logind[1733]: Session 4 logged out. Waiting for processes to exit. Sep 6 00:23:58.442911 systemd-logind[1733]: Removed session 4. Sep 6 00:23:58.463395 systemd[1]: Started sshd@4-172.31.25.70:22-139.178.68.195:43174.service. Sep 6 00:23:58.505414 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0c96dc42fac461404?role=subscribe&stream=input Sep 6 00:23:58.605400 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [MessageGatewayService] Starting receiving message from control channel Sep 6 00:23:58.624402 sshd[1963]: Accepted publickey for core from 139.178.68.195 port 43174 ssh2: RSA SHA256:XzAVKqTn5JA8LhAwCCkjW+qfEc9zGxl5jKXGmKv4mAc Sep 6 00:23:58.625876 sshd[1963]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:23:58.631058 systemd[1]: Started session-5.scope. Sep 6 00:23:58.631576 systemd-logind[1733]: New session 5 of user core. Sep 6 00:23:58.705637 amazon-ssm-agent[1719]: 2025-09-06 00:23:55 INFO [MessageGatewayService] [EngineProcessor] Initial processing Sep 6 00:23:58.756327 sudo[1966]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 6 00:23:58.756901 sudo[1966]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:23:58.765701 dbus-daemon[1722]: \xd0\xdd\u001d\xb8\xc7U: received setenforce notice (enforcing=2088823728) Sep 6 00:23:58.767494 sudo[1966]: pam_unix(sudo:session): session closed for user root Sep 6 00:23:58.791729 sshd[1963]: pam_unix(sshd:session): session closed for user core Sep 6 00:23:58.794592 systemd[1]: sshd@4-172.31.25.70:22-139.178.68.195:43174.service: Deactivated successfully. Sep 6 00:23:58.795328 systemd[1]: session-5.scope: Deactivated successfully. Sep 6 00:23:58.795982 systemd-logind[1733]: Session 5 logged out. Waiting for processes to exit. Sep 6 00:23:58.796881 systemd-logind[1733]: Removed session 5. Sep 6 00:23:58.816125 systemd[1]: Started sshd@5-172.31.25.70:22-139.178.68.195:43176.service. Sep 6 00:23:58.972945 sshd[1970]: Accepted publickey for core from 139.178.68.195 port 43176 ssh2: RSA SHA256:XzAVKqTn5JA8LhAwCCkjW+qfEc9zGxl5jKXGmKv4mAc Sep 6 00:23:58.974393 sshd[1970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:23:58.979009 systemd[1]: Started session-6.scope. Sep 6 00:23:58.979339 systemd-logind[1733]: New session 6 of user core. Sep 6 00:23:59.083685 sudo[1974]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 6 00:23:59.084003 sudo[1974]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:23:59.087663 sudo[1974]: pam_unix(sudo:session): session closed for user root Sep 6 00:23:59.093014 sudo[1973]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 6 00:23:59.093329 sudo[1973]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:23:59.103476 systemd[1]: Stopping audit-rules.service... Sep 6 00:23:59.104000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 00:23:59.105737 auditctl[1977]: No rules Sep 6 00:23:59.106084 kernel: kauditd_printk_skb: 178 callbacks suppressed Sep 6 00:23:59.106124 kernel: audit: type=1305 audit(1757118239.104:211): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 00:23:59.104000 audit[1977]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffdcfec5a0 a2=420 a3=0 items=0 ppid=1 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:59.108845 systemd[1]: audit-rules.service: Deactivated successfully. Sep 6 00:23:59.109060 systemd[1]: Stopped audit-rules.service. Sep 6 00:23:59.111141 systemd[1]: Starting audit-rules.service... Sep 6 00:23:59.114633 kernel: audit: type=1300 audit(1757118239.104:211): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffdcfec5a0 a2=420 a3=0 items=0 ppid=1 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:59.104000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 6 00:23:59.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:59.121181 kernel: audit: type=1327 audit(1757118239.104:211): proctitle=2F7362696E2F617564697463746C002D44 Sep 6 00:23:59.121258 kernel: audit: type=1131 audit(1757118239.107:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:59.134369 augenrules[1994]: No rules Sep 6 00:23:59.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:59.135018 systemd[1]: Finished audit-rules.service. Sep 6 00:23:59.137723 sudo[1973]: pam_unix(sudo:session): session closed for user root Sep 6 00:23:59.135000 audit[1973]: USER_END pid=1973 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:23:59.143697 kernel: audit: type=1130 audit(1757118239.134:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:59.143758 kernel: audit: type=1106 audit(1757118239.135:214): pid=1973 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:23:59.143788 kernel: audit: type=1104 audit(1757118239.135:215): pid=1973 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:23:59.135000 audit[1973]: CRED_DISP pid=1973 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:23:59.160921 sshd[1970]: pam_unix(sshd:session): session closed for user core Sep 6 00:23:59.161000 audit[1970]: USER_END pid=1970 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 6 00:23:59.164003 systemd-logind[1733]: Session 6 logged out. Waiting for processes to exit. Sep 6 00:23:59.165307 systemd[1]: sshd@5-172.31.25.70:22-139.178.68.195:43176.service: Deactivated successfully. Sep 6 00:23:59.165974 systemd[1]: session-6.scope: Deactivated successfully. Sep 6 00:23:59.161000 audit[1970]: CRED_DISP pid=1970 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 6 00:23:59.167285 systemd-logind[1733]: Removed session 6. Sep 6 00:23:59.170789 kernel: audit: type=1106 audit(1757118239.161:216): pid=1970 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 6 00:23:59.170897 kernel: audit: type=1104 audit(1757118239.161:217): pid=1970 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 6 00:23:59.170923 kernel: audit: type=1131 audit(1757118239.161:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.25.70:22-139.178.68.195:43176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:59.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.25.70:22-139.178.68.195:43176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:59.185656 systemd[1]: Started sshd@6-172.31.25.70:22-139.178.68.195:43190.service. Sep 6 00:23:59.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.25.70:22-139.178.68.195:43190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:59.344000 audit[2000]: USER_ACCT pid=2000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 6 00:23:59.346332 sshd[2000]: Accepted publickey for core from 139.178.68.195 port 43190 ssh2: RSA SHA256:XzAVKqTn5JA8LhAwCCkjW+qfEc9zGxl5jKXGmKv4mAc Sep 6 00:23:59.345000 audit[2000]: CRED_ACQ pid=2000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 6 00:23:59.346000 audit[2000]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5c2b49d0 a2=3 a3=0 items=0 ppid=1 pid=2000 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:59.346000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:23:59.347179 sshd[2000]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:23:59.351880 systemd[1]: Started session-7.scope. Sep 6 00:23:59.352193 systemd-logind[1733]: New session 7 of user core. Sep 6 00:23:59.356000 audit[2000]: USER_START pid=2000 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 6 00:23:59.358000 audit[2002]: CRED_ACQ pid=2002 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 6 00:23:59.455000 audit[2003]: USER_ACCT pid=2003 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:23:59.455943 sudo[2003]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 6 00:23:59.455000 audit[2003]: CRED_REFR pid=2003 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:23:59.456279 sudo[2003]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:23:59.457000 audit[2003]: USER_START pid=2003 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:23:59.471888 systemd[1]: Starting coreos-metadata.service... Sep 6 00:23:59.553565 coreos-metadata[2007]: Sep 06 00:23:59.553 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Sep 6 00:23:59.554601 coreos-metadata[2007]: Sep 06 00:23:59.554 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Sep 6 00:23:59.555429 coreos-metadata[2007]: Sep 06 00:23:59.555 INFO Fetch successful Sep 6 00:23:59.555501 coreos-metadata[2007]: Sep 06 00:23:59.555 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Sep 6 00:23:59.556368 coreos-metadata[2007]: Sep 06 00:23:59.556 INFO Fetch successful Sep 6 00:23:59.556435 coreos-metadata[2007]: Sep 06 00:23:59.556 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Sep 6 00:23:59.557364 coreos-metadata[2007]: Sep 06 00:23:59.557 INFO Fetch successful Sep 6 00:23:59.557419 coreos-metadata[2007]: Sep 06 00:23:59.557 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Sep 6 00:23:59.558093 coreos-metadata[2007]: Sep 06 00:23:59.558 INFO Fetch successful Sep 6 00:23:59.558093 coreos-metadata[2007]: Sep 06 00:23:59.558 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Sep 6 00:23:59.558996 coreos-metadata[2007]: Sep 06 00:23:59.558 INFO Fetch successful Sep 6 00:23:59.558996 coreos-metadata[2007]: Sep 06 00:23:59.558 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Sep 6 00:23:59.559893 coreos-metadata[2007]: Sep 06 00:23:59.559 INFO Fetch successful Sep 6 00:23:59.559943 coreos-metadata[2007]: Sep 06 00:23:59.559 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Sep 6 00:23:59.560849 coreos-metadata[2007]: Sep 06 00:23:59.560 INFO Fetch successful Sep 6 00:23:59.560907 coreos-metadata[2007]: Sep 06 00:23:59.560 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Sep 6 00:23:59.562942 coreos-metadata[2007]: Sep 06 00:23:59.562 INFO Fetch successful Sep 6 00:23:59.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:59.570797 systemd[1]: Finished coreos-metadata.service. Sep 6 00:24:00.711932 systemd[1]: Stopped kubelet.service. Sep 6 00:24:00.712191 systemd[1]: kubelet.service: Consumed 1.056s CPU time. Sep 6 00:24:00.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:24:00.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:24:00.715189 systemd[1]: Starting kubelet.service... Sep 6 00:24:00.746157 systemd[1]: Reloading. Sep 6 00:24:00.852734 /usr/lib/systemd/system-generators/torcx-generator[2061]: time="2025-09-06T00:24:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 00:24:00.852766 /usr/lib/systemd/system-generators/torcx-generator[2061]: time="2025-09-06T00:24:00Z" level=info msg="torcx already run" Sep 6 00:24:00.972173 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 00:24:00.972195 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 00:24:00.991788 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 00:24:01.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.068000 audit: BPF prog-id=46 op=LOAD Sep 6 00:24:01.068000 audit: BPF prog-id=44 op=UNLOAD Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit: BPF prog-id=47 op=LOAD Sep 6 00:24:01.070000 audit: BPF prog-id=27 op=UNLOAD Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit: BPF prog-id=48 op=LOAD Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.071000 audit: BPF prog-id=49 op=LOAD Sep 6 00:24:01.071000 audit: BPF prog-id=28 op=UNLOAD Sep 6 00:24:01.071000 audit: BPF prog-id=29 op=UNLOAD Sep 6 00:24:01.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.073000 audit: BPF prog-id=50 op=LOAD Sep 6 00:24:01.073000 audit: BPF prog-id=36 op=UNLOAD Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit: BPF prog-id=51 op=LOAD Sep 6 00:24:01.077000 audit: BPF prog-id=30 op=UNLOAD Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit: BPF prog-id=52 op=LOAD Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.077000 audit: BPF prog-id=53 op=LOAD Sep 6 00:24:01.077000 audit: BPF prog-id=31 op=UNLOAD Sep 6 00:24:01.077000 audit: BPF prog-id=32 op=UNLOAD Sep 6 00:24:01.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.078000 audit: BPF prog-id=54 op=LOAD Sep 6 00:24:01.078000 audit: BPF prog-id=37 op=UNLOAD Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit: BPF prog-id=55 op=LOAD Sep 6 00:24:01.079000 audit: BPF prog-id=41 op=UNLOAD Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit: BPF prog-id=56 op=LOAD Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.079000 audit: BPF prog-id=57 op=LOAD Sep 6 00:24:01.079000 audit: BPF prog-id=42 op=UNLOAD Sep 6 00:24:01.079000 audit: BPF prog-id=43 op=UNLOAD Sep 6 00:24:01.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit: BPF prog-id=58 op=LOAD Sep 6 00:24:01.082000 audit: BPF prog-id=33 op=UNLOAD Sep 6 00:24:01.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit: BPF prog-id=59 op=LOAD Sep 6 00:24:01.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.082000 audit: BPF prog-id=60 op=LOAD Sep 6 00:24:01.082000 audit: BPF prog-id=34 op=UNLOAD Sep 6 00:24:01.082000 audit: BPF prog-id=35 op=UNLOAD Sep 6 00:24:01.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit: BPF prog-id=61 op=LOAD Sep 6 00:24:01.084000 audit: BPF prog-id=38 op=UNLOAD Sep 6 00:24:01.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit: BPF prog-id=62 op=LOAD Sep 6 00:24:01.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:01.084000 audit: BPF prog-id=63 op=LOAD Sep 6 00:24:01.084000 audit: BPF prog-id=39 op=UNLOAD Sep 6 00:24:01.084000 audit: BPF prog-id=40 op=UNLOAD Sep 6 00:24:01.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:24:01.106991 systemd[1]: Started kubelet.service. Sep 6 00:24:01.111293 systemd[1]: Stopping kubelet.service... Sep 6 00:24:01.111717 systemd[1]: kubelet.service: Deactivated successfully. Sep 6 00:24:01.111943 systemd[1]: Stopped kubelet.service. Sep 6 00:24:01.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:24:01.114200 systemd[1]: Starting kubelet.service... Sep 6 00:24:01.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:24:01.492381 systemd[1]: Started kubelet.service. Sep 6 00:24:01.633014 kubelet[2124]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 00:24:01.633389 kubelet[2124]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 6 00:24:01.633389 kubelet[2124]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 00:24:01.634066 kubelet[2124]: I0906 00:24:01.633508 2124 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 6 00:24:01.801983 amazon-ssm-agent[1719]: 2025-09-06 00:24:01 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Sep 6 00:24:02.232008 kubelet[2124]: I0906 00:24:02.231869 2124 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Sep 6 00:24:02.232008 kubelet[2124]: I0906 00:24:02.231912 2124 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 6 00:24:02.233021 kubelet[2124]: I0906 00:24:02.232987 2124 server.go:954] "Client rotation is on, will bootstrap in background" Sep 6 00:24:02.392059 kubelet[2124]: I0906 00:24:02.392015 2124 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 6 00:24:02.450202 kubelet[2124]: E0906 00:24:02.450135 2124 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 6 00:24:02.450202 kubelet[2124]: I0906 00:24:02.450188 2124 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 6 00:24:02.457237 kubelet[2124]: I0906 00:24:02.457152 2124 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 6 00:24:02.460042 kubelet[2124]: I0906 00:24:02.459975 2124 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 6 00:24:02.460273 kubelet[2124]: I0906 00:24:02.460042 2124 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.31.25.70","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 6 00:24:02.460445 kubelet[2124]: I0906 00:24:02.460286 2124 topology_manager.go:138] "Creating topology manager with none policy" Sep 6 00:24:02.460445 kubelet[2124]: I0906 00:24:02.460302 2124 container_manager_linux.go:304] "Creating device plugin manager" Sep 6 00:24:02.460593 kubelet[2124]: I0906 00:24:02.460469 2124 state_mem.go:36] "Initialized new in-memory state store" Sep 6 00:24:02.472719 kubelet[2124]: I0906 00:24:02.472675 2124 kubelet.go:446] "Attempting to sync node with API server" Sep 6 00:24:02.501407 kubelet[2124]: I0906 00:24:02.500255 2124 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 6 00:24:02.501407 kubelet[2124]: I0906 00:24:02.500844 2124 kubelet.go:352] "Adding apiserver pod source" Sep 6 00:24:02.501407 kubelet[2124]: I0906 00:24:02.500871 2124 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 6 00:24:02.528028 kubelet[2124]: E0906 00:24:02.527979 2124 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:02.528196 kubelet[2124]: E0906 00:24:02.528050 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:02.538165 kubelet[2124]: I0906 00:24:02.538092 2124 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 6 00:24:02.541015 kubelet[2124]: I0906 00:24:02.540761 2124 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 6 00:24:02.544636 kubelet[2124]: W0906 00:24:02.544593 2124 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 6 00:24:02.563486 kubelet[2124]: I0906 00:24:02.563440 2124 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 6 00:24:02.563750 kubelet[2124]: I0906 00:24:02.563511 2124 server.go:1287] "Started kubelet" Sep 6 00:24:02.567617 kubelet[2124]: I0906 00:24:02.566770 2124 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Sep 6 00:24:02.568224 kubelet[2124]: I0906 00:24:02.568144 2124 server.go:479] "Adding debug handlers to kubelet server" Sep 6 00:24:02.570000 audit[2124]: AVC avc: denied { mac_admin } for pid=2124 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:02.570000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:24:02.570000 audit[2124]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a5d4a0 a1=c0005f3938 a2=c000a5d470 a3=25 items=0 ppid=1 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:02.570000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:24:02.571000 audit[2124]: AVC avc: denied { mac_admin } for pid=2124 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:02.571000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:24:02.571000 audit[2124]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a86b40 a1=c0005f3950 a2=c000a5d530 a3=25 items=0 ppid=1 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:02.571000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:24:02.572090 kubelet[2124]: I0906 00:24:02.571495 2124 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 6 00:24:02.572090 kubelet[2124]: I0906 00:24:02.571562 2124 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 6 00:24:02.572090 kubelet[2124]: I0906 00:24:02.571638 2124 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 6 00:24:02.572090 kubelet[2124]: I0906 00:24:02.571980 2124 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 6 00:24:02.572349 kubelet[2124]: I0906 00:24:02.572329 2124 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 6 00:24:02.573547 kubelet[2124]: I0906 00:24:02.572672 2124 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 6 00:24:02.574001 kubelet[2124]: I0906 00:24:02.573970 2124 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 6 00:24:02.574586 kubelet[2124]: E0906 00:24:02.574561 2124 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.25.70\" not found" Sep 6 00:24:02.575093 kubelet[2124]: I0906 00:24:02.575069 2124 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 6 00:24:02.575177 kubelet[2124]: I0906 00:24:02.575159 2124 reconciler.go:26] "Reconciler: start to sync state" Sep 6 00:24:02.602197 kubelet[2124]: I0906 00:24:02.602163 2124 factory.go:221] Registration of the systemd container factory successfully Sep 6 00:24:02.602571 kubelet[2124]: I0906 00:24:02.602544 2124 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 6 00:24:02.607387 kubelet[2124]: I0906 00:24:02.607363 2124 factory.go:221] Registration of the containerd container factory successfully Sep 6 00:24:02.622806 kubelet[2124]: I0906 00:24:02.622782 2124 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 6 00:24:02.622978 kubelet[2124]: I0906 00:24:02.622965 2124 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 6 00:24:02.623085 kubelet[2124]: I0906 00:24:02.623076 2124 state_mem.go:36] "Initialized new in-memory state store" Sep 6 00:24:02.628839 kubelet[2124]: I0906 00:24:02.628815 2124 policy_none.go:49] "None policy: Start" Sep 6 00:24:02.629067 kubelet[2124]: I0906 00:24:02.629055 2124 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 6 00:24:02.629166 kubelet[2124]: I0906 00:24:02.629158 2124 state_mem.go:35] "Initializing new in-memory state store" Sep 6 00:24:02.639458 systemd[1]: Created slice kubepods.slice. Sep 6 00:24:02.640000 audit[2138]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:02.640000 audit[2138]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe8a249370 a2=0 a3=7ffe8a24935c items=0 ppid=2124 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:02.640000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 00:24:02.642000 audit[2143]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:02.642000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffefbc762f0 a2=0 a3=7ffefbc762dc items=0 ppid=2124 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:02.642000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 00:24:02.647374 systemd[1]: Created slice kubepods-burstable.slice. Sep 6 00:24:02.651427 systemd[1]: Created slice kubepods-besteffort.slice. Sep 6 00:24:02.664308 kubelet[2124]: I0906 00:24:02.664263 2124 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 6 00:24:02.664710 kubelet[2124]: I0906 00:24:02.664341 2124 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Sep 6 00:24:02.664710 kubelet[2124]: I0906 00:24:02.664494 2124 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 6 00:24:02.664710 kubelet[2124]: I0906 00:24:02.664511 2124 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 6 00:24:02.663000 audit[2124]: AVC avc: denied { mac_admin } for pid=2124 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:02.663000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:24:02.663000 audit[2124]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cb5530 a1=c000cc9878 a2=c000cb5500 a3=25 items=0 ppid=1 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:02.663000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:24:02.666989 kubelet[2124]: I0906 00:24:02.666967 2124 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 6 00:24:02.668971 kubelet[2124]: E0906 00:24:02.668724 2124 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 6 00:24:02.668971 kubelet[2124]: E0906 00:24:02.668778 2124 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.25.70\" not found" Sep 6 00:24:02.647000 audit[2146]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:02.647000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdb2302ed0 a2=0 a3=7ffdb2302ebc items=0 ppid=2124 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:02.647000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:24:02.676000 audit[2151]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:02.676000 audit[2151]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe1374b440 a2=0 a3=7ffe1374b42c items=0 ppid=2124 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:02.676000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:24:02.742000 audit[2156]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2156 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:02.742000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc881af100 a2=0 a3=7ffc881af0ec items=0 ppid=2124 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:02.742000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 6 00:24:02.743609 kubelet[2124]: I0906 00:24:02.743566 2124 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 6 00:24:02.744000 audit[2157]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:02.744000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdc97544f0 a2=0 a3=7ffdc97544dc items=0 ppid=2124 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:02.744000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 00:24:02.745488 kubelet[2124]: I0906 00:24:02.745457 2124 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 6 00:24:02.745613 kubelet[2124]: I0906 00:24:02.745495 2124 status_manager.go:227] "Starting to sync pod status with apiserver" Sep 6 00:24:02.745613 kubelet[2124]: I0906 00:24:02.745546 2124 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 6 00:24:02.745613 kubelet[2124]: I0906 00:24:02.745556 2124 kubelet.go:2382] "Starting kubelet main sync loop" Sep 6 00:24:02.745737 kubelet[2124]: E0906 00:24:02.745693 2124 kubelet.go:2406] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Sep 6 00:24:02.746000 audit[2158]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:02.746000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff78cac7a0 a2=0 a3=7fff78cac78c items=0 ppid=2124 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:02.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 00:24:02.747000 audit[2160]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:02.747000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd9c1709d0 a2=0 a3=7ffd9c1709bc items=0 ppid=2124 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:02.747000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 00:24:02.748000 audit[2159]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=2159 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:02.748000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffecbbf27b0 a2=0 a3=10e3 items=0 ppid=2124 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:02.748000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 00:24:02.749000 audit[2161]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:02.749000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2a601220 a2=0 a3=7ffc2a60120c items=0 ppid=2124 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:02.749000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 00:24:02.750000 audit[2162]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:02.750000 audit[2162]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff59341570 a2=0 a3=7fff5934155c items=0 ppid=2124 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:02.750000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 00:24:02.751000 audit[2163]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:02.751000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe8a9a8ce0 a2=0 a3=7ffe8a9a8ccc items=0 ppid=2124 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:02.751000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 00:24:02.769247 kubelet[2124]: I0906 00:24:02.769205 2124 kubelet_node_status.go:75] "Attempting to register node" node="172.31.25.70" Sep 6 00:24:02.787596 kubelet[2124]: W0906 00:24:02.787565 2124 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "172.31.25.70" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Sep 6 00:24:02.787891 kubelet[2124]: E0906 00:24:02.787851 2124 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"172.31.25.70\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Sep 6 00:24:02.787891 kubelet[2124]: E0906 00:24:02.787597 2124 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.25.70\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Sep 6 00:24:02.788041 kubelet[2124]: W0906 00:24:02.788024 2124 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Sep 6 00:24:02.788119 kubelet[2124]: E0906 00:24:02.788054 2124 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Sep 6 00:24:02.788260 kubelet[2124]: W0906 00:24:02.788233 2124 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Sep 6 00:24:02.788422 kubelet[2124]: E0906 00:24:02.788359 2124 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Sep 6 00:24:02.790465 kubelet[2124]: E0906 00:24:02.788233 2124 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.25.70.186289bb645ab9b5 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.25.70,UID:172.31.25.70,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.31.25.70,},FirstTimestamp:2025-09-06 00:24:02.563471797 +0000 UTC m=+1.053857686,LastTimestamp:2025-09-06 00:24:02.563471797 +0000 UTC m=+1.053857686,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.25.70,}" Sep 6 00:24:02.928662 kubelet[2124]: W0906 00:24:02.928593 2124 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Sep 6 00:24:02.928951 kubelet[2124]: E0906 00:24:02.928922 2124 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"runtimeclasses\" in API group \"node.k8s.io\" at the cluster scope" logger="UnhandledError" Sep 6 00:24:02.929044 kubelet[2124]: E0906 00:24:02.928592 2124 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.25.70.186289bb67d57ae1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.25.70,UID:172.31.25.70,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 172.31.25.70 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:172.31.25.70,},FirstTimestamp:2025-09-06 00:24:02.621848289 +0000 UTC m=+1.112234180,LastTimestamp:2025-09-06 00:24:02.621848289 +0000 UTC m=+1.112234180,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.25.70,}" Sep 6 00:24:02.943785 kubelet[2124]: E0906 00:24:02.943750 2124 kubelet_node_status.go:113] "Unable to register node with API server, error getting existing node" err="nodes \"172.31.25.70\" is forbidden: User \"system:anonymous\" cannot get resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.25.70" Sep 6 00:24:02.944064 kubelet[2124]: E0906 00:24:02.943971 2124 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.25.70.186289bb67d59782 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.25.70,UID:172.31.25.70,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 172.31.25.70 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:172.31.25.70,},FirstTimestamp:2025-09-06 00:24:02.621855618 +0000 UTC m=+1.112241503,LastTimestamp:2025-09-06 00:24:02.621855618 +0000 UTC m=+1.112241503,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.25.70,}" Sep 6 00:24:02.951084 kubelet[2124]: E0906 00:24:02.950957 2124 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.25.70.186289bb67d5a92d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.25.70,UID:172.31.25.70,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 172.31.25.70 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:172.31.25.70,},FirstTimestamp:2025-09-06 00:24:02.621860141 +0000 UTC m=+1.112246027,LastTimestamp:2025-09-06 00:24:02.621860141 +0000 UTC m=+1.112246027,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.25.70,}" Sep 6 00:24:02.955940 kubelet[2124]: E0906 00:24:02.955832 2124 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.25.70.186289bb6a90e274 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.25.70,UID:172.31.25.70,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeAllocatableEnforced,Message:Updated Node Allocatable limit across pods,Source:EventSource{Component:kubelet,Host:172.31.25.70,},FirstTimestamp:2025-09-06 00:24:02.667684468 +0000 UTC m=+1.158070350,LastTimestamp:2025-09-06 00:24:02.667684468 +0000 UTC m=+1.158070350,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.25.70,}" Sep 6 00:24:02.961553 kubelet[2124]: E0906 00:24:02.961391 2124 event.go:359] "Server rejected event (will not retry!)" err="events \"172.31.25.70.186289bb67d57ae1\" is forbidden: User \"system:anonymous\" cannot patch resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.25.70.186289bb67d57ae1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.25.70,UID:172.31.25.70,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 172.31.25.70 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:172.31.25.70,},FirstTimestamp:2025-09-06 00:24:02.621848289 +0000 UTC m=+1.112234180,LastTimestamp:2025-09-06 00:24:02.76913931 +0000 UTC m=+1.259525198,Count:2,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.25.70,}" Sep 6 00:24:02.965984 kubelet[2124]: E0906 00:24:02.965863 2124 event.go:359] "Server rejected event (will not retry!)" err="events \"172.31.25.70.186289bb67d59782\" is forbidden: User \"system:anonymous\" cannot patch resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.25.70.186289bb67d59782 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.25.70,UID:172.31.25.70,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 172.31.25.70 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:172.31.25.70,},FirstTimestamp:2025-09-06 00:24:02.621855618 +0000 UTC m=+1.112241503,LastTimestamp:2025-09-06 00:24:02.76914852 +0000 UTC m=+1.259534402,Count:2,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.25.70,}" Sep 6 00:24:02.973083 kubelet[2124]: E0906 00:24:02.972976 2124 event.go:359] "Server rejected event (will not retry!)" err="events \"172.31.25.70.186289bb67d5a92d\" is forbidden: User \"system:anonymous\" cannot patch resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.25.70.186289bb67d5a92d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.25.70,UID:172.31.25.70,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 172.31.25.70 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:172.31.25.70,},FirstTimestamp:2025-09-06 00:24:02.621860141 +0000 UTC m=+1.112246027,LastTimestamp:2025-09-06 00:24:02.769153534 +0000 UTC m=+1.259539419,Count:2,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.25.70,}" Sep 6 00:24:03.010777 kubelet[2124]: E0906 00:24:03.010639 2124 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.25.70\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Sep 6 00:24:03.145779 kubelet[2124]: I0906 00:24:03.145725 2124 kubelet_node_status.go:75] "Attempting to register node" node="172.31.25.70" Sep 6 00:24:03.271223 kubelet[2124]: E0906 00:24:03.270838 2124 event.go:359] "Server rejected event (will not retry!)" err="events \"172.31.25.70.186289bb67d57ae1\" is forbidden: User \"system:anonymous\" cannot patch resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.25.70.186289bb67d57ae1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.25.70,UID:172.31.25.70,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 172.31.25.70 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:172.31.25.70,},FirstTimestamp:2025-09-06 00:24:02.621848289 +0000 UTC m=+1.112234180,LastTimestamp:2025-09-06 00:24:03.14562962 +0000 UTC m=+1.636015504,Count:3,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.25.70,}" Sep 6 00:24:03.290427 kubelet[2124]: E0906 00:24:03.290389 2124 kubelet_node_status.go:113] "Unable to register node with API server, error getting existing node" err="nodes \"172.31.25.70\" is forbidden: User \"system:anonymous\" cannot get resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.25.70" Sep 6 00:24:03.290670 kubelet[2124]: E0906 00:24:03.290374 2124 event.go:359] "Server rejected event (will not retry!)" err="events \"172.31.25.70.186289bb67d59782\" is forbidden: User \"system:anonymous\" cannot patch resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.25.70.186289bb67d59782 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.25.70,UID:172.31.25.70,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 172.31.25.70 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:172.31.25.70,},FirstTimestamp:2025-09-06 00:24:02.621855618 +0000 UTC m=+1.112241503,LastTimestamp:2025-09-06 00:24:03.145694717 +0000 UTC m=+1.636080601,Count:3,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.25.70,}" Sep 6 00:24:03.300879 kubelet[2124]: E0906 00:24:03.300770 2124 event.go:359] "Server rejected event (will not retry!)" err="events \"172.31.25.70.186289bb67d5a92d\" is forbidden: User \"system:anonymous\" cannot patch resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.25.70.186289bb67d5a92d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.25.70,UID:172.31.25.70,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 172.31.25.70 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:172.31.25.70,},FirstTimestamp:2025-09-06 00:24:02.621860141 +0000 UTC m=+1.112246027,LastTimestamp:2025-09-06 00:24:03.145698132 +0000 UTC m=+1.636084016,Count:3,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.25.70,}" Sep 6 00:24:03.426585 kubelet[2124]: E0906 00:24:03.426543 2124 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.31.25.70\" not found" node="172.31.25.70" Sep 6 00:24:03.529255 kubelet[2124]: E0906 00:24:03.529142 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:03.691918 kubelet[2124]: I0906 00:24:03.691881 2124 kubelet_node_status.go:75] "Attempting to register node" node="172.31.25.70" Sep 6 00:24:03.732809 kubelet[2124]: I0906 00:24:03.732751 2124 kubelet_node_status.go:78] "Successfully registered node" node="172.31.25.70" Sep 6 00:24:03.732809 kubelet[2124]: E0906 00:24:03.732799 2124 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"172.31.25.70\": node \"172.31.25.70\" not found" Sep 6 00:24:03.775286 kubelet[2124]: E0906 00:24:03.775242 2124 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.25.70\" not found" Sep 6 00:24:03.875947 kubelet[2124]: E0906 00:24:03.875821 2124 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.25.70\" not found" Sep 6 00:24:03.976534 kubelet[2124]: I0906 00:24:03.976484 2124 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 6 00:24:03.976879 env[1743]: time="2025-09-06T00:24:03.976836027Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 6 00:24:03.977190 kubelet[2124]: I0906 00:24:03.976988 2124 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 6 00:24:04.094846 sudo[2003]: pam_unix(sudo:session): session closed for user root Sep 6 00:24:04.094000 audit[2003]: USER_END pid=2003 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:24:04.094000 audit[2003]: CRED_DISP pid=2003 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:24:04.117555 sshd[2000]: pam_unix(sshd:session): session closed for user core Sep 6 00:24:04.118000 audit[2000]: USER_END pid=2000 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 6 00:24:04.121363 kernel: kauditd_printk_skb: 273 callbacks suppressed Sep 6 00:24:04.121444 kernel: audit: type=1106 audit(1757118244.118:457): pid=2000 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 6 00:24:04.122744 systemd[1]: sshd@6-172.31.25.70:22-139.178.68.195:43190.service: Deactivated successfully. Sep 6 00:24:04.123748 systemd[1]: session-7.scope: Deactivated successfully. Sep 6 00:24:04.126124 systemd-logind[1733]: Session 7 logged out. Waiting for processes to exit. Sep 6 00:24:04.127737 systemd-logind[1733]: Removed session 7. Sep 6 00:24:04.118000 audit[2000]: CRED_DISP pid=2000 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 6 00:24:04.137712 kernel: audit: type=1104 audit(1757118244.118:458): pid=2000 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 6 00:24:04.137825 kernel: audit: type=1131 audit(1757118244.120:459): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.25.70:22-139.178.68.195:43190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:24:04.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.25.70:22-139.178.68.195:43190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:24:04.249138 kubelet[2124]: I0906 00:24:04.249097 2124 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 6 00:24:04.249462 kubelet[2124]: W0906 00:24:04.249435 2124 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 6 00:24:04.249602 kubelet[2124]: W0906 00:24:04.249483 2124 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 6 00:24:04.249602 kubelet[2124]: W0906 00:24:04.249503 2124 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 6 00:24:04.530219 kubelet[2124]: I0906 00:24:04.530104 2124 apiserver.go:52] "Watching apiserver" Sep 6 00:24:04.530551 kubelet[2124]: E0906 00:24:04.530099 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:04.533825 kubelet[2124]: E0906 00:24:04.533799 2124 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-54z95" podUID="1e4a1408-0f6c-45df-8a6c-c73b95d01904" Sep 6 00:24:04.538869 systemd[1]: Created slice kubepods-besteffort-pod04b770ce_3ee5_4631_b7da_bf234f121419.slice. Sep 6 00:24:04.549213 systemd[1]: Created slice kubepods-besteffort-pod1c59e7fd_d9fb_4f93_ab93_8f4cf6aa0937.slice. Sep 6 00:24:04.575600 kubelet[2124]: I0906 00:24:04.575565 2124 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 6 00:24:04.586994 kubelet[2124]: I0906 00:24:04.586964 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/04b770ce-3ee5-4631-b7da-bf234f121419-cni-bin-dir\") pod \"calico-node-dxnrb\" (UID: \"04b770ce-3ee5-4631-b7da-bf234f121419\") " pod="calico-system/calico-node-dxnrb" Sep 6 00:24:04.586994 kubelet[2124]: I0906 00:24:04.586994 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/04b770ce-3ee5-4631-b7da-bf234f121419-flexvol-driver-host\") pod \"calico-node-dxnrb\" (UID: \"04b770ce-3ee5-4631-b7da-bf234f121419\") " pod="calico-system/calico-node-dxnrb" Sep 6 00:24:04.587169 kubelet[2124]: I0906 00:24:04.587014 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/1e4a1408-0f6c-45df-8a6c-c73b95d01904-socket-dir\") pod \"csi-node-driver-54z95\" (UID: \"1e4a1408-0f6c-45df-8a6c-c73b95d01904\") " pod="calico-system/csi-node-driver-54z95" Sep 6 00:24:04.587169 kubelet[2124]: I0906 00:24:04.587029 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nfjfz\" (UniqueName: \"kubernetes.io/projected/1e4a1408-0f6c-45df-8a6c-c73b95d01904-kube-api-access-nfjfz\") pod \"csi-node-driver-54z95\" (UID: \"1e4a1408-0f6c-45df-8a6c-c73b95d01904\") " pod="calico-system/csi-node-driver-54z95" Sep 6 00:24:04.587169 kubelet[2124]: I0906 00:24:04.587046 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/04b770ce-3ee5-4631-b7da-bf234f121419-lib-modules\") pod \"calico-node-dxnrb\" (UID: \"04b770ce-3ee5-4631-b7da-bf234f121419\") " pod="calico-system/calico-node-dxnrb" Sep 6 00:24:04.587169 kubelet[2124]: I0906 00:24:04.587061 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/04b770ce-3ee5-4631-b7da-bf234f121419-var-lib-calico\") pod \"calico-node-dxnrb\" (UID: \"04b770ce-3ee5-4631-b7da-bf234f121419\") " pod="calico-system/calico-node-dxnrb" Sep 6 00:24:04.587169 kubelet[2124]: I0906 00:24:04.587077 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/1e4a1408-0f6c-45df-8a6c-c73b95d01904-kubelet-dir\") pod \"csi-node-driver-54z95\" (UID: \"1e4a1408-0f6c-45df-8a6c-c73b95d01904\") " pod="calico-system/csi-node-driver-54z95" Sep 6 00:24:04.587306 kubelet[2124]: I0906 00:24:04.587092 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1c59e7fd-d9fb-4f93-ab93-8f4cf6aa0937-xtables-lock\") pod \"kube-proxy-g8kqs\" (UID: \"1c59e7fd-d9fb-4f93-ab93-8f4cf6aa0937\") " pod="kube-system/kube-proxy-g8kqs" Sep 6 00:24:04.587306 kubelet[2124]: I0906 00:24:04.587111 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1c59e7fd-d9fb-4f93-ab93-8f4cf6aa0937-lib-modules\") pod \"kube-proxy-g8kqs\" (UID: \"1c59e7fd-d9fb-4f93-ab93-8f4cf6aa0937\") " pod="kube-system/kube-proxy-g8kqs" Sep 6 00:24:04.587306 kubelet[2124]: I0906 00:24:04.587135 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-994fz\" (UniqueName: \"kubernetes.io/projected/1c59e7fd-d9fb-4f93-ab93-8f4cf6aa0937-kube-api-access-994fz\") pod \"kube-proxy-g8kqs\" (UID: \"1c59e7fd-d9fb-4f93-ab93-8f4cf6aa0937\") " pod="kube-system/kube-proxy-g8kqs" Sep 6 00:24:04.587306 kubelet[2124]: I0906 00:24:04.587151 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/04b770ce-3ee5-4631-b7da-bf234f121419-cni-net-dir\") pod \"calico-node-dxnrb\" (UID: \"04b770ce-3ee5-4631-b7da-bf234f121419\") " pod="calico-system/calico-node-dxnrb" Sep 6 00:24:04.587306 kubelet[2124]: I0906 00:24:04.587166 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/04b770ce-3ee5-4631-b7da-bf234f121419-node-certs\") pod \"calico-node-dxnrb\" (UID: \"04b770ce-3ee5-4631-b7da-bf234f121419\") " pod="calico-system/calico-node-dxnrb" Sep 6 00:24:04.587442 kubelet[2124]: I0906 00:24:04.587186 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/04b770ce-3ee5-4631-b7da-bf234f121419-xtables-lock\") pod \"calico-node-dxnrb\" (UID: \"04b770ce-3ee5-4631-b7da-bf234f121419\") " pod="calico-system/calico-node-dxnrb" Sep 6 00:24:04.587442 kubelet[2124]: I0906 00:24:04.587206 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rpddp\" (UniqueName: \"kubernetes.io/projected/04b770ce-3ee5-4631-b7da-bf234f121419-kube-api-access-rpddp\") pod \"calico-node-dxnrb\" (UID: \"04b770ce-3ee5-4631-b7da-bf234f121419\") " pod="calico-system/calico-node-dxnrb" Sep 6 00:24:04.587442 kubelet[2124]: I0906 00:24:04.587221 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/1e4a1408-0f6c-45df-8a6c-c73b95d01904-varrun\") pod \"csi-node-driver-54z95\" (UID: \"1e4a1408-0f6c-45df-8a6c-c73b95d01904\") " pod="calico-system/csi-node-driver-54z95" Sep 6 00:24:04.587442 kubelet[2124]: I0906 00:24:04.587235 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/1c59e7fd-d9fb-4f93-ab93-8f4cf6aa0937-kube-proxy\") pod \"kube-proxy-g8kqs\" (UID: \"1c59e7fd-d9fb-4f93-ab93-8f4cf6aa0937\") " pod="kube-system/kube-proxy-g8kqs" Sep 6 00:24:04.587442 kubelet[2124]: I0906 00:24:04.587250 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/04b770ce-3ee5-4631-b7da-bf234f121419-cni-log-dir\") pod \"calico-node-dxnrb\" (UID: \"04b770ce-3ee5-4631-b7da-bf234f121419\") " pod="calico-system/calico-node-dxnrb" Sep 6 00:24:04.587641 kubelet[2124]: I0906 00:24:04.587271 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/04b770ce-3ee5-4631-b7da-bf234f121419-policysync\") pod \"calico-node-dxnrb\" (UID: \"04b770ce-3ee5-4631-b7da-bf234f121419\") " pod="calico-system/calico-node-dxnrb" Sep 6 00:24:04.587641 kubelet[2124]: I0906 00:24:04.587288 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/04b770ce-3ee5-4631-b7da-bf234f121419-tigera-ca-bundle\") pod \"calico-node-dxnrb\" (UID: \"04b770ce-3ee5-4631-b7da-bf234f121419\") " pod="calico-system/calico-node-dxnrb" Sep 6 00:24:04.587641 kubelet[2124]: I0906 00:24:04.587304 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/04b770ce-3ee5-4631-b7da-bf234f121419-var-run-calico\") pod \"calico-node-dxnrb\" (UID: \"04b770ce-3ee5-4631-b7da-bf234f121419\") " pod="calico-system/calico-node-dxnrb" Sep 6 00:24:04.587641 kubelet[2124]: I0906 00:24:04.587319 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/1e4a1408-0f6c-45df-8a6c-c73b95d01904-registration-dir\") pod \"csi-node-driver-54z95\" (UID: \"1e4a1408-0f6c-45df-8a6c-c73b95d01904\") " pod="calico-system/csi-node-driver-54z95" Sep 6 00:24:04.689195 kubelet[2124]: I0906 00:24:04.689165 2124 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 6 00:24:04.691848 kubelet[2124]: E0906 00:24:04.691208 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:04.696947 kubelet[2124]: W0906 00:24:04.696918 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:04.697282 kubelet[2124]: E0906 00:24:04.697268 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:04.698874 kubelet[2124]: E0906 00:24:04.698859 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:04.698986 kubelet[2124]: W0906 00:24:04.698975 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:04.699057 kubelet[2124]: E0906 00:24:04.699047 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:04.740610 kubelet[2124]: E0906 00:24:04.739406 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:04.740610 kubelet[2124]: W0906 00:24:04.739434 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:04.740610 kubelet[2124]: E0906 00:24:04.739461 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:04.761966 kubelet[2124]: E0906 00:24:04.761941 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:04.762175 kubelet[2124]: W0906 00:24:04.762156 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:04.762292 kubelet[2124]: E0906 00:24:04.762278 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:04.771376 kubelet[2124]: E0906 00:24:04.771349 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:04.771376 kubelet[2124]: W0906 00:24:04.771368 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:04.771572 kubelet[2124]: E0906 00:24:04.771392 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:04.849570 env[1743]: time="2025-09-06T00:24:04.848837092Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dxnrb,Uid:04b770ce-3ee5-4631-b7da-bf234f121419,Namespace:calico-system,Attempt:0,}" Sep 6 00:24:04.852880 env[1743]: time="2025-09-06T00:24:04.852657913Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-g8kqs,Uid:1c59e7fd-d9fb-4f93-ab93-8f4cf6aa0937,Namespace:kube-system,Attempt:0,}" Sep 6 00:24:05.531468 kubelet[2124]: E0906 00:24:05.531381 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:05.547851 env[1743]: time="2025-09-06T00:24:05.547729840Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:05.553836 env[1743]: time="2025-09-06T00:24:05.553774572Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:05.556246 env[1743]: time="2025-09-06T00:24:05.556199773Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:05.563008 env[1743]: time="2025-09-06T00:24:05.562965730Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:05.567742 env[1743]: time="2025-09-06T00:24:05.567697687Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:05.569250 env[1743]: time="2025-09-06T00:24:05.569219881Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:05.571527 env[1743]: time="2025-09-06T00:24:05.571482265Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:05.575720 env[1743]: time="2025-09-06T00:24:05.575686794Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:05.612356 env[1743]: time="2025-09-06T00:24:05.605192648Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:24:05.612356 env[1743]: time="2025-09-06T00:24:05.605240368Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:24:05.612356 env[1743]: time="2025-09-06T00:24:05.605253211Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:24:05.612356 env[1743]: time="2025-09-06T00:24:05.605617061Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/571a05d34b2f8aa6b621d617f677731593ec2390e6aaff7504c2047b06eb9c6d pid=2182 runtime=io.containerd.runc.v2 Sep 6 00:24:05.615488 env[1743]: time="2025-09-06T00:24:05.615284194Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:24:05.615488 env[1743]: time="2025-09-06T00:24:05.615332774Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:24:05.615488 env[1743]: time="2025-09-06T00:24:05.615350460Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:24:05.615746 env[1743]: time="2025-09-06T00:24:05.615557599Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2e283deb84dde7d30daab7b93b77b7a7ab3baa26a7deb679b1c2ce0b7cc2430c pid=2200 runtime=io.containerd.runc.v2 Sep 6 00:24:05.633325 systemd[1]: Started cri-containerd-571a05d34b2f8aa6b621d617f677731593ec2390e6aaff7504c2047b06eb9c6d.scope. Sep 6 00:24:05.646703 systemd[1]: Started cri-containerd-2e283deb84dde7d30daab7b93b77b7a7ab3baa26a7deb679b1c2ce0b7cc2430c.scope. Sep 6 00:24:05.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.669616 kernel: audit: type=1400 audit(1757118245.661:460): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.669723 kernel: audit: type=1400 audit(1757118245.661:461): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.684599 kernel: audit: type=1400 audit(1757118245.661:462): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.708611 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 6 00:24:05.708733 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Sep 6 00:24:05.708774 kernel: audit: backlog limit exceeded Sep 6 00:24:05.708814 kernel: audit: type=1400 audit(1757118245.661:463): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.708418 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4171616645.mount: Deactivated successfully. Sep 6 00:24:05.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.668000 audit: BPF prog-id=64 op=LOAD Sep 6 00:24:05.669000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.669000 audit[2210]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2182 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:05.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316130356433346232663861613662363231643631376636373737 Sep 6 00:24:05.669000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.669000 audit[2210]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2182 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:05.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316130356433346232663861613662363231643631376636373737 Sep 6 00:24:05.669000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.669000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.669000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.669000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.669000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.669000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.669000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.669000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.669000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.669000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.669000 audit: BPF prog-id=65 op=LOAD Sep 6 00:24:05.669000 audit[2210]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000392f30 items=0 ppid=2182 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:05.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316130356433346232663861613662363231643631376636373737 Sep 6 00:24:05.676000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.676000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.676000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.676000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.676000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.676000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.676000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.676000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.676000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.676000 audit: BPF prog-id=66 op=LOAD Sep 6 00:24:05.676000 audit[2210]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000392f78 items=0 ppid=2182 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:05.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316130356433346232663861613662363231643631376636373737 Sep 6 00:24:05.676000 audit: BPF prog-id=66 op=UNLOAD Sep 6 00:24:05.676000 audit: BPF prog-id=65 op=UNLOAD Sep 6 00:24:05.676000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.676000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.676000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.676000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.676000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.676000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.676000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.676000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.676000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.676000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.676000 audit: BPF prog-id=67 op=LOAD Sep 6 00:24:05.676000 audit[2210]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000393388 items=0 ppid=2182 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:05.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316130356433346232663861613662363231643631376636373737 Sep 6 00:24:05.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:05.728348 env[1743]: time="2025-09-06T00:24:05.728299291Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-g8kqs,Uid:1c59e7fd-d9fb-4f93-ab93-8f4cf6aa0937,Namespace:kube-system,Attempt:0,} returns sandbox id \"571a05d34b2f8aa6b621d617f677731593ec2390e6aaff7504c2047b06eb9c6d\"" Sep 6 00:24:05.731301 env[1743]: time="2025-09-06T00:24:05.731249401Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.8\"" Sep 6 00:24:05.737104 env[1743]: time="2025-09-06T00:24:05.737051871Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dxnrb,Uid:04b770ce-3ee5-4631-b7da-bf234f121419,Namespace:calico-system,Attempt:0,} returns sandbox id \"2e283deb84dde7d30daab7b93b77b7a7ab3baa26a7deb679b1c2ce0b7cc2430c\"" Sep 6 00:24:05.746655 kubelet[2124]: E0906 00:24:05.746364 2124 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-54z95" podUID="1e4a1408-0f6c-45df-8a6c-c73b95d01904" Sep 6 00:24:06.531737 kubelet[2124]: E0906 00:24:06.531667 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:07.175000 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1912150211.mount: Deactivated successfully. Sep 6 00:24:07.532017 kubelet[2124]: E0906 00:24:07.531898 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:07.746583 kubelet[2124]: E0906 00:24:07.746511 2124 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-54z95" podUID="1e4a1408-0f6c-45df-8a6c-c73b95d01904" Sep 6 00:24:07.851625 env[1743]: time="2025-09-06T00:24:07.851360141Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:07.853804 env[1743]: time="2025-09-06T00:24:07.853761094Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d7b94972d43c5d6ce8088a8bcd08614a5ecf2bf04166232c688adcd0b8ed4b12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:07.856008 env[1743]: time="2025-09-06T00:24:07.855969702Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:07.857469 env[1743]: time="2025-09-06T00:24:07.857435607Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:adc1335b480ddd833aac3b0bd20f68ff0f3c3cf7a0bd337933b006d9f5cec40a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:07.858054 env[1743]: time="2025-09-06T00:24:07.857894404Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.8\" returns image reference \"sha256:d7b94972d43c5d6ce8088a8bcd08614a5ecf2bf04166232c688adcd0b8ed4b12\"" Sep 6 00:24:07.860563 env[1743]: time="2025-09-06T00:24:07.860036633Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 6 00:24:07.861811 env[1743]: time="2025-09-06T00:24:07.861204662Z" level=info msg="CreateContainer within sandbox \"571a05d34b2f8aa6b621d617f677731593ec2390e6aaff7504c2047b06eb9c6d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 6 00:24:07.888392 env[1743]: time="2025-09-06T00:24:07.888321845Z" level=info msg="CreateContainer within sandbox \"571a05d34b2f8aa6b621d617f677731593ec2390e6aaff7504c2047b06eb9c6d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"244b1ffe1c0c350d717f9d03115d18b28654dfc8524c10180cd3c06073e39fb1\"" Sep 6 00:24:07.889333 env[1743]: time="2025-09-06T00:24:07.889264742Z" level=info msg="StartContainer for \"244b1ffe1c0c350d717f9d03115d18b28654dfc8524c10180cd3c06073e39fb1\"" Sep 6 00:24:07.920525 systemd[1]: run-containerd-runc-k8s.io-244b1ffe1c0c350d717f9d03115d18b28654dfc8524c10180cd3c06073e39fb1-runc.UzzADq.mount: Deactivated successfully. Sep 6 00:24:07.923824 systemd[1]: Started cri-containerd-244b1ffe1c0c350d717f9d03115d18b28654dfc8524c10180cd3c06073e39fb1.scope. Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f3e84548568 items=0 ppid=2182 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:07.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234346231666665316330633335306437313766396430333131356431 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit: BPF prog-id=72 op=LOAD Sep 6 00:24:07.941000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0002914e8 items=0 ppid=2182 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:07.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234346231666665316330633335306437313766396430333131356431 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit: BPF prog-id=73 op=LOAD Sep 6 00:24:07.941000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000291538 items=0 ppid=2182 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:07.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234346231666665316330633335306437313766396430333131356431 Sep 6 00:24:07.941000 audit: BPF prog-id=73 op=UNLOAD Sep 6 00:24:07.941000 audit: BPF prog-id=72 op=UNLOAD Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:07.941000 audit: BPF prog-id=74 op=LOAD Sep 6 00:24:07.941000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0002915c8 items=0 ppid=2182 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:07.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234346231666665316330633335306437313766396430333131356431 Sep 6 00:24:07.965527 env[1743]: time="2025-09-06T00:24:07.961791880Z" level=info msg="StartContainer for \"244b1ffe1c0c350d717f9d03115d18b28654dfc8524c10180cd3c06073e39fb1\" returns successfully" Sep 6 00:24:08.080000 audit[2324]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.080000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9747d3c0 a2=0 a3=7ffe9747d3ac items=0 ppid=2274 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.080000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 00:24:08.081000 audit[2325]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.081000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe288e41f0 a2=0 a3=7ffe288e41dc items=0 ppid=2274 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.081000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 00:24:08.082000 audit[2326]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.082000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5b201730 a2=0 a3=7fff5b20171c items=0 ppid=2274 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 00:24:08.083000 audit[2327]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.083000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdac0b5b70 a2=0 a3=7ffdac0b5b5c items=0 ppid=2274 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.083000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 00:24:08.083000 audit[2328]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.083000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4631df40 a2=0 a3=7fff4631df2c items=0 ppid=2274 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.083000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 00:24:08.085000 audit[2329]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.085000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9fe2bf00 a2=0 a3=7ffe9fe2beec items=0 ppid=2274 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.085000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 00:24:08.186000 audit[2330]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.186000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe4296a1c0 a2=0 a3=7ffe4296a1ac items=0 ppid=2274 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.186000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 00:24:08.191000 audit[2332]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.191000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffef7a75680 a2=0 a3=7ffef7a7566c items=0 ppid=2274 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.191000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 6 00:24:08.195000 audit[2335]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.195000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc60181a00 a2=0 a3=7ffc601819ec items=0 ppid=2274 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.195000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 6 00:24:08.197000 audit[2336]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.197000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc9e38370 a2=0 a3=7ffdc9e3835c items=0 ppid=2274 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.197000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 00:24:08.199000 audit[2338]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.199000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe17560750 a2=0 a3=7ffe1756073c items=0 ppid=2274 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.199000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 00:24:08.201000 audit[2339]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.201000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2ad23fe0 a2=0 a3=7ffd2ad23fcc items=0 ppid=2274 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.201000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 00:24:08.204000 audit[2341]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.204000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff10708e20 a2=0 a3=7fff10708e0c items=0 ppid=2274 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.204000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 00:24:08.208000 audit[2344]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.208000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc590c0b20 a2=0 a3=7ffc590c0b0c items=0 ppid=2274 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.208000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 6 00:24:08.210000 audit[2345]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.210000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea6fd9f70 a2=0 a3=7ffea6fd9f5c items=0 ppid=2274 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 00:24:08.213000 audit[2347]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.213000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff1e9ff850 a2=0 a3=7fff1e9ff83c items=0 ppid=2274 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.213000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 00:24:08.215000 audit[2348]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.215000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff28d567f0 a2=0 a3=7fff28d567dc items=0 ppid=2274 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 00:24:08.219000 audit[2350]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.219000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd5518b80 a2=0 a3=7ffdd5518b6c items=0 ppid=2274 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.219000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 00:24:08.223000 audit[2353]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.223000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc72fc0eb0 a2=0 a3=7ffc72fc0e9c items=0 ppid=2274 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.223000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 00:24:08.227000 audit[2356]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.227000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd30be4500 a2=0 a3=7ffd30be44ec items=0 ppid=2274 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.227000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 00:24:08.229000 audit[2357]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.229000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdd62ea9d0 a2=0 a3=7ffdd62ea9bc items=0 ppid=2274 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 00:24:08.232000 audit[2359]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.232000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff3d8cf2d0 a2=0 a3=7fff3d8cf2bc items=0 ppid=2274 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.232000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:24:08.258000 audit[2363]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.258000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffdffcfe50 a2=0 a3=7fffdffcfe3c items=0 ppid=2274 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.258000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:24:08.260000 audit[2364]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.260000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdba0e3b50 a2=0 a3=7ffdba0e3b3c items=0 ppid=2274 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.260000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 00:24:08.263000 audit[2366]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:08.263000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffedb0f2c40 a2=0 a3=7ffedb0f2c2c items=0 ppid=2274 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.263000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 00:24:08.291000 audit[2372]: NETFILTER_CFG table=filter:39 family=2 entries=11 op=nft_register_rule pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:08.291000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffed1b51bc0 a2=0 a3=7ffed1b51bac items=0 ppid=2274 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.291000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:08.313000 audit[2372]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:08.313000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffed1b51bc0 a2=0 a3=7ffed1b51bac items=0 ppid=2274 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.313000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:08.327000 audit[2380]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.327000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc54bdede0 a2=0 a3=7ffc54bdedcc items=0 ppid=2274 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 00:24:08.330000 audit[2382]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.330000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffffb26d6a0 a2=0 a3=7ffffb26d68c items=0 ppid=2274 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 6 00:24:08.335000 audit[2385]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.335000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd33f4b260 a2=0 a3=7ffd33f4b24c items=0 ppid=2274 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.335000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 6 00:24:08.336000 audit[2386]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.336000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb82786d0 a2=0 a3=7ffcb82786bc items=0 ppid=2274 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 00:24:08.339000 audit[2388]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.339000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff02e677b0 a2=0 a3=7fff02e6779c items=0 ppid=2274 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.339000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 00:24:08.341000 audit[2389]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.341000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe11e21cf0 a2=0 a3=7ffe11e21cdc items=0 ppid=2274 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.341000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 00:24:08.344000 audit[2391]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.344000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdf492d870 a2=0 a3=7ffdf492d85c items=0 ppid=2274 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.344000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 6 00:24:08.348000 audit[2394]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.348000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd1ed36470 a2=0 a3=7ffd1ed3645c items=0 ppid=2274 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.348000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 00:24:08.350000 audit[2395]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.350000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4028bbf0 a2=0 a3=7ffd4028bbdc items=0 ppid=2274 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.350000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 00:24:08.353000 audit[2397]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.353000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe4c185de0 a2=0 a3=7ffe4c185dcc items=0 ppid=2274 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.353000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 00:24:08.354000 audit[2398]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2398 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.354000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe63eef410 a2=0 a3=7ffe63eef3fc items=0 ppid=2274 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.354000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 00:24:08.357000 audit[2400]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.357000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff063364e0 a2=0 a3=7fff063364cc items=0 ppid=2274 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.357000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 00:24:08.362000 audit[2403]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.362000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc5505f000 a2=0 a3=7ffc5505efec items=0 ppid=2274 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.362000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 00:24:08.368000 audit[2406]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.368000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffba2de8f0 a2=0 a3=7fffba2de8dc items=0 ppid=2274 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.368000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 6 00:24:08.370000 audit[2407]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.370000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc42cb7460 a2=0 a3=7ffc42cb744c items=0 ppid=2274 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.370000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 00:24:08.373000 audit[2409]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.373000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc9ff637f0 a2=0 a3=7ffc9ff637dc items=0 ppid=2274 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.373000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:24:08.377000 audit[2412]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.377000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffec17a8740 a2=0 a3=7ffec17a872c items=0 ppid=2274 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.377000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:24:08.378000 audit[2413]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2413 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.378000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd98820fc0 a2=0 a3=7ffd98820fac items=0 ppid=2274 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.378000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 00:24:08.382000 audit[2415]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.382000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff8cdf3a30 a2=0 a3=7fff8cdf3a1c items=0 ppid=2274 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.382000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 00:24:08.383000 audit[2416]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.383000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdabffb950 a2=0 a3=7ffdabffb93c items=0 ppid=2274 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.383000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 00:24:08.386000 audit[2418]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2418 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.386000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff60aba4e0 a2=0 a3=7fff60aba4cc items=0 ppid=2274 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.386000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:24:08.391000 audit[2421]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2421 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:08.391000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdbfe27ff0 a2=0 a3=7ffdbfe27fdc items=0 ppid=2274 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.391000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:24:08.394000 audit[2423]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2423 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 00:24:08.394000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffcad386e90 a2=0 a3=7ffcad386e7c items=0 ppid=2274 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.394000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:08.395000 audit[2423]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 00:24:08.395000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffcad386e90 a2=0 a3=7ffcad386e7c items=0 ppid=2274 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:08.395000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:08.532825 kubelet[2124]: E0906 00:24:08.532624 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:08.812492 kubelet[2124]: E0906 00:24:08.812298 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.812492 kubelet[2124]: W0906 00:24:08.812325 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.812492 kubelet[2124]: E0906 00:24:08.812351 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.812764 kubelet[2124]: E0906 00:24:08.812627 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.812764 kubelet[2124]: W0906 00:24:08.812639 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.812764 kubelet[2124]: E0906 00:24:08.812654 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.812916 kubelet[2124]: E0906 00:24:08.812894 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.812916 kubelet[2124]: W0906 00:24:08.812905 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.813005 kubelet[2124]: E0906 00:24:08.812918 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.813235 kubelet[2124]: E0906 00:24:08.813212 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.813235 kubelet[2124]: W0906 00:24:08.813229 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.813398 kubelet[2124]: E0906 00:24:08.813246 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.813558 kubelet[2124]: E0906 00:24:08.813509 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.813558 kubelet[2124]: W0906 00:24:08.813555 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.813683 kubelet[2124]: E0906 00:24:08.813570 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.813810 kubelet[2124]: E0906 00:24:08.813794 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.813810 kubelet[2124]: W0906 00:24:08.813807 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.814136 kubelet[2124]: E0906 00:24:08.813821 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.814188 kubelet[2124]: E0906 00:24:08.814134 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.814188 kubelet[2124]: W0906 00:24:08.814146 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.814188 kubelet[2124]: E0906 00:24:08.814160 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.814382 kubelet[2124]: E0906 00:24:08.814363 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.814382 kubelet[2124]: W0906 00:24:08.814377 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.814536 kubelet[2124]: E0906 00:24:08.814389 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.814616 kubelet[2124]: E0906 00:24:08.814603 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.814683 kubelet[2124]: W0906 00:24:08.814617 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.814683 kubelet[2124]: E0906 00:24:08.814629 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.814832 kubelet[2124]: E0906 00:24:08.814813 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.814832 kubelet[2124]: W0906 00:24:08.814828 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.814958 kubelet[2124]: E0906 00:24:08.814840 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.815053 kubelet[2124]: E0906 00:24:08.815034 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.815053 kubelet[2124]: W0906 00:24:08.815050 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.815171 kubelet[2124]: E0906 00:24:08.815061 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.815276 kubelet[2124]: E0906 00:24:08.815260 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.815276 kubelet[2124]: W0906 00:24:08.815274 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.815408 kubelet[2124]: E0906 00:24:08.815286 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.815504 kubelet[2124]: E0906 00:24:08.815487 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.815504 kubelet[2124]: W0906 00:24:08.815500 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.815630 kubelet[2124]: E0906 00:24:08.815528 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.815744 kubelet[2124]: E0906 00:24:08.815729 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.815744 kubelet[2124]: W0906 00:24:08.815742 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.815885 kubelet[2124]: E0906 00:24:08.815772 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.815993 kubelet[2124]: E0906 00:24:08.815978 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.815993 kubelet[2124]: W0906 00:24:08.815991 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.816124 kubelet[2124]: E0906 00:24:08.816004 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.816212 kubelet[2124]: E0906 00:24:08.816193 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.816212 kubelet[2124]: W0906 00:24:08.816208 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.816212 kubelet[2124]: E0906 00:24:08.816219 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.816450 kubelet[2124]: E0906 00:24:08.816434 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.816450 kubelet[2124]: W0906 00:24:08.816447 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.816606 kubelet[2124]: E0906 00:24:08.816460 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.816710 kubelet[2124]: E0906 00:24:08.816694 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.816710 kubelet[2124]: W0906 00:24:08.816708 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.816844 kubelet[2124]: E0906 00:24:08.816721 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.816934 kubelet[2124]: E0906 00:24:08.816915 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.817002 kubelet[2124]: W0906 00:24:08.816934 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.817002 kubelet[2124]: E0906 00:24:08.816946 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.817153 kubelet[2124]: E0906 00:24:08.817136 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.817153 kubelet[2124]: W0906 00:24:08.817150 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.817265 kubelet[2124]: E0906 00:24:08.817161 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.835014 kubelet[2124]: E0906 00:24:08.834980 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.835014 kubelet[2124]: W0906 00:24:08.835004 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.835014 kubelet[2124]: E0906 00:24:08.835029 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.835350 kubelet[2124]: E0906 00:24:08.835328 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.835350 kubelet[2124]: W0906 00:24:08.835345 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.835553 kubelet[2124]: E0906 00:24:08.835364 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.835660 kubelet[2124]: E0906 00:24:08.835643 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.835747 kubelet[2124]: W0906 00:24:08.835661 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.835747 kubelet[2124]: E0906 00:24:08.835679 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.835946 kubelet[2124]: E0906 00:24:08.835929 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.836013 kubelet[2124]: W0906 00:24:08.835946 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.836013 kubelet[2124]: E0906 00:24:08.835963 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.836216 kubelet[2124]: E0906 00:24:08.836193 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.836216 kubelet[2124]: W0906 00:24:08.836210 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.836334 kubelet[2124]: E0906 00:24:08.836227 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.836530 kubelet[2124]: E0906 00:24:08.836499 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.836530 kubelet[2124]: W0906 00:24:08.836536 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.836987 kubelet[2124]: E0906 00:24:08.836698 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.836987 kubelet[2124]: E0906 00:24:08.836752 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.836987 kubelet[2124]: W0906 00:24:08.836762 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.836987 kubelet[2124]: E0906 00:24:08.836774 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.837198 kubelet[2124]: E0906 00:24:08.837009 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.837198 kubelet[2124]: W0906 00:24:08.837018 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.837198 kubelet[2124]: E0906 00:24:08.837034 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.837389 kubelet[2124]: E0906 00:24:08.837241 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.837389 kubelet[2124]: W0906 00:24:08.837263 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.837389 kubelet[2124]: E0906 00:24:08.837276 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.837561 kubelet[2124]: E0906 00:24:08.837537 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.837561 kubelet[2124]: W0906 00:24:08.837548 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.837654 kubelet[2124]: E0906 00:24:08.837560 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.838100 kubelet[2124]: E0906 00:24:08.838082 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.838168 kubelet[2124]: W0906 00:24:08.838108 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.838168 kubelet[2124]: E0906 00:24:08.838131 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:08.838385 kubelet[2124]: E0906 00:24:08.838368 2124 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:24:08.838385 kubelet[2124]: W0906 00:24:08.838382 2124 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:24:08.838505 kubelet[2124]: E0906 00:24:08.838396 2124 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:24:09.068001 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2769863798.mount: Deactivated successfully. Sep 6 00:24:09.207722 env[1743]: time="2025-09-06T00:24:09.207667659Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:09.211964 env[1743]: time="2025-09-06T00:24:09.211918012Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:09.214775 env[1743]: time="2025-09-06T00:24:09.214732530Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:09.217263 env[1743]: time="2025-09-06T00:24:09.217223494Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:09.217781 env[1743]: time="2025-09-06T00:24:09.217740480Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4\"" Sep 6 00:24:09.220463 env[1743]: time="2025-09-06T00:24:09.220426775Z" level=info msg="CreateContainer within sandbox \"2e283deb84dde7d30daab7b93b77b7a7ab3baa26a7deb679b1c2ce0b7cc2430c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 6 00:24:09.238422 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2332466383.mount: Deactivated successfully. Sep 6 00:24:09.249645 env[1743]: time="2025-09-06T00:24:09.249586172Z" level=info msg="CreateContainer within sandbox \"2e283deb84dde7d30daab7b93b77b7a7ab3baa26a7deb679b1c2ce0b7cc2430c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"19f5c41d8c2ee121e6d0a81dfe82b5cd4cd020a4138d93eea28f8d2c99f174ca\"" Sep 6 00:24:09.250371 env[1743]: time="2025-09-06T00:24:09.250336126Z" level=info msg="StartContainer for \"19f5c41d8c2ee121e6d0a81dfe82b5cd4cd020a4138d93eea28f8d2c99f174ca\"" Sep 6 00:24:09.272729 systemd[1]: Started cri-containerd-19f5c41d8c2ee121e6d0a81dfe82b5cd4cd020a4138d93eea28f8d2c99f174ca.scope. Sep 6 00:24:09.291000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.293742 kernel: kauditd_printk_skb: 371 callbacks suppressed Sep 6 00:24:09.293836 kernel: audit: type=1400 audit(1757118249.291:543): avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.309598 kernel: audit: type=1300 audit(1757118249.291:543): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f316c23e8c8 items=0 ppid=2200 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:09.291000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f316c23e8c8 items=0 ppid=2200 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:09.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139663563343164386332656531323165366430613831646665383262 Sep 6 00:24:09.321669 kernel: audit: type=1327 audit(1757118249.291:543): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139663563343164386332656531323165366430613831646665383262 Sep 6 00:24:09.297000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.336171 kernel: audit: type=1400 audit(1757118249.297:544): avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.336297 kernel: audit: type=1400 audit(1757118249.297:544): avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.297000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.297000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.343828 kernel: audit: type=1400 audit(1757118249.297:544): avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.346565 kernel: audit: type=1400 audit(1757118249.297:544): avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.297000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.357582 kernel: audit: type=1400 audit(1757118249.297:544): avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.297000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.358128 env[1743]: time="2025-09-06T00:24:09.358076680Z" level=info msg="StartContainer for \"19f5c41d8c2ee121e6d0a81dfe82b5cd4cd020a4138d93eea28f8d2c99f174ca\" returns successfully" Sep 6 00:24:09.297000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.364823 kernel: audit: type=1400 audit(1757118249.297:544): avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.364961 kernel: audit: type=1400 audit(1757118249.297:544): avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.297000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.366257 systemd[1]: cri-containerd-19f5c41d8c2ee121e6d0a81dfe82b5cd4cd020a4138d93eea28f8d2c99f174ca.scope: Deactivated successfully. Sep 6 00:24:09.297000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.297000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.297000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.297000 audit: BPF prog-id=75 op=LOAD Sep 6 00:24:09.297000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003a0108 items=0 ppid=2200 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:09.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139663563343164386332656531323165366430613831646665383262 Sep 6 00:24:09.299000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.299000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.299000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.299000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.299000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.299000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.299000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.299000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.299000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.299000 audit: BPF prog-id=76 op=LOAD Sep 6 00:24:09.299000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003a0158 items=0 ppid=2200 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:09.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139663563343164386332656531323165366430613831646665383262 Sep 6 00:24:09.309000 audit: BPF prog-id=76 op=UNLOAD Sep 6 00:24:09.309000 audit: BPF prog-id=75 op=UNLOAD Sep 6 00:24:09.309000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.309000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.309000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.309000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.309000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.309000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.309000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.309000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.309000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.309000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:09.309000 audit: BPF prog-id=77 op=LOAD Sep 6 00:24:09.309000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003a01e8 items=0 ppid=2200 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:09.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139663563343164386332656531323165366430613831646665383262 Sep 6 00:24:09.375000 audit: BPF prog-id=77 op=UNLOAD Sep 6 00:24:09.533478 kubelet[2124]: E0906 00:24:09.533387 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:09.566570 env[1743]: time="2025-09-06T00:24:09.566509972Z" level=info msg="shim disconnected" id=19f5c41d8c2ee121e6d0a81dfe82b5cd4cd020a4138d93eea28f8d2c99f174ca Sep 6 00:24:09.566570 env[1743]: time="2025-09-06T00:24:09.566569823Z" level=warning msg="cleaning up after shim disconnected" id=19f5c41d8c2ee121e6d0a81dfe82b5cd4cd020a4138d93eea28f8d2c99f174ca namespace=k8s.io Sep 6 00:24:09.566570 env[1743]: time="2025-09-06T00:24:09.566579833Z" level=info msg="cleaning up dead shim" Sep 6 00:24:09.574258 env[1743]: time="2025-09-06T00:24:09.574211808Z" level=warning msg="cleanup warnings time=\"2025-09-06T00:24:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2508 runtime=io.containerd.runc.v2\n" Sep 6 00:24:09.746150 kubelet[2124]: E0906 00:24:09.746015 2124 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-54z95" podUID="1e4a1408-0f6c-45df-8a6c-c73b95d01904" Sep 6 00:24:09.764119 env[1743]: time="2025-09-06T00:24:09.764046889Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 6 00:24:09.796606 kubelet[2124]: I0906 00:24:09.796540 2124 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-g8kqs" podStartSLOduration=4.668065973 podStartE2EDuration="6.796506707s" podCreationTimestamp="2025-09-06 00:24:03 +0000 UTC" firstStartedPulling="2025-09-06 00:24:05.730720101 +0000 UTC m=+4.221105969" lastFinishedPulling="2025-09-06 00:24:07.859160817 +0000 UTC m=+6.349546703" observedRunningTime="2025-09-06 00:24:08.789849655 +0000 UTC m=+7.280235543" watchObservedRunningTime="2025-09-06 00:24:09.796506707 +0000 UTC m=+8.286892598" Sep 6 00:24:10.012946 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-19f5c41d8c2ee121e6d0a81dfe82b5cd4cd020a4138d93eea28f8d2c99f174ca-rootfs.mount: Deactivated successfully. Sep 6 00:24:10.023000 audit[2526]: NETFILTER_CFG table=filter:65 family=2 entries=20 op=nft_register_rule pid=2526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:10.023000 audit[2526]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fffac01d930 a2=0 a3=7fffac01d91c items=0 ppid=2274 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:10.023000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:10.027000 audit[2526]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=2526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:10.027000 audit[2526]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffac01d930 a2=0 a3=0 items=0 ppid=2274 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:10.027000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:10.534393 kubelet[2124]: E0906 00:24:10.534357 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:11.090000 audit[2528]: NETFILTER_CFG table=filter:67 family=2 entries=20 op=nft_register_rule pid=2528 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:11.090000 audit[2528]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe76eb8b40 a2=0 a3=7ffe76eb8b2c items=0 ppid=2274 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:11.090000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:11.094000 audit[2528]: NETFILTER_CFG table=nat:68 family=2 entries=14 op=nft_register_rule pid=2528 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:11.094000 audit[2528]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe76eb8b40 a2=0 a3=0 items=0 ppid=2274 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:11.094000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:11.147000 audit[2530]: NETFILTER_CFG table=filter:69 family=2 entries=17 op=nft_register_rule pid=2530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:11.147000 audit[2530]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff3df1bb20 a2=0 a3=7fff3df1bb0c items=0 ppid=2274 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:11.147000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:11.151000 audit[2530]: NETFILTER_CFG table=nat:70 family=2 entries=35 op=nft_register_chain pid=2530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:11.151000 audit[2530]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff3df1bb20 a2=0 a3=7fff3df1bb0c items=0 ppid=2274 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:11.151000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:11.535556 kubelet[2124]: E0906 00:24:11.535142 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:11.746023 kubelet[2124]: E0906 00:24:11.745970 2124 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-54z95" podUID="1e4a1408-0f6c-45df-8a6c-c73b95d01904" Sep 6 00:24:12.536227 kubelet[2124]: E0906 00:24:12.536110 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:13.119383 env[1743]: time="2025-09-06T00:24:13.119331930Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:13.121891 env[1743]: time="2025-09-06T00:24:13.121833201Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:13.124035 env[1743]: time="2025-09-06T00:24:13.124004034Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:13.125467 env[1743]: time="2025-09-06T00:24:13.125436161Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:13.125987 env[1743]: time="2025-09-06T00:24:13.125953843Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458\"" Sep 6 00:24:13.128052 env[1743]: time="2025-09-06T00:24:13.127999286Z" level=info msg="CreateContainer within sandbox \"2e283deb84dde7d30daab7b93b77b7a7ab3baa26a7deb679b1c2ce0b7cc2430c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 6 00:24:13.143577 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount628031506.mount: Deactivated successfully. Sep 6 00:24:13.150709 env[1743]: time="2025-09-06T00:24:13.150658219Z" level=info msg="CreateContainer within sandbox \"2e283deb84dde7d30daab7b93b77b7a7ab3baa26a7deb679b1c2ce0b7cc2430c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"2398d5af5d34998e5eb4fc07a17c001c0a3a80e2ee3a783b667330b7c221e2af\"" Sep 6 00:24:13.151352 env[1743]: time="2025-09-06T00:24:13.151294576Z" level=info msg="StartContainer for \"2398d5af5d34998e5eb4fc07a17c001c0a3a80e2ee3a783b667330b7c221e2af\"" Sep 6 00:24:13.178363 systemd[1]: Started cri-containerd-2398d5af5d34998e5eb4fc07a17c001c0a3a80e2ee3a783b667330b7c221e2af.scope. Sep 6 00:24:13.180496 systemd[1]: run-containerd-runc-k8s.io-2398d5af5d34998e5eb4fc07a17c001c0a3a80e2ee3a783b667330b7c221e2af-runc.RPVsOz.mount: Deactivated successfully. Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7ff0d25e92f8 items=0 ppid=2200 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:13.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233393864356166356433343939386535656234666330376131376330 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit: BPF prog-id=78 op=LOAD Sep 6 00:24:13.201000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024258 items=0 ppid=2200 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:13.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233393864356166356433343939386535656234666330376131376330 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit: BPF prog-id=79 op=LOAD Sep 6 00:24:13.201000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000242a8 items=0 ppid=2200 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:13.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233393864356166356433343939386535656234666330376131376330 Sep 6 00:24:13.201000 audit: BPF prog-id=79 op=UNLOAD Sep 6 00:24:13.201000 audit: BPF prog-id=78 op=UNLOAD Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:13.201000 audit: BPF prog-id=80 op=LOAD Sep 6 00:24:13.201000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024338 items=0 ppid=2200 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:13.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233393864356166356433343939386535656234666330376131376330 Sep 6 00:24:13.226103 env[1743]: time="2025-09-06T00:24:13.226049728Z" level=info msg="StartContainer for \"2398d5af5d34998e5eb4fc07a17c001c0a3a80e2ee3a783b667330b7c221e2af\" returns successfully" Sep 6 00:24:13.536995 kubelet[2124]: E0906 00:24:13.536868 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:13.742882 env[1743]: time="2025-09-06T00:24:13.742821391Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 6 00:24:13.745018 systemd[1]: cri-containerd-2398d5af5d34998e5eb4fc07a17c001c0a3a80e2ee3a783b667330b7c221e2af.scope: Deactivated successfully. Sep 6 00:24:13.746316 kubelet[2124]: E0906 00:24:13.746283 2124 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-54z95" podUID="1e4a1408-0f6c-45df-8a6c-c73b95d01904" Sep 6 00:24:13.748000 audit: BPF prog-id=80 op=UNLOAD Sep 6 00:24:13.807031 kubelet[2124]: I0906 00:24:13.806935 2124 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Sep 6 00:24:14.139602 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2398d5af5d34998e5eb4fc07a17c001c0a3a80e2ee3a783b667330b7c221e2af-rootfs.mount: Deactivated successfully. Sep 6 00:24:14.394810 env[1743]: time="2025-09-06T00:24:14.394691643Z" level=info msg="shim disconnected" id=2398d5af5d34998e5eb4fc07a17c001c0a3a80e2ee3a783b667330b7c221e2af Sep 6 00:24:14.394810 env[1743]: time="2025-09-06T00:24:14.394735755Z" level=warning msg="cleaning up after shim disconnected" id=2398d5af5d34998e5eb4fc07a17c001c0a3a80e2ee3a783b667330b7c221e2af namespace=k8s.io Sep 6 00:24:14.394810 env[1743]: time="2025-09-06T00:24:14.394745519Z" level=info msg="cleaning up dead shim" Sep 6 00:24:14.404016 env[1743]: time="2025-09-06T00:24:14.403959486Z" level=warning msg="cleanup warnings time=\"2025-09-06T00:24:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2579 runtime=io.containerd.runc.v2\n" Sep 6 00:24:14.537962 kubelet[2124]: E0906 00:24:14.537907 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:14.779299 env[1743]: time="2025-09-06T00:24:14.779195648Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 6 00:24:15.538558 kubelet[2124]: E0906 00:24:15.538480 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:15.750840 systemd[1]: Created slice kubepods-besteffort-pod1e4a1408_0f6c_45df_8a6c_c73b95d01904.slice. Sep 6 00:24:15.753101 env[1743]: time="2025-09-06T00:24:15.753064051Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-54z95,Uid:1e4a1408-0f6c-45df-8a6c-c73b95d01904,Namespace:calico-system,Attempt:0,}" Sep 6 00:24:15.839792 env[1743]: time="2025-09-06T00:24:15.839333419Z" level=error msg="Failed to destroy network for sandbox \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:24:15.840913 env[1743]: time="2025-09-06T00:24:15.840859299Z" level=error msg="encountered an error cleaning up failed sandbox \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:24:15.841157 env[1743]: time="2025-09-06T00:24:15.841105915Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-54z95,Uid:1e4a1408-0f6c-45df-8a6c-c73b95d01904,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:24:15.841545 kubelet[2124]: E0906 00:24:15.841484 2124 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:24:15.842211 kubelet[2124]: E0906 00:24:15.841793 2124 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-54z95" Sep 6 00:24:15.842211 kubelet[2124]: E0906 00:24:15.841841 2124 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-54z95" Sep 6 00:24:15.842211 kubelet[2124]: E0906 00:24:15.841902 2124 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-54z95_calico-system(1e4a1408-0f6c-45df-8a6c-c73b95d01904)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-54z95_calico-system(1e4a1408-0f6c-45df-8a6c-c73b95d01904)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-54z95" podUID="1e4a1408-0f6c-45df-8a6c-c73b95d01904" Sep 6 00:24:15.842754 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c-shm.mount: Deactivated successfully. Sep 6 00:24:16.538669 kubelet[2124]: E0906 00:24:16.538605 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:16.792049 kubelet[2124]: I0906 00:24:16.791953 2124 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Sep 6 00:24:16.792871 env[1743]: time="2025-09-06T00:24:16.792839436Z" level=info msg="StopPodSandbox for \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\"" Sep 6 00:24:16.818721 env[1743]: time="2025-09-06T00:24:16.818665068Z" level=error msg="StopPodSandbox for \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\" failed" error="failed to destroy network for sandbox \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:24:16.821393 kubelet[2124]: E0906 00:24:16.819091 2124 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Sep 6 00:24:16.821788 kubelet[2124]: E0906 00:24:16.821555 2124 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c"} Sep 6 00:24:16.821788 kubelet[2124]: E0906 00:24:16.821639 2124 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1e4a1408-0f6c-45df-8a6c-c73b95d01904\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:24:16.821788 kubelet[2124]: E0906 00:24:16.821714 2124 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1e4a1408-0f6c-45df-8a6c-c73b95d01904\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-54z95" podUID="1e4a1408-0f6c-45df-8a6c-c73b95d01904" Sep 6 00:24:17.539002 kubelet[2124]: E0906 00:24:17.538939 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:18.131000 audit[2635]: NETFILTER_CFG table=filter:71 family=2 entries=14 op=nft_register_rule pid=2635 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:18.134295 kernel: kauditd_printk_skb: 96 callbacks suppressed Sep 6 00:24:18.134425 kernel: audit: type=1325 audit(1757118258.131:563): table=filter:71 family=2 entries=14 op=nft_register_rule pid=2635 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:18.131000 audit[2635]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe3bff2fa0 a2=0 a3=7ffe3bff2f8c items=0 ppid=2274 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:18.153860 kernel: audit: type=1300 audit(1757118258.131:563): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe3bff2fa0 a2=0 a3=7ffe3bff2f8c items=0 ppid=2274 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:18.131000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:18.160641 kernel: audit: type=1327 audit(1757118258.131:563): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:18.180000 audit[2635]: NETFILTER_CFG table=nat:72 family=2 entries=56 op=nft_register_chain pid=2635 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:18.199825 kernel: audit: type=1325 audit(1757118258.180:564): table=nat:72 family=2 entries=56 op=nft_register_chain pid=2635 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:18.199953 kernel: audit: type=1300 audit(1757118258.180:564): arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffe3bff2fa0 a2=0 a3=7ffe3bff2f8c items=0 ppid=2274 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:18.180000 audit[2635]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffe3bff2fa0 a2=0 a3=7ffe3bff2f8c items=0 ppid=2274 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:18.180000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:18.205830 kernel: audit: type=1327 audit(1757118258.180:564): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:18.351000 audit[2639]: NETFILTER_CFG table=filter:73 family=2 entries=14 op=nft_register_rule pid=2639 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:18.357541 kernel: audit: type=1325 audit(1757118258.351:565): table=filter:73 family=2 entries=14 op=nft_register_rule pid=2639 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:18.351000 audit[2639]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd3f0d1e60 a2=0 a3=7ffd3f0d1e4c items=0 ppid=2274 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:18.370546 kernel: audit: type=1300 audit(1757118258.351:565): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd3f0d1e60 a2=0 a3=7ffd3f0d1e4c items=0 ppid=2274 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:18.351000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:18.376538 kernel: audit: type=1327 audit(1757118258.351:565): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:18.371000 audit[2639]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=2639 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:18.383569 kernel: audit: type=1325 audit(1757118258.371:566): table=nat:74 family=2 entries=20 op=nft_register_rule pid=2639 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:18.371000 audit[2639]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd3f0d1e60 a2=0 a3=7ffd3f0d1e4c items=0 ppid=2274 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:18.371000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:18.539570 kubelet[2124]: E0906 00:24:18.539501 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:19.539824 kubelet[2124]: E0906 00:24:19.539762 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:20.540649 kubelet[2124]: E0906 00:24:20.540583 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:20.591111 amazon-ssm-agent[1719]: 2025-09-06 00:24:20 INFO [HealthCheck] HealthCheck reporting agent health. Sep 6 00:24:20.830052 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3325102188.mount: Deactivated successfully. Sep 6 00:24:20.866317 env[1743]: time="2025-09-06T00:24:20.866259113Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:20.869797 env[1743]: time="2025-09-06T00:24:20.869752291Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:20.872615 env[1743]: time="2025-09-06T00:24:20.872581528Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:20.874919 env[1743]: time="2025-09-06T00:24:20.874875760Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:20.875548 env[1743]: time="2025-09-06T00:24:20.875498714Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f\"" Sep 6 00:24:20.889179 env[1743]: time="2025-09-06T00:24:20.889136564Z" level=info msg="CreateContainer within sandbox \"2e283deb84dde7d30daab7b93b77b7a7ab3baa26a7deb679b1c2ce0b7cc2430c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 6 00:24:20.909484 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount589628046.mount: Deactivated successfully. Sep 6 00:24:20.921359 env[1743]: time="2025-09-06T00:24:20.921295663Z" level=info msg="CreateContainer within sandbox \"2e283deb84dde7d30daab7b93b77b7a7ab3baa26a7deb679b1c2ce0b7cc2430c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f38bc36ce47c7c8521349069925e608203290641f71b66415ce0cd2c145149c2\"" Sep 6 00:24:20.922068 env[1743]: time="2025-09-06T00:24:20.922031350Z" level=info msg="StartContainer for \"f38bc36ce47c7c8521349069925e608203290641f71b66415ce0cd2c145149c2\"" Sep 6 00:24:20.942608 systemd[1]: Started cri-containerd-f38bc36ce47c7c8521349069925e608203290641f71b66415ce0cd2c145149c2.scope. Sep 6 00:24:20.962000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.962000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f5310b1d178 items=0 ppid=2200 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:20.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633386263333663653437633763383532313334393036393932356536 Sep 6 00:24:20.963000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.963000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.963000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.963000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.963000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.963000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.963000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.963000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.963000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.963000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.963000 audit: BPF prog-id=81 op=LOAD Sep 6 00:24:20.963000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00022aa78 items=0 ppid=2200 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:20.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633386263333663653437633763383532313334393036393932356536 Sep 6 00:24:20.964000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.964000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.964000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.964000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.964000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.964000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.964000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.964000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.964000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.964000 audit: BPF prog-id=82 op=LOAD Sep 6 00:24:20.964000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00022aac8 items=0 ppid=2200 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:20.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633386263333663653437633763383532313334393036393932356536 Sep 6 00:24:20.964000 audit: BPF prog-id=82 op=UNLOAD Sep 6 00:24:20.964000 audit: BPF prog-id=81 op=UNLOAD Sep 6 00:24:20.964000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.964000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.964000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.964000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.964000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.964000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.964000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.964000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.964000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.964000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:20.964000 audit: BPF prog-id=83 op=LOAD Sep 6 00:24:20.964000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00022ab58 items=0 ppid=2200 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:20.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633386263333663653437633763383532313334393036393932356536 Sep 6 00:24:20.983260 env[1743]: time="2025-09-06T00:24:20.982295948Z" level=info msg="StartContainer for \"f38bc36ce47c7c8521349069925e608203290641f71b66415ce0cd2c145149c2\" returns successfully" Sep 6 00:24:21.089059 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 6 00:24:21.089228 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 6 00:24:21.151000 audit[2689]: NETFILTER_CFG table=filter:75 family=2 entries=13 op=nft_register_rule pid=2689 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:21.151000 audit[2689]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffae469990 a2=0 a3=7fffae46997c items=0 ppid=2274 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:21.151000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:21.156000 audit[2689]: NETFILTER_CFG table=nat:76 family=2 entries=27 op=nft_register_chain pid=2689 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:21.156000 audit[2689]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fffae469990 a2=0 a3=7fffae46997c items=0 ppid=2274 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:21.156000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:21.488262 systemd[1]: Created slice kubepods-besteffort-pod15be3372_8fd4_4447_87ee_84bffcaef20a.slice. Sep 6 00:24:21.529307 kubelet[2124]: I0906 00:24:21.529262 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tcd4f\" (UniqueName: \"kubernetes.io/projected/15be3372-8fd4-4447-87ee-84bffcaef20a-kube-api-access-tcd4f\") pod \"nginx-deployment-7fcdb87857-ppps9\" (UID: \"15be3372-8fd4-4447-87ee-84bffcaef20a\") " pod="default/nginx-deployment-7fcdb87857-ppps9" Sep 6 00:24:21.540956 kubelet[2124]: E0906 00:24:21.540907 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:21.792376 env[1743]: time="2025-09-06T00:24:21.792263605Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-ppps9,Uid:15be3372-8fd4-4447-87ee-84bffcaef20a,Namespace:default,Attempt:0,}" Sep 6 00:24:21.904997 kubelet[2124]: I0906 00:24:21.904939 2124 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-dxnrb" podStartSLOduration=3.767386011 podStartE2EDuration="18.904920088s" podCreationTimestamp="2025-09-06 00:24:03 +0000 UTC" firstStartedPulling="2025-09-06 00:24:05.738776867 +0000 UTC m=+4.229162752" lastFinishedPulling="2025-09-06 00:24:20.876310947 +0000 UTC m=+19.366696829" observedRunningTime="2025-09-06 00:24:21.902847921 +0000 UTC m=+20.393233815" watchObservedRunningTime="2025-09-06 00:24:21.904920088 +0000 UTC m=+20.395305978" Sep 6 00:24:22.240008 systemd-networkd[1465]: cali5a94ac5ac18: Link UP Sep 6 00:24:22.242712 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:24:22.242813 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5a94ac5ac18: link becomes ready Sep 6 00:24:22.244937 systemd-networkd[1465]: cali5a94ac5ac18: Gained carrier Sep 6 00:24:22.245853 (udev-worker)[2752]: Network interface NamePolicy= disabled on kernel command line. Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:21.864 [INFO][2708] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:22.009 [INFO][2708] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.25.70-k8s-nginx--deployment--7fcdb87857--ppps9-eth0 nginx-deployment-7fcdb87857- default 15be3372-8fd4-4447-87ee-84bffcaef20a 1130 0 2025-09-06 00:24:20 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.25.70 nginx-deployment-7fcdb87857-ppps9 eth0 default [] [] [kns.default ksa.default.default] cali5a94ac5ac18 [] [] }} ContainerID="88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2" Namespace="default" Pod="nginx-deployment-7fcdb87857-ppps9" WorkloadEndpoint="172.31.25.70-k8s-nginx--deployment--7fcdb87857--ppps9-" Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:22.009 [INFO][2708] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2" Namespace="default" Pod="nginx-deployment-7fcdb87857-ppps9" WorkloadEndpoint="172.31.25.70-k8s-nginx--deployment--7fcdb87857--ppps9-eth0" Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:22.160 [INFO][2745] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2" HandleID="k8s-pod-network.88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2" Workload="172.31.25.70-k8s-nginx--deployment--7fcdb87857--ppps9-eth0" Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:22.160 [INFO][2745] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2" HandleID="k8s-pod-network.88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2" Workload="172.31.25.70-k8s-nginx--deployment--7fcdb87857--ppps9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5020), Attrs:map[string]string{"namespace":"default", "node":"172.31.25.70", "pod":"nginx-deployment-7fcdb87857-ppps9", "timestamp":"2025-09-06 00:24:22.160290891 +0000 UTC"}, Hostname:"172.31.25.70", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:22.160 [INFO][2745] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:22.160 [INFO][2745] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:22.160 [INFO][2745] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.25.70' Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:22.178 [INFO][2745] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2" host="172.31.25.70" Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:22.189 [INFO][2745] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.25.70" Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:22.195 [INFO][2745] ipam/ipam.go 511: Trying affinity for 192.168.14.0/26 host="172.31.25.70" Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:22.198 [INFO][2745] ipam/ipam.go 158: Attempting to load block cidr=192.168.14.0/26 host="172.31.25.70" Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:22.202 [INFO][2745] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.14.0/26 host="172.31.25.70" Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:22.202 [INFO][2745] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.14.0/26 handle="k8s-pod-network.88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2" host="172.31.25.70" Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:22.204 [INFO][2745] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2 Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:22.210 [INFO][2745] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.14.0/26 handle="k8s-pod-network.88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2" host="172.31.25.70" Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:22.223 [INFO][2745] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.14.1/26] block=192.168.14.0/26 handle="k8s-pod-network.88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2" host="172.31.25.70" Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:22.223 [INFO][2745] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.14.1/26] handle="k8s-pod-network.88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2" host="172.31.25.70" Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:22.223 [INFO][2745] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:24:22.257910 env[1743]: 2025-09-06 00:24:22.223 [INFO][2745] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.14.1/26] IPv6=[] ContainerID="88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2" HandleID="k8s-pod-network.88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2" Workload="172.31.25.70-k8s-nginx--deployment--7fcdb87857--ppps9-eth0" Sep 6 00:24:22.259219 env[1743]: 2025-09-06 00:24:22.225 [INFO][2708] cni-plugin/k8s.go 418: Populated endpoint ContainerID="88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2" Namespace="default" Pod="nginx-deployment-7fcdb87857-ppps9" WorkloadEndpoint="172.31.25.70-k8s-nginx--deployment--7fcdb87857--ppps9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.25.70-k8s-nginx--deployment--7fcdb87857--ppps9-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"15be3372-8fd4-4447-87ee-84bffcaef20a", ResourceVersion:"1130", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 24, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.25.70", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-ppps9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.14.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5a94ac5ac18", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:24:22.259219 env[1743]: 2025-09-06 00:24:22.225 [INFO][2708] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.14.1/32] ContainerID="88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2" Namespace="default" Pod="nginx-deployment-7fcdb87857-ppps9" WorkloadEndpoint="172.31.25.70-k8s-nginx--deployment--7fcdb87857--ppps9-eth0" Sep 6 00:24:22.259219 env[1743]: 2025-09-06 00:24:22.226 [INFO][2708] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5a94ac5ac18 ContainerID="88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2" Namespace="default" Pod="nginx-deployment-7fcdb87857-ppps9" WorkloadEndpoint="172.31.25.70-k8s-nginx--deployment--7fcdb87857--ppps9-eth0" Sep 6 00:24:22.259219 env[1743]: 2025-09-06 00:24:22.245 [INFO][2708] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2" Namespace="default" Pod="nginx-deployment-7fcdb87857-ppps9" WorkloadEndpoint="172.31.25.70-k8s-nginx--deployment--7fcdb87857--ppps9-eth0" Sep 6 00:24:22.259219 env[1743]: 2025-09-06 00:24:22.245 [INFO][2708] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2" Namespace="default" Pod="nginx-deployment-7fcdb87857-ppps9" WorkloadEndpoint="172.31.25.70-k8s-nginx--deployment--7fcdb87857--ppps9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.25.70-k8s-nginx--deployment--7fcdb87857--ppps9-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"15be3372-8fd4-4447-87ee-84bffcaef20a", ResourceVersion:"1130", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 24, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.25.70", ContainerID:"88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2", Pod:"nginx-deployment-7fcdb87857-ppps9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.14.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5a94ac5ac18", MAC:"4a:fc:08:52:f6:cd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:24:22.259219 env[1743]: 2025-09-06 00:24:22.256 [INFO][2708] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2" Namespace="default" Pod="nginx-deployment-7fcdb87857-ppps9" WorkloadEndpoint="172.31.25.70-k8s-nginx--deployment--7fcdb87857--ppps9-eth0" Sep 6 00:24:22.275346 env[1743]: time="2025-09-06T00:24:22.275267543Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:24:22.275346 env[1743]: time="2025-09-06T00:24:22.275314360Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:24:22.275590 env[1743]: time="2025-09-06T00:24:22.275330337Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:24:22.275839 env[1743]: time="2025-09-06T00:24:22.275797505Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2 pid=2769 runtime=io.containerd.runc.v2 Sep 6 00:24:22.302836 systemd[1]: run-containerd-runc-k8s.io-88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2-runc.Sw3kh5.mount: Deactivated successfully. Sep 6 00:24:22.306558 systemd[1]: Started cri-containerd-88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2.scope. Sep 6 00:24:22.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.321000 audit: BPF prog-id=84 op=LOAD Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2769 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:22.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838623631633336353864346537303134343135343838623162623436 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2769 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:22.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838623631633336353864346537303134343135343838623162623436 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit: BPF prog-id=85 op=LOAD Sep 6 00:24:22.322000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003923d0 items=0 ppid=2769 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:22.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838623631633336353864346537303134343135343838623162623436 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit: BPF prog-id=86 op=LOAD Sep 6 00:24:22.322000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000392418 items=0 ppid=2769 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:22.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838623631633336353864346537303134343135343838623162623436 Sep 6 00:24:22.322000 audit: BPF prog-id=86 op=UNLOAD Sep 6 00:24:22.322000 audit: BPF prog-id=85 op=UNLOAD Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.322000 audit: BPF prog-id=87 op=LOAD Sep 6 00:24:22.322000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000392828 items=0 ppid=2769 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:22.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838623631633336353864346537303134343135343838623162623436 Sep 6 00:24:22.353715 env[1743]: time="2025-09-06T00:24:22.353661463Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-ppps9,Uid:15be3372-8fd4-4447-87ee-84bffcaef20a,Namespace:default,Attempt:0,} returns sandbox id \"88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2\"" Sep 6 00:24:22.356127 env[1743]: time="2025-09-06T00:24:22.356067436Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 6 00:24:22.501981 kubelet[2124]: E0906 00:24:22.501852 2124 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:22.541076 kubelet[2124]: E0906 00:24:22.541001 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:22.965000 audit[2862]: AVC avc: denied { write } for pid=2862 comm="tee" name="fd" dev="proc" ino=20953 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:24:22.965000 audit[2862]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca85b47d8 a2=241 a3=1b6 items=1 ppid=2841 pid=2862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:22.965000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 6 00:24:22.965000 audit: PATH item=0 name="/dev/fd/63" inode=20944 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:24:22.965000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:24:22.980000 audit[2869]: AVC avc: denied { write } for pid=2869 comm="tee" name="fd" dev="proc" ino=19889 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:24:22.982000 audit[2879]: AVC avc: denied { write } for pid=2879 comm="tee" name="fd" dev="proc" ino=20965 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:24:22.982000 audit[2879]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc956757c9 a2=241 a3=1b6 items=1 ppid=2836 pid=2879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:22.982000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 6 00:24:22.982000 audit: PATH item=0 name="/dev/fd/63" inode=20959 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:24:22.982000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:24:22.980000 audit[2869]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc18fe57d9 a2=241 a3=1b6 items=1 ppid=2832 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:22.980000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 6 00:24:22.980000 audit: PATH item=0 name="/dev/fd/63" inode=20948 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:24:22.980000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:24:22.987000 audit[2878]: AVC avc: denied { write } for pid=2878 comm="tee" name="fd" dev="proc" ino=19902 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:24:22.987000 audit[2878]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff81f8b7d8 a2=241 a3=1b6 items=1 ppid=2847 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:22.987000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 6 00:24:22.987000 audit: PATH item=0 name="/dev/fd/63" inode=19886 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:24:22.987000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:24:22.998000 audit[2889]: AVC avc: denied { write } for pid=2889 comm="tee" name="fd" dev="proc" ino=19907 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:24:23.000000 audit[2885]: AVC avc: denied { write } for pid=2885 comm="tee" name="fd" dev="proc" ino=20969 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:24:23.000000 audit[2885]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdee4967c8 a2=241 a3=1b6 items=1 ppid=2843 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.000000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 6 00:24:23.000000 audit: PATH item=0 name="/dev/fd/63" inode=19892 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:24:23.000000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:24:23.002000 audit[2887]: AVC avc: denied { write } for pid=2887 comm="tee" name="fd" dev="proc" ino=20973 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:24:23.002000 audit[2887]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee38cb7da a2=241 a3=1b6 items=1 ppid=2838 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.002000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 6 00:24:23.002000 audit: PATH item=0 name="/dev/fd/63" inode=19897 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:24:23.002000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:24:22.998000 audit[2889]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffedf9597d8 a2=241 a3=1b6 items=1 ppid=2834 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:22.998000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 6 00:24:22.998000 audit: PATH item=0 name="/dev/fd/63" inode=19898 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:24:22.998000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:24:23.262760 kernel: kauditd_printk_skb: 143 callbacks suppressed Sep 6 00:24:23.262933 kernel: audit: type=1400 audit(1757118263.255:600): avc: denied { bpf } for pid=2929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.255000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.255000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.270541 kernel: audit: type=1400 audit(1757118263.255:600): avc: denied { bpf } for pid=2929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.270629 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 6 00:24:23.273370 kernel: audit: audit_lost=40 audit_rate_limit=0 audit_backlog_limit=64 Sep 6 00:24:23.273447 kernel: audit: backlog limit exceeded Sep 6 00:24:23.282580 kernel: audit: type=1400 audit(1757118263.255:600): avc: denied { perfmon } for pid=2929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.282693 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 6 00:24:23.282718 kernel: audit: audit_lost=41 audit_rate_limit=0 audit_backlog_limit=64 Sep 6 00:24:23.282743 kernel: audit: backlog limit exceeded Sep 6 00:24:23.255000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.255000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.292546 kernel: audit: type=1400 audit(1757118263.255:600): avc: denied { perfmon } for pid=2929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.255000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.255000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.255000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.255000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.255000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.255000 audit: BPF prog-id=88 op=LOAD Sep 6 00:24:23.255000 audit[2929]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe6e48e6d0 a2=98 a3=1fffffffffffffff items=0 ppid=2852 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.255000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:24:23.262000 audit: BPF prog-id=88 op=UNLOAD Sep 6 00:24:23.262000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.262000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.262000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.262000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.262000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.262000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.262000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.262000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.262000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.262000 audit: BPF prog-id=89 op=LOAD Sep 6 00:24:23.262000 audit[2929]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe6e48e5b0 a2=94 a3=3 items=0 ppid=2852 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.262000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:24:23.262000 audit: BPF prog-id=89 op=UNLOAD Sep 6 00:24:23.262000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.262000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.262000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.262000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.262000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.262000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.262000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.262000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.262000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.262000 audit: BPF prog-id=90 op=LOAD Sep 6 00:24:23.262000 audit[2929]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe6e48e5f0 a2=94 a3=7ffe6e48e7d0 items=0 ppid=2852 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.262000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:24:23.262000 audit: BPF prog-id=90 op=UNLOAD Sep 6 00:24:23.262000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.262000 audit[2929]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffe6e48e6c0 a2=50 a3=a000000085 items=0 ppid=2852 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.262000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:24:23.264000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.264000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.264000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.264000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.264000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.264000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.264000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.264000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.264000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.264000 audit: BPF prog-id=91 op=LOAD Sep 6 00:24:23.264000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdad7ed920 a2=98 a3=3 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.264000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.269000 audit: BPF prog-id=91 op=UNLOAD Sep 6 00:24:23.269000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.269000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.269000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.269000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.269000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.269000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.269000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.269000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.269000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdad7ed710 a2=94 a3=54428f items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.269000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.292000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.292000 audit: BPF prog-id=93 op=LOAD Sep 6 00:24:23.292000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdad7ed740 a2=94 a3=2 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.292000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.293000 audit: BPF prog-id=93 op=UNLOAD Sep 6 00:24:23.410000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.410000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.410000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.410000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.410000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.410000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.410000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.410000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.410000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.410000 audit: BPF prog-id=94 op=LOAD Sep 6 00:24:23.410000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdad7ed600 a2=94 a3=1 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.410000 audit: BPF prog-id=94 op=UNLOAD Sep 6 00:24:23.410000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.410000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdad7ed6d0 a2=50 a3=7ffdad7ed7b0 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdad7ed610 a2=28 a3=0 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdad7ed640 a2=28 a3=0 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdad7ed550 a2=28 a3=0 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdad7ed660 a2=28 a3=0 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdad7ed640 a2=28 a3=0 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdad7ed630 a2=28 a3=0 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdad7ed660 a2=28 a3=0 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdad7ed640 a2=28 a3=0 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdad7ed660 a2=28 a3=0 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdad7ed630 a2=28 a3=0 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdad7ed6a0 a2=28 a3=0 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdad7ed450 a2=50 a3=1 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit: BPF prog-id=95 op=LOAD Sep 6 00:24:23.423000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdad7ed450 a2=94 a3=5 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.423000 audit: BPF prog-id=95 op=UNLOAD Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdad7ed500 a2=50 a3=1 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdad7ed620 a2=4 a3=38 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.423000 audit[2930]: AVC avc: denied { confidentiality } for pid=2930 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:24:23.423000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdad7ed670 a2=94 a3=6 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { confidentiality } for pid=2930 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:24:23.424000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdad7ece20 a2=94 a3=88 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.424000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.424000 audit[2930]: AVC avc: denied { confidentiality } for pid=2930 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:24:23.424000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdad7ece20 a2=94 a3=88 items=0 ppid=2852 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.424000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:23.436000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.436000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.436000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.436000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.436000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.436000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.436000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.436000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.436000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.436000 audit: BPF prog-id=96 op=LOAD Sep 6 00:24:23.436000 audit[2947]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed39fdd40 a2=98 a3=1999999999999999 items=0 ppid=2852 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.436000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 00:24:23.436000 audit: BPF prog-id=96 op=UNLOAD Sep 6 00:24:23.436000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.436000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.436000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.436000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.436000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.436000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.436000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.436000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.436000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.436000 audit: BPF prog-id=97 op=LOAD Sep 6 00:24:23.436000 audit[2947]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed39fdc20 a2=94 a3=ffff items=0 ppid=2852 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.436000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 00:24:23.437000 audit: BPF prog-id=97 op=UNLOAD Sep 6 00:24:23.437000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.437000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.437000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.437000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.437000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.437000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.437000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.437000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.437000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.437000 audit: BPF prog-id=98 op=LOAD Sep 6 00:24:23.437000 audit[2947]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed39fdc60 a2=94 a3=7ffed39fde40 items=0 ppid=2852 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.437000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 00:24:23.437000 audit: BPF prog-id=98 op=UNLOAD Sep 6 00:24:23.545090 kubelet[2124]: E0906 00:24:23.544971 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:23.585417 (udev-worker)[2637]: Network interface NamePolicy= disabled on kernel command line. Sep 6 00:24:23.592017 systemd-networkd[1465]: vxlan.calico: Link UP Sep 6 00:24:23.592028 systemd-networkd[1465]: vxlan.calico: Gained carrier Sep 6 00:24:23.631000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.631000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.631000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.631000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.631000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.631000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.631000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.631000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.631000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.631000 audit: BPF prog-id=99 op=LOAD Sep 6 00:24:23.631000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff37859e00 a2=98 a3=0 items=0 ppid=2852 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.631000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:23.631000 audit: BPF prog-id=99 op=UNLOAD Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit: BPF prog-id=100 op=LOAD Sep 6 00:24:23.632000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff37859c10 a2=94 a3=54428f items=0 ppid=2852 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.632000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:23.632000 audit: BPF prog-id=100 op=UNLOAD Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit: BPF prog-id=101 op=LOAD Sep 6 00:24:23.632000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff37859c40 a2=94 a3=2 items=0 ppid=2852 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.632000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:23.632000 audit: BPF prog-id=101 op=UNLOAD Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff37859b10 a2=28 a3=0 items=0 ppid=2852 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.632000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff37859b40 a2=28 a3=0 items=0 ppid=2852 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.632000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff37859a50 a2=28 a3=0 items=0 ppid=2852 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.632000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff37859b60 a2=28 a3=0 items=0 ppid=2852 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.632000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff37859b40 a2=28 a3=0 items=0 ppid=2852 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.632000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff37859b30 a2=28 a3=0 items=0 ppid=2852 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.632000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff37859b60 a2=28 a3=0 items=0 ppid=2852 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.632000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff37859b40 a2=28 a3=0 items=0 ppid=2852 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.632000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff37859b60 a2=28 a3=0 items=0 ppid=2852 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.632000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff37859b30 a2=28 a3=0 items=0 ppid=2852 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.632000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff37859ba0 a2=28 a3=0 items=0 ppid=2852 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.632000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.632000 audit: BPF prog-id=102 op=LOAD Sep 6 00:24:23.632000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff37859a10 a2=94 a3=0 items=0 ppid=2852 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.632000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:23.632000 audit: BPF prog-id=102 op=UNLOAD Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff37859a00 a2=50 a3=2800 items=0 ppid=2852 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.633000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff37859a00 a2=50 a3=2800 items=0 ppid=2852 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.633000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit: BPF prog-id=103 op=LOAD Sep 6 00:24:23.633000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff37859220 a2=94 a3=2 items=0 ppid=2852 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.633000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:23.633000 audit: BPF prog-id=103 op=UNLOAD Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.633000 audit: BPF prog-id=104 op=LOAD Sep 6 00:24:23.633000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff37859320 a2=94 a3=30 items=0 ppid=2852 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.633000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:23.641000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.641000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.641000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.641000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.641000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.641000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.641000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.641000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.641000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.641000 audit: BPF prog-id=105 op=LOAD Sep 6 00:24:23.641000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd009d1fd0 a2=98 a3=0 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.641000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.641000 audit: BPF prog-id=105 op=UNLOAD Sep 6 00:24:23.642000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.642000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.642000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.642000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.642000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.642000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.642000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.642000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.642000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.642000 audit: BPF prog-id=106 op=LOAD Sep 6 00:24:23.642000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd009d1dc0 a2=94 a3=54428f items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.642000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.642000 audit: BPF prog-id=106 op=UNLOAD Sep 6 00:24:23.642000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.642000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.642000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.642000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.642000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.642000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.642000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.642000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.642000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.642000 audit: BPF prog-id=107 op=LOAD Sep 6 00:24:23.642000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd009d1df0 a2=94 a3=2 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.642000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.642000 audit: BPF prog-id=107 op=UNLOAD Sep 6 00:24:23.925000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.925000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.925000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.925000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.925000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.925000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.925000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.925000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.925000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.925000 audit: BPF prog-id=108 op=LOAD Sep 6 00:24:23.925000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd009d1cb0 a2=94 a3=1 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.925000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.926000 audit: BPF prog-id=108 op=UNLOAD Sep 6 00:24:23.926000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.926000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd009d1d80 a2=50 a3=7ffd009d1e60 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.926000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.947000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.947000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd009d1cc0 a2=28 a3=0 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.947000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.947000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd009d1cf0 a2=28 a3=0 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.947000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.947000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd009d1c00 a2=28 a3=0 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.947000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.947000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd009d1d10 a2=28 a3=0 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.947000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.947000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd009d1cf0 a2=28 a3=0 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.947000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.947000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd009d1ce0 a2=28 a3=0 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.947000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.947000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd009d1d10 a2=28 a3=0 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.947000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.947000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd009d1cf0 a2=28 a3=0 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.947000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.947000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd009d1d10 a2=28 a3=0 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.947000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.947000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd009d1ce0 a2=28 a3=0 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.947000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.947000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd009d1d50 a2=28 a3=0 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd009d1b00 a2=50 a3=1 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit: BPF prog-id=109 op=LOAD Sep 6 00:24:23.948000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd009d1b00 a2=94 a3=5 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.948000 audit: BPF prog-id=109 op=UNLOAD Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd009d1bb0 a2=50 a3=1 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd009d1cd0 a2=4 a3=38 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.948000 audit[2974]: AVC avc: denied { confidentiality } for pid=2974 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:24:23.948000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd009d1d20 a2=94 a3=6 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { confidentiality } for pid=2974 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:24:23.949000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd009d14d0 a2=94 a3=88 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.949000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.949000 audit[2974]: AVC avc: denied { confidentiality } for pid=2974 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:24:23.949000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd009d14d0 a2=94 a3=88 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.949000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.950000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.950000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd009d2f00 a2=10 a3=f8f00800 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.950000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.951000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.951000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd009d2da0 a2=10 a3=3 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.951000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.951000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.951000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd009d2d40 a2=10 a3=3 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.951000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.951000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.951000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd009d2d40 a2=10 a3=7 items=0 ppid=2852 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.951000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:23.958000 audit: BPF prog-id=104 op=UNLOAD Sep 6 00:24:24.128000 audit[3002]: NETFILTER_CFG table=mangle:77 family=2 entries=16 op=nft_register_chain pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:24:24.128000 audit[3002]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffebecd9dc0 a2=0 a3=7ffebecd9dac items=0 ppid=2852 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:24.128000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:24:24.162000 audit[3001]: NETFILTER_CFG table=nat:78 family=2 entries=15 op=nft_register_chain pid=3001 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:24:24.162000 audit[3001]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fffc48000c0 a2=0 a3=7fffc48000ac items=0 ppid=2852 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:24.162000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:24:24.181000 audit[3000]: NETFILTER_CFG table=raw:79 family=2 entries=21 op=nft_register_chain pid=3000 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:24:24.181000 audit[3000]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff69f38990 a2=0 a3=7fff69f3897c items=0 ppid=2852 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:24.181000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:24:24.193000 audit[3004]: NETFILTER_CFG table=filter:80 family=2 entries=73 op=nft_register_chain pid=3004 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:24:24.193000 audit[3004]: SYSCALL arch=c000003e syscall=46 success=yes exit=38580 a0=3 a1=7ffd9d5b0aa0 a2=0 a3=55d4e34f3000 items=0 ppid=2852 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:24.193000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:24:24.221933 systemd-networkd[1465]: cali5a94ac5ac18: Gained IPv6LL Sep 6 00:24:24.545835 kubelet[2124]: E0906 00:24:24.545410 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:25.317138 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount363309152.mount: Deactivated successfully. Sep 6 00:24:25.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:24:25.499125 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Sep 6 00:24:25.515000 audit: BPF prog-id=57 op=UNLOAD Sep 6 00:24:25.515000 audit: BPF prog-id=56 op=UNLOAD Sep 6 00:24:25.515000 audit: BPF prog-id=55 op=UNLOAD Sep 6 00:24:25.546463 kubelet[2124]: E0906 00:24:25.546385 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:25.567434 systemd-networkd[1465]: vxlan.calico: Gained IPv6LL Sep 6 00:24:26.547172 kubelet[2124]: E0906 00:24:26.547115 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:26.976302 env[1743]: time="2025-09-06T00:24:26.975969726Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:26.980067 env[1743]: time="2025-09-06T00:24:26.980023248Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:26.983288 env[1743]: time="2025-09-06T00:24:26.983245206Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:26.986361 env[1743]: time="2025-09-06T00:24:26.986321568Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:26.986738 env[1743]: time="2025-09-06T00:24:26.986706084Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 6 00:24:26.989594 env[1743]: time="2025-09-06T00:24:26.989373929Z" level=info msg="CreateContainer within sandbox \"88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 6 00:24:27.006949 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount730165153.mount: Deactivated successfully. Sep 6 00:24:27.016691 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount97983339.mount: Deactivated successfully. Sep 6 00:24:27.026162 env[1743]: time="2025-09-06T00:24:27.026096195Z" level=info msg="CreateContainer within sandbox \"88b61c3658d4e7014415488b1bb46d9a96dd37a9ffdae66091a086cd2cb42ba2\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"4bf4bc1248f5d51bc5cc3d1a706def3980208914ce6685a8c8433f244d7182f2\"" Sep 6 00:24:27.027055 env[1743]: time="2025-09-06T00:24:27.026859556Z" level=info msg="StartContainer for \"4bf4bc1248f5d51bc5cc3d1a706def3980208914ce6685a8c8433f244d7182f2\"" Sep 6 00:24:27.057582 systemd[1]: Started cri-containerd-4bf4bc1248f5d51bc5cc3d1a706def3980208914ce6685a8c8433f244d7182f2.scope. Sep 6 00:24:27.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.077000 audit: BPF prog-id=110 op=LOAD Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2769 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:27.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462663462633132343866356435316263356363336431613730366465 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2769 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:27.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462663462633132343866356435316263356363336431613730366465 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit: BPF prog-id=111 op=LOAD Sep 6 00:24:27.078000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a0980 items=0 ppid=2769 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:27.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462663462633132343866356435316263356363336431613730366465 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit: BPF prog-id=112 op=LOAD Sep 6 00:24:27.078000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a09c8 items=0 ppid=2769 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:27.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462663462633132343866356435316263356363336431613730366465 Sep 6 00:24:27.078000 audit: BPF prog-id=112 op=UNLOAD Sep 6 00:24:27.078000 audit: BPF prog-id=111 op=UNLOAD Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.078000 audit: BPF prog-id=113 op=LOAD Sep 6 00:24:27.078000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002a0dd8 items=0 ppid=2769 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:27.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462663462633132343866356435316263356363336431613730366465 Sep 6 00:24:27.100428 env[1743]: time="2025-09-06T00:24:27.100375824Z" level=info msg="StartContainer for \"4bf4bc1248f5d51bc5cc3d1a706def3980208914ce6685a8c8433f244d7182f2\" returns successfully" Sep 6 00:24:27.547764 kubelet[2124]: E0906 00:24:27.547716 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:27.749000 audit[3074]: NETFILTER_CFG table=filter:81 family=2 entries=12 op=nft_register_rule pid=3074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:27.749000 audit[3074]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffcb98d1d30 a2=0 a3=7ffcb98d1d1c items=0 ppid=2274 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:27.749000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:27.753000 audit[3074]: NETFILTER_CFG table=nat:82 family=2 entries=22 op=nft_register_rule pid=3074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:27.753000 audit[3074]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcb98d1d30 a2=0 a3=7ffcb98d1d1c items=0 ppid=2274 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:27.753000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:28.548120 kubelet[2124]: E0906 00:24:28.548080 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:28.747332 env[1743]: time="2025-09-06T00:24:28.747288648Z" level=info msg="StopPodSandbox for \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\"" Sep 6 00:24:28.821598 kubelet[2124]: I0906 00:24:28.821387 2124 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-ppps9" podStartSLOduration=4.189094918 podStartE2EDuration="8.821367379s" podCreationTimestamp="2025-09-06 00:24:20 +0000 UTC" firstStartedPulling="2025-09-06 00:24:22.355715949 +0000 UTC m=+20.846101831" lastFinishedPulling="2025-09-06 00:24:26.98798842 +0000 UTC m=+25.478374292" observedRunningTime="2025-09-06 00:24:27.886408596 +0000 UTC m=+26.376794487" watchObservedRunningTime="2025-09-06 00:24:28.821367379 +0000 UTC m=+27.311753269" Sep 6 00:24:28.934233 env[1743]: 2025-09-06 00:24:28.823 [INFO][3084] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Sep 6 00:24:28.934233 env[1743]: 2025-09-06 00:24:28.824 [INFO][3084] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" iface="eth0" netns="/var/run/netns/cni-f985db45-81b1-acfa-feca-8bcf41f66820" Sep 6 00:24:28.934233 env[1743]: 2025-09-06 00:24:28.824 [INFO][3084] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" iface="eth0" netns="/var/run/netns/cni-f985db45-81b1-acfa-feca-8bcf41f66820" Sep 6 00:24:28.934233 env[1743]: 2025-09-06 00:24:28.826 [INFO][3084] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" iface="eth0" netns="/var/run/netns/cni-f985db45-81b1-acfa-feca-8bcf41f66820" Sep 6 00:24:28.934233 env[1743]: 2025-09-06 00:24:28.826 [INFO][3084] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Sep 6 00:24:28.934233 env[1743]: 2025-09-06 00:24:28.826 [INFO][3084] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Sep 6 00:24:28.934233 env[1743]: 2025-09-06 00:24:28.908 [INFO][3091] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" HandleID="k8s-pod-network.fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Workload="172.31.25.70-k8s-csi--node--driver--54z95-eth0" Sep 6 00:24:28.934233 env[1743]: 2025-09-06 00:24:28.909 [INFO][3091] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:24:28.934233 env[1743]: 2025-09-06 00:24:28.909 [INFO][3091] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:24:28.934233 env[1743]: 2025-09-06 00:24:28.927 [WARNING][3091] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" HandleID="k8s-pod-network.fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Workload="172.31.25.70-k8s-csi--node--driver--54z95-eth0" Sep 6 00:24:28.934233 env[1743]: 2025-09-06 00:24:28.927 [INFO][3091] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" HandleID="k8s-pod-network.fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Workload="172.31.25.70-k8s-csi--node--driver--54z95-eth0" Sep 6 00:24:28.934233 env[1743]: 2025-09-06 00:24:28.931 [INFO][3091] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:24:28.934233 env[1743]: 2025-09-06 00:24:28.932 [INFO][3084] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Sep 6 00:24:28.936148 systemd[1]: run-netns-cni\x2df985db45\x2d81b1\x2dacfa\x2dfeca\x2d8bcf41f66820.mount: Deactivated successfully. Sep 6 00:24:28.937276 env[1743]: time="2025-09-06T00:24:28.937237045Z" level=info msg="TearDown network for sandbox \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\" successfully" Sep 6 00:24:28.937276 env[1743]: time="2025-09-06T00:24:28.937275117Z" level=info msg="StopPodSandbox for \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\" returns successfully" Sep 6 00:24:28.938132 env[1743]: time="2025-09-06T00:24:28.938098950Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-54z95,Uid:1e4a1408-0f6c-45df-8a6c-c73b95d01904,Namespace:calico-system,Attempt:1,}" Sep 6 00:24:29.189013 (udev-worker)[3121]: Network interface NamePolicy= disabled on kernel command line. Sep 6 00:24:29.189737 systemd-networkd[1465]: cali35394bb7bd9: Link UP Sep 6 00:24:29.192299 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali35394bb7bd9: link becomes ready Sep 6 00:24:29.191615 systemd-networkd[1465]: cali35394bb7bd9: Gained carrier Sep 6 00:24:29.212148 env[1743]: 2025-09-06 00:24:28.999 [INFO][3097] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.25.70-k8s-csi--node--driver--54z95-eth0 csi-node-driver- calico-system 1e4a1408-0f6c-45df-8a6c-c73b95d01904 1173 0 2025-09-06 00:24:03 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6c96d95cc7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.31.25.70 csi-node-driver-54z95 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali35394bb7bd9 [] [] }} ContainerID="59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934" Namespace="calico-system" Pod="csi-node-driver-54z95" WorkloadEndpoint="172.31.25.70-k8s-csi--node--driver--54z95-" Sep 6 00:24:29.212148 env[1743]: 2025-09-06 00:24:28.999 [INFO][3097] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934" Namespace="calico-system" Pod="csi-node-driver-54z95" WorkloadEndpoint="172.31.25.70-k8s-csi--node--driver--54z95-eth0" Sep 6 00:24:29.212148 env[1743]: 2025-09-06 00:24:29.043 [INFO][3110] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934" HandleID="k8s-pod-network.59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934" Workload="172.31.25.70-k8s-csi--node--driver--54z95-eth0" Sep 6 00:24:29.212148 env[1743]: 2025-09-06 00:24:29.044 [INFO][3110] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934" HandleID="k8s-pod-network.59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934" Workload="172.31.25.70-k8s-csi--node--driver--54z95-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c5640), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.25.70", "pod":"csi-node-driver-54z95", "timestamp":"2025-09-06 00:24:29.043956669 +0000 UTC"}, Hostname:"172.31.25.70", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:24:29.212148 env[1743]: 2025-09-06 00:24:29.044 [INFO][3110] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:24:29.212148 env[1743]: 2025-09-06 00:24:29.044 [INFO][3110] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:24:29.212148 env[1743]: 2025-09-06 00:24:29.044 [INFO][3110] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.25.70' Sep 6 00:24:29.212148 env[1743]: 2025-09-06 00:24:29.080 [INFO][3110] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934" host="172.31.25.70" Sep 6 00:24:29.212148 env[1743]: 2025-09-06 00:24:29.092 [INFO][3110] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.25.70" Sep 6 00:24:29.212148 env[1743]: 2025-09-06 00:24:29.100 [INFO][3110] ipam/ipam.go 511: Trying affinity for 192.168.14.0/26 host="172.31.25.70" Sep 6 00:24:29.212148 env[1743]: 2025-09-06 00:24:29.104 [INFO][3110] ipam/ipam.go 158: Attempting to load block cidr=192.168.14.0/26 host="172.31.25.70" Sep 6 00:24:29.212148 env[1743]: 2025-09-06 00:24:29.118 [INFO][3110] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.14.0/26 host="172.31.25.70" Sep 6 00:24:29.212148 env[1743]: 2025-09-06 00:24:29.118 [INFO][3110] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.14.0/26 handle="k8s-pod-network.59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934" host="172.31.25.70" Sep 6 00:24:29.212148 env[1743]: 2025-09-06 00:24:29.138 [INFO][3110] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934 Sep 6 00:24:29.212148 env[1743]: 2025-09-06 00:24:29.159 [INFO][3110] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.14.0/26 handle="k8s-pod-network.59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934" host="172.31.25.70" Sep 6 00:24:29.212148 env[1743]: 2025-09-06 00:24:29.178 [INFO][3110] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.14.2/26] block=192.168.14.0/26 handle="k8s-pod-network.59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934" host="172.31.25.70" Sep 6 00:24:29.212148 env[1743]: 2025-09-06 00:24:29.179 [INFO][3110] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.14.2/26] handle="k8s-pod-network.59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934" host="172.31.25.70" Sep 6 00:24:29.212148 env[1743]: 2025-09-06 00:24:29.179 [INFO][3110] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:24:29.212148 env[1743]: 2025-09-06 00:24:29.179 [INFO][3110] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.14.2/26] IPv6=[] ContainerID="59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934" HandleID="k8s-pod-network.59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934" Workload="172.31.25.70-k8s-csi--node--driver--54z95-eth0" Sep 6 00:24:29.213286 env[1743]: 2025-09-06 00:24:29.181 [INFO][3097] cni-plugin/k8s.go 418: Populated endpoint ContainerID="59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934" Namespace="calico-system" Pod="csi-node-driver-54z95" WorkloadEndpoint="172.31.25.70-k8s-csi--node--driver--54z95-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.25.70-k8s-csi--node--driver--54z95-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1e4a1408-0f6c-45df-8a6c-c73b95d01904", ResourceVersion:"1173", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 24, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.25.70", ContainerID:"", Pod:"csi-node-driver-54z95", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.14.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali35394bb7bd9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:24:29.213286 env[1743]: 2025-09-06 00:24:29.181 [INFO][3097] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.14.2/32] ContainerID="59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934" Namespace="calico-system" Pod="csi-node-driver-54z95" WorkloadEndpoint="172.31.25.70-k8s-csi--node--driver--54z95-eth0" Sep 6 00:24:29.213286 env[1743]: 2025-09-06 00:24:29.181 [INFO][3097] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali35394bb7bd9 ContainerID="59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934" Namespace="calico-system" Pod="csi-node-driver-54z95" WorkloadEndpoint="172.31.25.70-k8s-csi--node--driver--54z95-eth0" Sep 6 00:24:29.213286 env[1743]: 2025-09-06 00:24:29.189 [INFO][3097] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934" Namespace="calico-system" Pod="csi-node-driver-54z95" WorkloadEndpoint="172.31.25.70-k8s-csi--node--driver--54z95-eth0" Sep 6 00:24:29.213286 env[1743]: 2025-09-06 00:24:29.192 [INFO][3097] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934" Namespace="calico-system" Pod="csi-node-driver-54z95" WorkloadEndpoint="172.31.25.70-k8s-csi--node--driver--54z95-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.25.70-k8s-csi--node--driver--54z95-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1e4a1408-0f6c-45df-8a6c-c73b95d01904", ResourceVersion:"1173", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 24, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.25.70", ContainerID:"59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934", Pod:"csi-node-driver-54z95", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.14.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali35394bb7bd9", MAC:"b2:67:7a:a9:dd:a3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:24:29.213286 env[1743]: 2025-09-06 00:24:29.209 [INFO][3097] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934" Namespace="calico-system" Pod="csi-node-driver-54z95" WorkloadEndpoint="172.31.25.70-k8s-csi--node--driver--54z95-eth0" Sep 6 00:24:29.232600 env[1743]: time="2025-09-06T00:24:29.232494327Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:24:29.232834 env[1743]: time="2025-09-06T00:24:29.232793053Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:24:29.232971 env[1743]: time="2025-09-06T00:24:29.232946861Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:24:29.233269 env[1743]: time="2025-09-06T00:24:29.233232725Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934 pid=3143 runtime=io.containerd.runc.v2 Sep 6 00:24:29.237000 audit[3142]: NETFILTER_CFG table=filter:83 family=2 entries=42 op=nft_register_chain pid=3142 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:24:29.240856 kernel: kauditd_printk_skb: 601 callbacks suppressed Sep 6 00:24:29.240956 kernel: audit: type=1325 audit(1757118269.237:725): table=filter:83 family=2 entries=42 op=nft_register_chain pid=3142 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:24:29.237000 audit[3142]: SYSCALL arch=c000003e syscall=46 success=yes exit=22552 a0=3 a1=7ffcf890c3d0 a2=0 a3=7ffcf890c3bc items=0 ppid=2852 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:29.250537 kernel: audit: type=1300 audit(1757118269.237:725): arch=c000003e syscall=46 success=yes exit=22552 a0=3 a1=7ffcf890c3d0 a2=0 a3=7ffcf890c3bc items=0 ppid=2852 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:29.257758 kernel: audit: type=1327 audit(1757118269.237:725): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:24:29.237000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:24:29.272502 systemd[1]: run-containerd-runc-k8s.io-59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934-runc.vIrdVE.mount: Deactivated successfully. Sep 6 00:24:29.279504 systemd[1]: Started cri-containerd-59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934.scope. Sep 6 00:24:29.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.304865 kernel: audit: type=1400 audit(1757118269.294:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.304974 kernel: audit: type=1400 audit(1757118269.294:727): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.308737 kernel: audit: type=1400 audit(1757118269.294:728): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.312282 kernel: audit: type=1400 audit(1757118269.294:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.316326 kernel: audit: type=1400 audit(1757118269.294:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.329761 kernel: audit: type=1400 audit(1757118269.294:731): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.329889 kernel: audit: type=1400 audit(1757118269.294:732): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.295000 audit: BPF prog-id=114 op=LOAD Sep 6 00:24:29.295000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.295000 audit[3154]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3143 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:29.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539623835623561653236313466623236626239383437376531393062 Sep 6 00:24:29.295000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.295000 audit[3154]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3143 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:29.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539623835623561653236313466623236626239383437376531393062 Sep 6 00:24:29.295000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.295000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.295000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.295000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.295000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.295000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.295000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.295000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.295000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.295000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.295000 audit: BPF prog-id=115 op=LOAD Sep 6 00:24:29.295000 audit[3154]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000332fa0 items=0 ppid=3143 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:29.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539623835623561653236313466623236626239383437376531393062 Sep 6 00:24:29.300000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.300000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.300000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.300000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.300000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.300000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.300000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.300000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.300000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.300000 audit: BPF prog-id=116 op=LOAD Sep 6 00:24:29.300000 audit[3154]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000332fe8 items=0 ppid=3143 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:29.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539623835623561653236313466623236626239383437376531393062 Sep 6 00:24:29.300000 audit: BPF prog-id=116 op=UNLOAD Sep 6 00:24:29.300000 audit: BPF prog-id=115 op=UNLOAD Sep 6 00:24:29.300000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.300000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.300000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.300000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.300000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.300000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.300000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.300000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.300000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.300000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.300000 audit: BPF prog-id=117 op=LOAD Sep 6 00:24:29.300000 audit[3154]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003333f8 items=0 ppid=3143 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:29.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539623835623561653236313466623236626239383437376531393062 Sep 6 00:24:29.335694 env[1743]: time="2025-09-06T00:24:29.335653048Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-54z95,Uid:1e4a1408-0f6c-45df-8a6c-c73b95d01904,Namespace:calico-system,Attempt:1,} returns sandbox id \"59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934\"" Sep 6 00:24:29.338030 env[1743]: time="2025-09-06T00:24:29.337987716Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 6 00:24:29.549186 kubelet[2124]: E0906 00:24:29.549069 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:30.550182 kubelet[2124]: E0906 00:24:30.550139 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:30.850668 env[1743]: time="2025-09-06T00:24:30.850335825Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:30.852802 env[1743]: time="2025-09-06T00:24:30.852752039Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:30.856104 env[1743]: time="2025-09-06T00:24:30.856070523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:30.857833 env[1743]: time="2025-09-06T00:24:30.857801370Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:30.858271 env[1743]: time="2025-09-06T00:24:30.858246735Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7\"" Sep 6 00:24:30.860452 env[1743]: time="2025-09-06T00:24:30.860408525Z" level=info msg="CreateContainer within sandbox \"59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 6 00:24:30.876753 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount28672888.mount: Deactivated successfully. Sep 6 00:24:30.887212 env[1743]: time="2025-09-06T00:24:30.887154303Z" level=info msg="CreateContainer within sandbox \"59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"1cb1d39054455ed5bde9cc26d0bd1ac0bbb3fe9623f0400a1fb2a09c464ed27a\"" Sep 6 00:24:30.887731 env[1743]: time="2025-09-06T00:24:30.887698782Z" level=info msg="StartContainer for \"1cb1d39054455ed5bde9cc26d0bd1ac0bbb3fe9623f0400a1fb2a09c464ed27a\"" Sep 6 00:24:30.914352 systemd[1]: Started cri-containerd-1cb1d39054455ed5bde9cc26d0bd1ac0bbb3fe9623f0400a1fb2a09c464ed27a.scope. Sep 6 00:24:30.928000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.928000 audit[3187]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc0f57148d8 items=0 ppid=3143 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:30.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163623164333930353434353565643562646539636332366430626431 Sep 6 00:24:30.928000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.928000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.928000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.928000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.928000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.928000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.928000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.928000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.928000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.928000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.928000 audit: BPF prog-id=118 op=LOAD Sep 6 00:24:30.928000 audit[3187]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000356128 items=0 ppid=3143 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:30.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163623164333930353434353565643562646539636332366430626431 Sep 6 00:24:30.929000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.929000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.929000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.929000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.929000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.929000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.929000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.929000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.929000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.929000 audit: BPF prog-id=119 op=LOAD Sep 6 00:24:30.929000 audit[3187]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000356178 items=0 ppid=3143 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:30.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163623164333930353434353565643562646539636332366430626431 Sep 6 00:24:30.929000 audit: BPF prog-id=119 op=UNLOAD Sep 6 00:24:30.929000 audit: BPF prog-id=118 op=UNLOAD Sep 6 00:24:30.929000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.929000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.929000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.929000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.929000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.929000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.929000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.929000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.929000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.929000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:30.929000 audit: BPF prog-id=120 op=LOAD Sep 6 00:24:30.929000 audit[3187]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000356208 items=0 ppid=3143 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:30.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163623164333930353434353565643562646539636332366430626431 Sep 6 00:24:30.948486 env[1743]: time="2025-09-06T00:24:30.948412168Z" level=info msg="StartContainer for \"1cb1d39054455ed5bde9cc26d0bd1ac0bbb3fe9623f0400a1fb2a09c464ed27a\" returns successfully" Sep 6 00:24:30.950895 env[1743]: time="2025-09-06T00:24:30.950857129Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 6 00:24:31.072000 audit[3216]: NETFILTER_CFG table=filter:84 family=2 entries=12 op=nft_register_rule pid=3216 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:31.072000 audit[3216]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff903e02a0 a2=0 a3=7fff903e028c items=0 ppid=2274 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:31.072000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:31.077000 audit[3216]: NETFILTER_CFG table=nat:85 family=2 entries=34 op=nft_register_chain pid=3216 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:31.077000 audit[3216]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff903e02a0 a2=0 a3=7fff903e028c items=0 ppid=2274 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:31.077000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:31.261747 systemd-networkd[1465]: cali35394bb7bd9: Gained IPv6LL Sep 6 00:24:31.551454 kubelet[2124]: E0906 00:24:31.551310 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:31.575000 audit[3218]: NETFILTER_CFG table=filter:86 family=2 entries=11 op=nft_register_rule pid=3218 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:31.575000 audit[3218]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd64f707c0 a2=0 a3=7ffd64f707ac items=0 ppid=2274 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:31.575000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:31.581000 audit[3218]: NETFILTER_CFG table=nat:87 family=2 entries=29 op=nft_register_chain pid=3218 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:31.581000 audit[3218]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffd64f707c0 a2=0 a3=7ffd64f707ac items=0 ppid=2274 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:31.581000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:31.835754 amazon-ssm-agent[1719]: 2025-09-06 00:24:31 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Sep 6 00:24:32.522797 env[1743]: time="2025-09-06T00:24:32.522748596Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:32.528663 env[1743]: time="2025-09-06T00:24:32.528619385Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:32.530652 env[1743]: time="2025-09-06T00:24:32.530612862Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:32.532375 env[1743]: time="2025-09-06T00:24:32.532337244Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:32.532960 env[1743]: time="2025-09-06T00:24:32.532924632Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a\"" Sep 6 00:24:32.535721 env[1743]: time="2025-09-06T00:24:32.535684870Z" level=info msg="CreateContainer within sandbox \"59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 6 00:24:32.551617 kubelet[2124]: E0906 00:24:32.551583 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:32.561611 env[1743]: time="2025-09-06T00:24:32.561506110Z" level=info msg="CreateContainer within sandbox \"59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"f90bf17700421f53d74a158b26627d57b4d4b82124a32db1df08531f030f9f1d\"" Sep 6 00:24:32.562320 env[1743]: time="2025-09-06T00:24:32.562292564Z" level=info msg="StartContainer for \"f90bf17700421f53d74a158b26627d57b4d4b82124a32db1df08531f030f9f1d\"" Sep 6 00:24:32.584807 systemd[1]: Started cri-containerd-f90bf17700421f53d74a158b26627d57b4d4b82124a32db1df08531f030f9f1d.scope. Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit[3227]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f142943cb18 items=0 ppid=3143 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:32.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639306266313737303034323166353364373461313538623236363237 Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit: BPF prog-id=121 op=LOAD Sep 6 00:24:32.602000 audit[3227]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00028ae28 items=0 ppid=3143 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:32.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639306266313737303034323166353364373461313538623236363237 Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.602000 audit: BPF prog-id=122 op=LOAD Sep 6 00:24:32.602000 audit[3227]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00028ae78 items=0 ppid=3143 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:32.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639306266313737303034323166353364373461313538623236363237 Sep 6 00:24:32.603000 audit: BPF prog-id=122 op=UNLOAD Sep 6 00:24:32.603000 audit: BPF prog-id=121 op=UNLOAD Sep 6 00:24:32.603000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.603000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.603000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.603000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.603000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.603000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.603000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.603000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.603000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.603000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:32.603000 audit: BPF prog-id=123 op=LOAD Sep 6 00:24:32.603000 audit[3227]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00028af08 items=0 ppid=3143 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:32.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639306266313737303034323166353364373461313538623236363237 Sep 6 00:24:32.622917 env[1743]: time="2025-09-06T00:24:32.622868728Z" level=info msg="StartContainer for \"f90bf17700421f53d74a158b26627d57b4d4b82124a32db1df08531f030f9f1d\" returns successfully" Sep 6 00:24:32.699453 kubelet[2124]: I0906 00:24:32.698235 2124 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 6 00:24:32.699453 kubelet[2124]: I0906 00:24:32.698268 2124 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 6 00:24:33.551751 kubelet[2124]: E0906 00:24:33.551693 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:34.552924 kubelet[2124]: E0906 00:24:34.552871 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:34.689000 audit[3269]: NETFILTER_CFG table=filter:88 family=2 entries=9 op=nft_register_rule pid=3269 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:34.691623 kernel: kauditd_printk_skb: 148 callbacks suppressed Sep 6 00:24:34.691734 kernel: audit: type=1325 audit(1757118274.689:760): table=filter:88 family=2 entries=9 op=nft_register_rule pid=3269 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:34.689000 audit[3269]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd3685ae50 a2=0 a3=7ffd3685ae3c items=0 ppid=2274 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:34.699299 kernel: audit: type=1300 audit(1757118274.689:760): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd3685ae50 a2=0 a3=7ffd3685ae3c items=0 ppid=2274 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:34.699384 kernel: audit: type=1327 audit(1757118274.689:760): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:34.689000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:34.702000 audit[3269]: NETFILTER_CFG table=nat:89 family=2 entries=31 op=nft_register_chain pid=3269 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:34.702000 audit[3269]: SYSCALL arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7ffd3685ae50 a2=0 a3=7ffd3685ae3c items=0 ppid=2274 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:34.711573 kernel: audit: type=1325 audit(1757118274.702:761): table=nat:89 family=2 entries=31 op=nft_register_chain pid=3269 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:34.711658 kernel: audit: type=1300 audit(1757118274.702:761): arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7ffd3685ae50 a2=0 a3=7ffd3685ae3c items=0 ppid=2274 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:34.711701 kernel: audit: type=1327 audit(1757118274.702:761): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:34.702000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:35.553097 kubelet[2124]: E0906 00:24:35.553011 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:36.551028 kernel: audit: type=1325 audit(1757118276.542:762): table=filter:90 family=2 entries=20 op=nft_register_rule pid=3271 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:36.551183 kernel: audit: type=1300 audit(1757118276.542:762): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff77569920 a2=0 a3=7fff7756990c items=0 ppid=2274 pid=3271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:36.551227 kernel: audit: type=1327 audit(1757118276.542:762): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:36.542000 audit[3271]: NETFILTER_CFG table=filter:90 family=2 entries=20 op=nft_register_rule pid=3271 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:36.542000 audit[3271]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff77569920 a2=0 a3=7fff7756990c items=0 ppid=2274 pid=3271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:36.542000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:36.553872 kubelet[2124]: E0906 00:24:36.553817 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:36.554000 audit[3271]: NETFILTER_CFG table=nat:91 family=2 entries=26 op=nft_register_rule pid=3271 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:36.554000 audit[3271]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7fff77569920 a2=0 a3=0 items=0 ppid=2274 pid=3271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:36.554000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:36.558539 kernel: audit: type=1325 audit(1757118276.554:763): table=nat:91 family=2 entries=26 op=nft_register_rule pid=3271 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:36.576000 audit[3273]: NETFILTER_CFG table=filter:92 family=2 entries=32 op=nft_register_rule pid=3273 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:36.576000 audit[3273]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc3a5dab80 a2=0 a3=7ffc3a5dab6c items=0 ppid=2274 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:36.576000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:36.580000 audit[3273]: NETFILTER_CFG table=nat:93 family=2 entries=26 op=nft_register_rule pid=3273 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:36.580000 audit[3273]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffc3a5dab80 a2=0 a3=0 items=0 ppid=2274 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:36.580000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:36.904442 kubelet[2124]: I0906 00:24:36.904390 2124 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-54z95" podStartSLOduration=30.707537451 podStartE2EDuration="33.904375636s" podCreationTimestamp="2025-09-06 00:24:03 +0000 UTC" firstStartedPulling="2025-09-06 00:24:29.337393869 +0000 UTC m=+27.827779736" lastFinishedPulling="2025-09-06 00:24:32.534232041 +0000 UTC m=+31.024617921" observedRunningTime="2025-09-06 00:24:33.336134256 +0000 UTC m=+31.826520146" watchObservedRunningTime="2025-09-06 00:24:36.904375636 +0000 UTC m=+35.394761527" Sep 6 00:24:36.910323 systemd[1]: Created slice kubepods-besteffort-pod2fefb30e_d13c_42f7_86e8_5b6e74fb2b09.slice. Sep 6 00:24:36.936302 kubelet[2124]: I0906 00:24:36.936259 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/2fefb30e-d13c-42f7-86e8-5b6e74fb2b09-data\") pod \"nfs-server-provisioner-0\" (UID: \"2fefb30e-d13c-42f7-86e8-5b6e74fb2b09\") " pod="default/nfs-server-provisioner-0" Sep 6 00:24:36.936471 kubelet[2124]: I0906 00:24:36.936336 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p9hfs\" (UniqueName: \"kubernetes.io/projected/2fefb30e-d13c-42f7-86e8-5b6e74fb2b09-kube-api-access-p9hfs\") pod \"nfs-server-provisioner-0\" (UID: \"2fefb30e-d13c-42f7-86e8-5b6e74fb2b09\") " pod="default/nfs-server-provisioner-0" Sep 6 00:24:37.212926 env[1743]: time="2025-09-06T00:24:37.212818135Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:2fefb30e-d13c-42f7-86e8-5b6e74fb2b09,Namespace:default,Attempt:0,}" Sep 6 00:24:37.348005 systemd-networkd[1465]: cali60e51b789ff: Link UP Sep 6 00:24:37.350979 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:24:37.351063 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 6 00:24:37.351090 systemd-networkd[1465]: cali60e51b789ff: Gained carrier Sep 6 00:24:37.351833 (udev-worker)[3297]: Network interface NamePolicy= disabled on kernel command line. Sep 6 00:24:37.368220 env[1743]: 2025-09-06 00:24:37.267 [INFO][3276] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.25.70-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 2fefb30e-d13c-42f7-86e8-5b6e74fb2b09 1265 0 2025-09-06 00:24:36 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.25.70 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.25.70-k8s-nfs--server--provisioner--0-" Sep 6 00:24:37.368220 env[1743]: 2025-09-06 00:24:37.267 [INFO][3276] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.25.70-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:24:37.368220 env[1743]: 2025-09-06 00:24:37.299 [INFO][3289] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c" HandleID="k8s-pod-network.163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c" Workload="172.31.25.70-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:24:37.368220 env[1743]: 2025-09-06 00:24:37.299 [INFO][3289] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c" HandleID="k8s-pod-network.163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c" Workload="172.31.25.70-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000250ff0), Attrs:map[string]string{"namespace":"default", "node":"172.31.25.70", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-06 00:24:37.299181558 +0000 UTC"}, Hostname:"172.31.25.70", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:24:37.368220 env[1743]: 2025-09-06 00:24:37.299 [INFO][3289] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:24:37.368220 env[1743]: 2025-09-06 00:24:37.299 [INFO][3289] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:24:37.368220 env[1743]: 2025-09-06 00:24:37.299 [INFO][3289] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.25.70' Sep 6 00:24:37.368220 env[1743]: 2025-09-06 00:24:37.307 [INFO][3289] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c" host="172.31.25.70" Sep 6 00:24:37.368220 env[1743]: 2025-09-06 00:24:37.311 [INFO][3289] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.25.70" Sep 6 00:24:37.368220 env[1743]: 2025-09-06 00:24:37.316 [INFO][3289] ipam/ipam.go 511: Trying affinity for 192.168.14.0/26 host="172.31.25.70" Sep 6 00:24:37.368220 env[1743]: 2025-09-06 00:24:37.319 [INFO][3289] ipam/ipam.go 158: Attempting to load block cidr=192.168.14.0/26 host="172.31.25.70" Sep 6 00:24:37.368220 env[1743]: 2025-09-06 00:24:37.321 [INFO][3289] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.14.0/26 host="172.31.25.70" Sep 6 00:24:37.368220 env[1743]: 2025-09-06 00:24:37.321 [INFO][3289] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.14.0/26 handle="k8s-pod-network.163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c" host="172.31.25.70" Sep 6 00:24:37.368220 env[1743]: 2025-09-06 00:24:37.322 [INFO][3289] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c Sep 6 00:24:37.368220 env[1743]: 2025-09-06 00:24:37.328 [INFO][3289] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.14.0/26 handle="k8s-pod-network.163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c" host="172.31.25.70" Sep 6 00:24:37.368220 env[1743]: 2025-09-06 00:24:37.342 [INFO][3289] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.14.3/26] block=192.168.14.0/26 handle="k8s-pod-network.163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c" host="172.31.25.70" Sep 6 00:24:37.368220 env[1743]: 2025-09-06 00:24:37.342 [INFO][3289] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.14.3/26] handle="k8s-pod-network.163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c" host="172.31.25.70" Sep 6 00:24:37.368220 env[1743]: 2025-09-06 00:24:37.342 [INFO][3289] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:24:37.368220 env[1743]: 2025-09-06 00:24:37.342 [INFO][3289] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.14.3/26] IPv6=[] ContainerID="163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c" HandleID="k8s-pod-network.163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c" Workload="172.31.25.70-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:24:37.368884 env[1743]: 2025-09-06 00:24:37.344 [INFO][3276] cni-plugin/k8s.go 418: Populated endpoint ContainerID="163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.25.70-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.25.70-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"2fefb30e-d13c-42f7-86e8-5b6e74fb2b09", ResourceVersion:"1265", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 24, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.25.70", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.14.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:24:37.368884 env[1743]: 2025-09-06 00:24:37.344 [INFO][3276] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.14.3/32] ContainerID="163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.25.70-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:24:37.368884 env[1743]: 2025-09-06 00:24:37.344 [INFO][3276] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.25.70-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:24:37.368884 env[1743]: 2025-09-06 00:24:37.351 [INFO][3276] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.25.70-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:24:37.369055 env[1743]: 2025-09-06 00:24:37.351 [INFO][3276] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.25.70-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.25.70-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"2fefb30e-d13c-42f7-86e8-5b6e74fb2b09", ResourceVersion:"1265", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 24, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.25.70", ContainerID:"163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.14.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"86:c6:58:6e:f5:d8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:24:37.369055 env[1743]: 2025-09-06 00:24:37.366 [INFO][3276] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.25.70-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:24:37.379428 env[1743]: time="2025-09-06T00:24:37.379335071Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:24:37.379615 env[1743]: time="2025-09-06T00:24:37.379434090Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:24:37.379615 env[1743]: time="2025-09-06T00:24:37.379458631Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:24:37.379854 env[1743]: time="2025-09-06T00:24:37.379779264Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c pid=3312 runtime=io.containerd.runc.v2 Sep 6 00:24:37.394140 systemd[1]: Started cri-containerd-163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c.scope. Sep 6 00:24:37.405000 audit[3334]: NETFILTER_CFG table=filter:94 family=2 entries=40 op=nft_register_chain pid=3334 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:24:37.405000 audit[3334]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffffac12f20 a2=0 a3=7ffffac12f0c items=0 ppid=2852 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:37.405000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:24:37.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit: BPF prog-id=124 op=LOAD Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3312 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:37.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136333036346637663362643539393434386465303461666432376133 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3312 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:37.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136333036346637663362643539393434386465303461666432376133 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit: BPF prog-id=125 op=LOAD Sep 6 00:24:37.416000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000273e10 items=0 ppid=3312 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:37.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136333036346637663362643539393434386465303461666432376133 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit: BPF prog-id=126 op=LOAD Sep 6 00:24:37.416000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000273e58 items=0 ppid=3312 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:37.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136333036346637663362643539393434386465303461666432376133 Sep 6 00:24:37.416000 audit: BPF prog-id=126 op=UNLOAD Sep 6 00:24:37.416000 audit: BPF prog-id=125 op=UNLOAD Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:37.416000 audit: BPF prog-id=127 op=LOAD Sep 6 00:24:37.416000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e8268 items=0 ppid=3312 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:37.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136333036346637663362643539393434386465303461666432376133 Sep 6 00:24:37.449895 env[1743]: time="2025-09-06T00:24:37.449846029Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:2fefb30e-d13c-42f7-86e8-5b6e74fb2b09,Namespace:default,Attempt:0,} returns sandbox id \"163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c\"" Sep 6 00:24:37.451896 env[1743]: time="2025-09-06T00:24:37.451839087Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 6 00:24:37.554741 kubelet[2124]: E0906 00:24:37.554610 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:38.555398 kubelet[2124]: E0906 00:24:38.555333 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:39.390620 systemd-networkd[1465]: cali60e51b789ff: Gained IPv6LL Sep 6 00:24:39.572087 kubelet[2124]: E0906 00:24:39.572042 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:39.876321 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1593808952.mount: Deactivated successfully. Sep 6 00:24:40.426635 update_engine[1736]: I0906 00:24:40.426587 1736 update_attempter.cc:509] Updating boot flags... Sep 6 00:24:40.572574 kubelet[2124]: E0906 00:24:40.572506 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:41.573222 kubelet[2124]: E0906 00:24:41.573180 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:42.336034 env[1743]: time="2025-09-06T00:24:42.335975359Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:42.340314 env[1743]: time="2025-09-06T00:24:42.340262424Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:42.343627 env[1743]: time="2025-09-06T00:24:42.343584074Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:42.346623 env[1743]: time="2025-09-06T00:24:42.346582699Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:42.347422 env[1743]: time="2025-09-06T00:24:42.347386928Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Sep 6 00:24:42.393702 env[1743]: time="2025-09-06T00:24:42.393642119Z" level=info msg="CreateContainer within sandbox \"163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 6 00:24:42.412785 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount424300157.mount: Deactivated successfully. Sep 6 00:24:42.422436 env[1743]: time="2025-09-06T00:24:42.422374553Z" level=info msg="CreateContainer within sandbox \"163064f7f3bd599448de04afd27a34f2236ff8f0812be411845360e48182382c\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"5749c4c242da414ab17f28989de04b478d84b187dc8b206c26feec454a5c62fa\"" Sep 6 00:24:42.423114 env[1743]: time="2025-09-06T00:24:42.423079402Z" level=info msg="StartContainer for \"5749c4c242da414ab17f28989de04b478d84b187dc8b206c26feec454a5c62fa\"" Sep 6 00:24:42.460933 systemd[1]: Started cri-containerd-5749c4c242da414ab17f28989de04b478d84b187dc8b206c26feec454a5c62fa.scope. Sep 6 00:24:42.485440 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 6 00:24:42.485603 kernel: audit: type=1400 audit(1757118282.475:785): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.485658 kernel: audit: type=1400 audit(1757118282.475:786): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.493480 kernel: audit: type=1400 audit(1757118282.475:787): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.493617 kernel: audit: type=1400 audit(1757118282.475:788): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.497534 kernel: audit: type=1400 audit(1757118282.475:789): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.505448 kernel: audit: type=1400 audit(1757118282.475:790): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.505580 kernel: audit: type=1400 audit(1757118282.475:791): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.513536 kernel: audit: type=1400 audit(1757118282.475:792): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.514509 kubelet[2124]: E0906 00:24:42.514469 2124 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:42.521590 kernel: audit: type=1400 audit(1757118282.475:793): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.480000 audit: BPF prog-id=128 op=LOAD Sep 6 00:24:42.535201 kernel: audit: type=1400 audit(1757118282.480:794): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.480000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.480000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3312 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:42.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537343963346332343264613431346162313766323839383964653034 Sep 6 00:24:42.480000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.480000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3312 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:42.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537343963346332343264613431346162313766323839383964653034 Sep 6 00:24:42.480000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.480000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.480000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.480000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.480000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.480000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.480000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.480000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.480000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.480000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.480000 audit: BPF prog-id=129 op=LOAD Sep 6 00:24:42.480000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000339d70 items=0 ppid=3312 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:42.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537343963346332343264613431346162313766323839383964653034 Sep 6 00:24:42.483000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.483000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.483000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.483000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.483000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.483000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.483000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.483000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.483000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.483000 audit: BPF prog-id=130 op=LOAD Sep 6 00:24:42.483000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000339db8 items=0 ppid=3312 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:42.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537343963346332343264613431346162313766323839383964653034 Sep 6 00:24:42.484000 audit: BPF prog-id=130 op=UNLOAD Sep 6 00:24:42.484000 audit: BPF prog-id=129 op=UNLOAD Sep 6 00:24:42.484000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.484000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.484000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.484000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.484000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.484000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.484000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.484000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.484000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.484000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:42.484000 audit: BPF prog-id=131 op=LOAD Sep 6 00:24:42.484000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a41c8 items=0 ppid=3312 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:42.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537343963346332343264613431346162313766323839383964653034 Sep 6 00:24:42.537505 env[1743]: time="2025-09-06T00:24:42.536349607Z" level=info msg="StartContainer for \"5749c4c242da414ab17f28989de04b478d84b187dc8b206c26feec454a5c62fa\" returns successfully" Sep 6 00:24:42.573367 kubelet[2124]: E0906 00:24:42.573323 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:42.583000 audit[3570]: AVC avc: denied { search } for pid=3570 comm="rpcbind" name="crypto" dev="proc" ino=23805 scontext=system_u:system_r:svirt_lxc_net_t:s0:c693,c997 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 00:24:42.583000 audit[3570]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f68be5cb0c0 a2=0 a3=0 items=0 ppid=3554 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c693,c997 key=(null) Sep 6 00:24:42.583000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 6 00:24:42.624000 audit[3576]: AVC avc: denied { search } for pid=3576 comm="dbus-daemon" name="crypto" dev="proc" ino=23805 scontext=system_u:system_r:svirt_lxc_net_t:s0:c693,c997 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 00:24:42.624000 audit[3576]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb323be70c0 a2=0 a3=0 items=0 ppid=3554 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c693,c997 key=(null) Sep 6 00:24:42.624000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 6 00:24:42.629000 audit[3577]: AVC avc: denied { watch } for pid=3577 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537423 scontext=system_u:system_r:svirt_lxc_net_t:s0:c693,c997 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c693,c997 tclass=dir permissive=0 Sep 6 00:24:42.629000 audit[3577]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55b38d337530 a2=2c8 a3=7ffca664df7c items=0 ppid=3554 pid=3577 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c693,c997 key=(null) Sep 6 00:24:42.629000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 6 00:24:42.634000 audit[3578]: AVC avc: denied { read } for pid=3578 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23254 scontext=system_u:system_r:svirt_lxc_net_t:s0:c693,c997 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 6 00:24:42.634000 audit[3578]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f63df4c1320 a1=80000 a2=d a3=7ffe6c71f320 items=0 ppid=3554 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c693,c997 key=(null) Sep 6 00:24:42.634000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 6 00:24:42.636000 audit[3578]: AVC avc: denied { search } for pid=3578 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23805 scontext=system_u:system_r:svirt_lxc_net_t:s0:c693,c997 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 00:24:42.636000 audit[3578]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f63dea150c0 a2=0 a3=0 items=0 ppid=3554 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c693,c997 key=(null) Sep 6 00:24:42.636000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 6 00:24:42.972453 kubelet[2124]: I0906 00:24:42.972277 2124 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.067016311 podStartE2EDuration="6.972257144s" podCreationTimestamp="2025-09-06 00:24:36 +0000 UTC" firstStartedPulling="2025-09-06 00:24:37.451388659 +0000 UTC m=+35.941774541" lastFinishedPulling="2025-09-06 00:24:42.356629496 +0000 UTC m=+40.847015374" observedRunningTime="2025-09-06 00:24:42.972213493 +0000 UTC m=+41.462599383" watchObservedRunningTime="2025-09-06 00:24:42.972257144 +0000 UTC m=+41.462643034" Sep 6 00:24:42.992000 audit[3583]: NETFILTER_CFG table=filter:95 family=2 entries=20 op=nft_register_rule pid=3583 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:42.992000 audit[3583]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc5d67ea40 a2=0 a3=7ffc5d67ea2c items=0 ppid=2274 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:42.992000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:42.999000 audit[3583]: NETFILTER_CFG table=nat:96 family=2 entries=110 op=nft_register_chain pid=3583 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:42.999000 audit[3583]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffc5d67ea40 a2=0 a3=7ffc5d67ea2c items=0 ppid=2274 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:42.999000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:43.573816 kubelet[2124]: E0906 00:24:43.573763 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:44.575790 kubelet[2124]: E0906 00:24:44.575751 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:45.576701 kubelet[2124]: E0906 00:24:45.576624 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:46.577192 kubelet[2124]: E0906 00:24:46.577122 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:47.577984 kubelet[2124]: E0906 00:24:47.577919 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:48.579057 kubelet[2124]: E0906 00:24:48.579018 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:49.580068 kubelet[2124]: E0906 00:24:49.580016 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:50.580482 kubelet[2124]: E0906 00:24:50.580439 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:51.580839 kubelet[2124]: E0906 00:24:51.580798 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:52.581383 kubelet[2124]: E0906 00:24:52.581342 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:53.582013 kubelet[2124]: E0906 00:24:53.581963 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:54.582564 kubelet[2124]: E0906 00:24:54.582491 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:55.582895 kubelet[2124]: E0906 00:24:55.582854 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:56.583791 kubelet[2124]: E0906 00:24:56.583742 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:57.584788 kubelet[2124]: E0906 00:24:57.584747 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:58.585326 kubelet[2124]: E0906 00:24:58.585285 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:59.586083 kubelet[2124]: E0906 00:24:59.586027 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:00.587241 kubelet[2124]: E0906 00:25:00.587184 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:01.587890 kubelet[2124]: E0906 00:25:01.587828 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:02.501860 kubelet[2124]: E0906 00:25:02.501744 2124 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:02.588092 kubelet[2124]: E0906 00:25:02.588040 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:02.609315 env[1743]: time="2025-09-06T00:25:02.609254974Z" level=info msg="StopPodSandbox for \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\"" Sep 6 00:25:02.952276 env[1743]: 2025-09-06 00:25:02.774 [WARNING][3667] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.25.70-k8s-csi--node--driver--54z95-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1e4a1408-0f6c-45df-8a6c-c73b95d01904", ResourceVersion:"1219", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 24, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.25.70", ContainerID:"59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934", Pod:"csi-node-driver-54z95", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.14.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali35394bb7bd9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:25:02.952276 env[1743]: 2025-09-06 00:25:02.774 [INFO][3667] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Sep 6 00:25:02.952276 env[1743]: 2025-09-06 00:25:02.774 [INFO][3667] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" iface="eth0" netns="" Sep 6 00:25:02.952276 env[1743]: 2025-09-06 00:25:02.774 [INFO][3667] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Sep 6 00:25:02.952276 env[1743]: 2025-09-06 00:25:02.774 [INFO][3667] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Sep 6 00:25:02.952276 env[1743]: 2025-09-06 00:25:02.803 [INFO][3676] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" HandleID="k8s-pod-network.fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Workload="172.31.25.70-k8s-csi--node--driver--54z95-eth0" Sep 6 00:25:02.952276 env[1743]: 2025-09-06 00:25:02.803 [INFO][3676] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:25:02.952276 env[1743]: 2025-09-06 00:25:02.803 [INFO][3676] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:25:02.952276 env[1743]: 2025-09-06 00:25:02.924 [WARNING][3676] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" HandleID="k8s-pod-network.fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Workload="172.31.25.70-k8s-csi--node--driver--54z95-eth0" Sep 6 00:25:02.952276 env[1743]: 2025-09-06 00:25:02.924 [INFO][3676] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" HandleID="k8s-pod-network.fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Workload="172.31.25.70-k8s-csi--node--driver--54z95-eth0" Sep 6 00:25:02.952276 env[1743]: 2025-09-06 00:25:02.949 [INFO][3676] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:25:02.952276 env[1743]: 2025-09-06 00:25:02.950 [INFO][3667] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Sep 6 00:25:02.952983 env[1743]: time="2025-09-06T00:25:02.952311594Z" level=info msg="TearDown network for sandbox \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\" successfully" Sep 6 00:25:02.952983 env[1743]: time="2025-09-06T00:25:02.952345320Z" level=info msg="StopPodSandbox for \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\" returns successfully" Sep 6 00:25:02.952983 env[1743]: time="2025-09-06T00:25:02.952960328Z" level=info msg="RemovePodSandbox for \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\"" Sep 6 00:25:02.953111 env[1743]: time="2025-09-06T00:25:02.953001601Z" level=info msg="Forcibly stopping sandbox \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\"" Sep 6 00:25:03.157286 env[1743]: 2025-09-06 00:25:03.097 [WARNING][3692] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.25.70-k8s-csi--node--driver--54z95-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1e4a1408-0f6c-45df-8a6c-c73b95d01904", ResourceVersion:"1219", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 24, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.25.70", ContainerID:"59b85b5ae2614fb26bb98477e190b8514775e1d48e88b6eff559afcc11b2c934", Pod:"csi-node-driver-54z95", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.14.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali35394bb7bd9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:25:03.157286 env[1743]: 2025-09-06 00:25:03.098 [INFO][3692] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Sep 6 00:25:03.157286 env[1743]: 2025-09-06 00:25:03.098 [INFO][3692] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" iface="eth0" netns="" Sep 6 00:25:03.157286 env[1743]: 2025-09-06 00:25:03.098 [INFO][3692] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Sep 6 00:25:03.157286 env[1743]: 2025-09-06 00:25:03.098 [INFO][3692] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Sep 6 00:25:03.157286 env[1743]: 2025-09-06 00:25:03.125 [INFO][3699] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" HandleID="k8s-pod-network.fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Workload="172.31.25.70-k8s-csi--node--driver--54z95-eth0" Sep 6 00:25:03.157286 env[1743]: 2025-09-06 00:25:03.125 [INFO][3699] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:25:03.157286 env[1743]: 2025-09-06 00:25:03.125 [INFO][3699] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:25:03.157286 env[1743]: 2025-09-06 00:25:03.150 [WARNING][3699] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" HandleID="k8s-pod-network.fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Workload="172.31.25.70-k8s-csi--node--driver--54z95-eth0" Sep 6 00:25:03.157286 env[1743]: 2025-09-06 00:25:03.150 [INFO][3699] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" HandleID="k8s-pod-network.fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Workload="172.31.25.70-k8s-csi--node--driver--54z95-eth0" Sep 6 00:25:03.157286 env[1743]: 2025-09-06 00:25:03.154 [INFO][3699] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:25:03.157286 env[1743]: 2025-09-06 00:25:03.156 [INFO][3692] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c" Sep 6 00:25:03.157875 env[1743]: time="2025-09-06T00:25:03.157312446Z" level=info msg="TearDown network for sandbox \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\" successfully" Sep 6 00:25:03.162003 env[1743]: time="2025-09-06T00:25:03.161942962Z" level=info msg="RemovePodSandbox \"fe189eaafab6578a62c6f97691ce9236f962fec1a9726cab606b8e1f827d734c\" returns successfully" Sep 6 00:25:03.588466 kubelet[2124]: E0906 00:25:03.588427 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:04.588821 kubelet[2124]: E0906 00:25:04.588787 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:05.589908 kubelet[2124]: E0906 00:25:05.589835 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:06.590568 kubelet[2124]: E0906 00:25:06.590512 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:07.591314 kubelet[2124]: E0906 00:25:07.591271 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:07.761912 systemd[1]: Created slice kubepods-besteffort-poda68a1b70_3081_4c39_92e0_ce01de005b87.slice. Sep 6 00:25:07.958770 kubelet[2124]: I0906 00:25:07.958497 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kv56s\" (UniqueName: \"kubernetes.io/projected/a68a1b70-3081-4c39-92e0-ce01de005b87-kube-api-access-kv56s\") pod \"test-pod-1\" (UID: \"a68a1b70-3081-4c39-92e0-ce01de005b87\") " pod="default/test-pod-1" Sep 6 00:25:07.958770 kubelet[2124]: I0906 00:25:07.958586 2124 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-810f1a94-8f30-4dc8-9224-1b1223676d3b\" (UniqueName: \"kubernetes.io/nfs/a68a1b70-3081-4c39-92e0-ce01de005b87-pvc-810f1a94-8f30-4dc8-9224-1b1223676d3b\") pod \"test-pod-1\" (UID: \"a68a1b70-3081-4c39-92e0-ce01de005b87\") " pod="default/test-pod-1" Sep 6 00:25:08.111225 kernel: Failed to create system directory netfs Sep 6 00:25:08.111434 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 6 00:25:08.111463 kernel: audit: type=1400 audit(1757118308.099:810): avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.111488 kernel: Failed to create system directory netfs Sep 6 00:25:08.111505 kernel: audit: type=1400 audit(1757118308.099:810): avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.111548 kernel: Failed to create system directory netfs Sep 6 00:25:08.099000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.099000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.118101 kernel: audit: type=1400 audit(1757118308.099:810): avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.118195 kernel: Failed to create system directory netfs Sep 6 00:25:08.099000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.130408 kernel: audit: type=1400 audit(1757118308.099:810): avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.099000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.099000 audit[3716]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d9cb2585e0 a1=153bc a2=55d9c05462b0 a3=5 items=0 ppid=55 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:08.099000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:25:08.141784 kernel: audit: type=1300 audit(1757118308.099:810): arch=c000003e syscall=175 success=yes exit=0 a0=55d9cb2585e0 a1=153bc a2=55d9c05462b0 a3=5 items=0 ppid=55 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:08.141894 kernel: audit: type=1327 audit(1757118308.099:810): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:25:08.143000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.155811 kernel: Failed to create system directory fscache Sep 6 00:25:08.155897 kernel: audit: type=1400 audit(1757118308.143:811): avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.155941 kernel: Failed to create system directory fscache Sep 6 00:25:08.155959 kernel: audit: type=1400 audit(1757118308.143:811): avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.143000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.162736 kernel: Failed to create system directory fscache Sep 6 00:25:08.162829 kernel: audit: type=1400 audit(1757118308.143:811): avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.143000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.169503 kernel: Failed to create system directory fscache Sep 6 00:25:08.169595 kernel: audit: type=1400 audit(1757118308.143:811): avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.143000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.143000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.175651 kernel: Failed to create system directory fscache Sep 6 00:25:08.143000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.177915 kernel: Failed to create system directory fscache Sep 6 00:25:08.177980 kernel: Failed to create system directory fscache Sep 6 00:25:08.143000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.143000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.181193 kernel: Failed to create system directory fscache Sep 6 00:25:08.181261 kernel: Failed to create system directory fscache Sep 6 00:25:08.143000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.143000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.184098 kernel: Failed to create system directory fscache Sep 6 00:25:08.184189 kernel: Failed to create system directory fscache Sep 6 00:25:08.143000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.143000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.186977 kernel: Failed to create system directory fscache Sep 6 00:25:08.187055 kernel: Failed to create system directory fscache Sep 6 00:25:08.143000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.143000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.189734 kernel: Failed to create system directory fscache Sep 6 00:25:08.192549 kernel: FS-Cache: Loaded Sep 6 00:25:08.143000 audit[3716]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d9cb46d9c0 a1=4c0fc a2=55d9c05462b0 a3=5 items=0 ppid=55 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:08.143000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.234940 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.235067 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.235104 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.237677 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.237752 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.240370 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.240444 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.242883 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.242974 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.245290 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.245359 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.247692 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.247771 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.249991 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.250054 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.252201 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.252286 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.254598 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.254654 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.256575 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.257649 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.257719 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.259691 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.259756 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.261603 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.261653 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.264491 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.264578 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.264622 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.266420 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.266474 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.268261 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.268322 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.270118 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.270176 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.271964 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.272026 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.273756 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.273816 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.275694 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.275744 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.278395 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.278464 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.278494 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.280263 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.280336 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.282115 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.282174 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.283951 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.284012 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.285796 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.285875 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.287638 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.287692 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.288553 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.290369 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.290426 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.292182 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.292223 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.293999 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.294043 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.295061 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.296824 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.296880 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.298664 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.298710 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.301362 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.301418 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.301447 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.303173 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.303228 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.304153 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.305958 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.306004 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.307801 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.307844 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.309645 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.309696 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.312407 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.312460 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.312498 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.314266 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.314386 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.316063 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.316142 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.317868 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.317930 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.319713 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.319786 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.322469 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.322558 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.322594 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.324294 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.324369 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.326144 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.326268 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.327957 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.328015 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.329787 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.329846 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.331655 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.331727 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.333463 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.333538 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.335335 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.335398 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.337178 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.337247 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.338990 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.339053 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.340795 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.340857 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.342610 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.342682 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.344396 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.344458 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.346275 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.346338 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.348050 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.348110 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.349844 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.349903 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.351657 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.351717 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.353463 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.353539 kernel: Failed to create system directory sunrpc Sep 6 00:25:08.217000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.365012 kernel: RPC: Registered named UNIX socket transport module. Sep 6 00:25:08.365152 kernel: RPC: Registered udp transport module. Sep 6 00:25:08.365191 kernel: RPC: Registered tcp transport module. Sep 6 00:25:08.366886 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 6 00:25:08.217000 audit[3716]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d9cb4b9ad0 a1=1a81bc a2=55d9c05462b0 a3=5 items=6 ppid=55 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:08.217000 audit: CWD cwd="/" Sep 6 00:25:08.217000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:08.217000 audit: PATH item=1 name=(null) inode=24632 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:08.217000 audit: PATH item=2 name=(null) inode=24632 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:08.217000 audit: PATH item=3 name=(null) inode=24633 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:08.217000 audit: PATH item=4 name=(null) inode=24632 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:08.217000 audit: PATH item=5 name=(null) inode=24634 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:08.217000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.415383 kernel: Failed to create system directory nfs Sep 6 00:25:08.415449 kernel: Failed to create system directory nfs Sep 6 00:25:08.415483 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.416123 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.417033 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.417870 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.419937 kernel: Failed to create system directory nfs Sep 6 00:25:08.420002 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.421765 kernel: Failed to create system directory nfs Sep 6 00:25:08.421832 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.423613 kernel: Failed to create system directory nfs Sep 6 00:25:08.423682 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.425431 kernel: Failed to create system directory nfs Sep 6 00:25:08.425499 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.427306 kernel: Failed to create system directory nfs Sep 6 00:25:08.427373 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.429177 kernel: Failed to create system directory nfs Sep 6 00:25:08.429240 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.431049 kernel: Failed to create system directory nfs Sep 6 00:25:08.431124 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.432881 kernel: Failed to create system directory nfs Sep 6 00:25:08.432941 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.434751 kernel: Failed to create system directory nfs Sep 6 00:25:08.434820 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.436594 kernel: Failed to create system directory nfs Sep 6 00:25:08.436667 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.438442 kernel: Failed to create system directory nfs Sep 6 00:25:08.438509 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.440275 kernel: Failed to create system directory nfs Sep 6 00:25:08.440337 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.442086 kernel: Failed to create system directory nfs Sep 6 00:25:08.442162 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.443925 kernel: Failed to create system directory nfs Sep 6 00:25:08.443969 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.445754 kernel: Failed to create system directory nfs Sep 6 00:25:08.445828 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.448402 kernel: Failed to create system directory nfs Sep 6 00:25:08.448454 kernel: Failed to create system directory nfs Sep 6 00:25:08.448510 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.450139 kernel: Failed to create system directory nfs Sep 6 00:25:08.450263 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.452128 kernel: Failed to create system directory nfs Sep 6 00:25:08.452177 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.453819 kernel: Failed to create system directory nfs Sep 6 00:25:08.453867 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.455640 kernel: Failed to create system directory nfs Sep 6 00:25:08.455685 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.457365 kernel: Failed to create system directory nfs Sep 6 00:25:08.457405 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.459220 kernel: Failed to create system directory nfs Sep 6 00:25:08.459264 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.460965 kernel: Failed to create system directory nfs Sep 6 00:25:08.461016 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.462822 kernel: Failed to create system directory nfs Sep 6 00:25:08.462902 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.465629 kernel: Failed to create system directory nfs Sep 6 00:25:08.465717 kernel: Failed to create system directory nfs Sep 6 00:25:08.465745 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.467317 kernel: Failed to create system directory nfs Sep 6 00:25:08.467406 kernel: Failed to create system directory nfs Sep 6 00:25:08.402000 audit[3716]: AVC avc: denied { confidentiality } for pid=3716 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.488680 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 6 00:25:08.402000 audit[3716]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d9cb6daaf0 a1=16f02c a2=55d9c05462b0 a3=5 items=0 ppid=55 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:08.402000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.543160 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.543275 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.543310 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.544995 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.545064 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.546806 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.546891 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.548616 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.548694 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.550434 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.550479 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.552242 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.552316 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.554093 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.555272 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.555347 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.556290 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.557226 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.558152 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.559097 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.560021 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.560952 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.561879 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.562835 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.563811 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.565726 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.565774 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.566593 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.568409 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.568450 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.569324 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.570280 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.571202 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.572144 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.573972 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.574025 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.575048 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.576838 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.576881 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.577753 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.578693 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.579579 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.581328 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.581369 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.582341 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.583171 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.584085 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.585814 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.585866 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.586746 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.587645 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.589417 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.589462 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.590318 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.591228 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.592259 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.592376 kubelet[2124]: E0906 00:25:08.592195 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.594047 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.594088 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.594973 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.595893 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.596797 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.597693 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.600328 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.600370 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.600413 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.601222 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.603057 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.603098 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.603982 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.605776 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.605819 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.606681 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.607590 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.609271 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.609311 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.610158 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.611072 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.612838 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.612878 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.614708 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.614753 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.617427 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.617484 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.617544 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.618327 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.619228 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.620096 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.620996 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.621887 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.622783 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.624631 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.624711 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.626421 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.626463 kernel: Failed to create system directory nfs4 Sep 6 00:25:08.524000 audit[3721]: AVC avc: denied { confidentiality } for pid=3721 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.755472 kernel: NFS: Registering the id_resolver key type Sep 6 00:25:08.755661 kernel: Key type id_resolver registered Sep 6 00:25:08.755691 kernel: Key type id_legacy registered Sep 6 00:25:08.524000 audit[3721]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f52ea85b010 a1=20955c a2=561864bfc2b0 a3=5 items=0 ppid=55 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:08.524000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.774781 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.774862 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.774889 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.776673 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.776739 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.779575 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.779644 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.779691 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.781532 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.781581 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.783429 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.783478 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.785266 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.785351 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.787192 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.787267 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.789022 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.789094 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.790898 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.790945 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.792779 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.792857 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.794785 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.794832 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.796612 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.796657 kernel: Failed to create system directory rpcgss Sep 6 00:25:08.768000 audit[3722]: AVC avc: denied { confidentiality } for pid=3722 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:08.768000 audit[3722]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f2ff32fa010 a1=70bac a2=55f62fd032b0 a3=5 items=0 ppid=55 pid=3722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:08.768000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 6 00:25:08.825187 nfsidmap[3729]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Sep 6 00:25:08.828968 nfsidmap[3730]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Sep 6 00:25:08.840000 audit[1928]: AVC avc: denied { watch_reads } for pid=1928 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2876 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:25:08.840000 audit[1928]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55845328a590 a2=10 a3=56c2c3aa25471a8b items=0 ppid=1 pid=1928 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:08.840000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 00:25:08.840000 audit[1928]: AVC avc: denied { watch_reads } for pid=1928 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2876 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:25:08.840000 audit[1928]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55845328a590 a2=10 a3=56c2c3aa25471a8b items=0 ppid=1 pid=1928 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:08.840000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 00:25:08.840000 audit[1928]: AVC avc: denied { watch_reads } for pid=1928 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2876 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:25:08.840000 audit[1928]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55845328a590 a2=10 a3=56c2c3aa25471a8b items=0 ppid=1 pid=1928 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:08.840000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 00:25:08.840000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2876 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:25:08.841000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2876 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:25:08.841000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2876 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:25:08.965905 env[1743]: time="2025-09-06T00:25:08.965849100Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:a68a1b70-3081-4c39-92e0-ce01de005b87,Namespace:default,Attempt:0,}" Sep 6 00:25:09.146854 (udev-worker)[3717]: Network interface NamePolicy= disabled on kernel command line. Sep 6 00:25:09.148491 systemd-networkd[1465]: cali5ec59c6bf6e: Link UP Sep 6 00:25:09.152594 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:25:09.152734 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 6 00:25:09.152259 systemd-networkd[1465]: cali5ec59c6bf6e: Gained carrier Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.040 [INFO][3731] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.25.70-k8s-test--pod--1-eth0 default a68a1b70-3081-4c39-92e0-ce01de005b87 1372 0 2025-09-06 00:24:38 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.25.70 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.25.70-k8s-test--pod--1-" Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.041 [INFO][3731] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.25.70-k8s-test--pod--1-eth0" Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.074 [INFO][3745] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4" HandleID="k8s-pod-network.205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4" Workload="172.31.25.70-k8s-test--pod--1-eth0" Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.074 [INFO][3745] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4" HandleID="k8s-pod-network.205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4" Workload="172.31.25.70-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000251100), Attrs:map[string]string{"namespace":"default", "node":"172.31.25.70", "pod":"test-pod-1", "timestamp":"2025-09-06 00:25:09.074548418 +0000 UTC"}, Hostname:"172.31.25.70", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.074 [INFO][3745] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.074 [INFO][3745] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.074 [INFO][3745] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.25.70' Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.092 [INFO][3745] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4" host="172.31.25.70" Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.102 [INFO][3745] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.25.70" Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.117 [INFO][3745] ipam/ipam.go 511: Trying affinity for 192.168.14.0/26 host="172.31.25.70" Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.119 [INFO][3745] ipam/ipam.go 158: Attempting to load block cidr=192.168.14.0/26 host="172.31.25.70" Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.122 [INFO][3745] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.14.0/26 host="172.31.25.70" Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.122 [INFO][3745] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.14.0/26 handle="k8s-pod-network.205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4" host="172.31.25.70" Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.124 [INFO][3745] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4 Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.132 [INFO][3745] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.14.0/26 handle="k8s-pod-network.205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4" host="172.31.25.70" Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.143 [INFO][3745] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.14.4/26] block=192.168.14.0/26 handle="k8s-pod-network.205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4" host="172.31.25.70" Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.143 [INFO][3745] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.14.4/26] handle="k8s-pod-network.205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4" host="172.31.25.70" Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.143 [INFO][3745] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.143 [INFO][3745] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.14.4/26] IPv6=[] ContainerID="205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4" HandleID="k8s-pod-network.205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4" Workload="172.31.25.70-k8s-test--pod--1-eth0" Sep 6 00:25:09.167669 env[1743]: 2025-09-06 00:25:09.144 [INFO][3731] cni-plugin/k8s.go 418: Populated endpoint ContainerID="205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.25.70-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.25.70-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"a68a1b70-3081-4c39-92e0-ce01de005b87", ResourceVersion:"1372", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 24, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.25.70", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.14.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:25:09.168907 env[1743]: 2025-09-06 00:25:09.144 [INFO][3731] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.14.4/32] ContainerID="205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.25.70-k8s-test--pod--1-eth0" Sep 6 00:25:09.168907 env[1743]: 2025-09-06 00:25:09.144 [INFO][3731] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.25.70-k8s-test--pod--1-eth0" Sep 6 00:25:09.168907 env[1743]: 2025-09-06 00:25:09.153 [INFO][3731] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.25.70-k8s-test--pod--1-eth0" Sep 6 00:25:09.168907 env[1743]: 2025-09-06 00:25:09.153 [INFO][3731] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.25.70-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.25.70-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"a68a1b70-3081-4c39-92e0-ce01de005b87", ResourceVersion:"1372", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 24, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.25.70", ContainerID:"205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.14.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"ca:5c:7b:0e:33:f4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:25:09.168907 env[1743]: 2025-09-06 00:25:09.165 [INFO][3731] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.25.70-k8s-test--pod--1-eth0" Sep 6 00:25:09.185882 env[1743]: time="2025-09-06T00:25:09.185809863Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:25:09.186135 env[1743]: time="2025-09-06T00:25:09.186100931Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:25:09.186290 env[1743]: time="2025-09-06T00:25:09.186265843Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:25:09.186560 env[1743]: time="2025-09-06T00:25:09.186508566Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4 pid=3765 runtime=io.containerd.runc.v2 Sep 6 00:25:09.197000 audit[3774]: NETFILTER_CFG table=filter:97 family=2 entries=46 op=nft_register_chain pid=3774 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:25:09.197000 audit[3774]: SYSCALL arch=c000003e syscall=46 success=yes exit=23188 a0=3 a1=7ffde1836790 a2=0 a3=7ffde183677c items=0 ppid=2852 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:09.197000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:25:09.220946 systemd[1]: run-containerd-runc-k8s.io-205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4-runc.4xhMUR.mount: Deactivated successfully. Sep 6 00:25:09.227747 systemd[1]: Started cri-containerd-205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4.scope. Sep 6 00:25:09.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.241000 audit: BPF prog-id=132 op=LOAD Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3765 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:09.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230356132393164656637646262383961323535343733653566316565 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3765 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:09.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230356132393164656637646262383961323535343733653566316565 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit: BPF prog-id=133 op=LOAD Sep 6 00:25:09.242000 audit[3775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ab380 items=0 ppid=3765 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:09.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230356132393164656637646262383961323535343733653566316565 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit: BPF prog-id=134 op=LOAD Sep 6 00:25:09.242000 audit[3775]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ab3c8 items=0 ppid=3765 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:09.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230356132393164656637646262383961323535343733653566316565 Sep 6 00:25:09.242000 audit: BPF prog-id=134 op=UNLOAD Sep 6 00:25:09.242000 audit: BPF prog-id=133 op=UNLOAD Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.242000 audit: BPF prog-id=135 op=LOAD Sep 6 00:25:09.242000 audit[3775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ab7d8 items=0 ppid=3765 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:09.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230356132393164656637646262383961323535343733653566316565 Sep 6 00:25:09.277676 env[1743]: time="2025-09-06T00:25:09.277631350Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:a68a1b70-3081-4c39-92e0-ce01de005b87,Namespace:default,Attempt:0,} returns sandbox id \"205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4\"" Sep 6 00:25:09.279549 env[1743]: time="2025-09-06T00:25:09.279488758Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 6 00:25:09.587723 env[1743]: time="2025-09-06T00:25:09.587665567Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:25:09.592097 env[1743]: time="2025-09-06T00:25:09.592048514Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:25:09.592625 kubelet[2124]: E0906 00:25:09.592586 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:09.595496 env[1743]: time="2025-09-06T00:25:09.595464880Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:25:09.598677 env[1743]: time="2025-09-06T00:25:09.598643579Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:25:09.599689 env[1743]: time="2025-09-06T00:25:09.599650912Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 6 00:25:09.602078 env[1743]: time="2025-09-06T00:25:09.602049195Z" level=info msg="CreateContainer within sandbox \"205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 6 00:25:09.630887 env[1743]: time="2025-09-06T00:25:09.630822606Z" level=info msg="CreateContainer within sandbox \"205a291def7dbb89a255473e5f1eea76ffa2372d304d425109951443f8749df4\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"d119edba7b65717d404af05d5f2f40622a4027b817cf8752bae43b64e4e7ab89\"" Sep 6 00:25:09.631576 env[1743]: time="2025-09-06T00:25:09.631541304Z" level=info msg="StartContainer for \"d119edba7b65717d404af05d5f2f40622a4027b817cf8752bae43b64e4e7ab89\"" Sep 6 00:25:09.652925 systemd[1]: Started cri-containerd-d119edba7b65717d404af05d5f2f40622a4027b817cf8752bae43b64e4e7ab89.scope. Sep 6 00:25:09.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit: BPF prog-id=136 op=LOAD Sep 6 00:25:09.668000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[3810]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3765 pid=3810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:09.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431313965646261376236353731376434303461663035643566326634 Sep 6 00:25:09.668000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[3810]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3765 pid=3810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:09.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431313965646261376236353731376434303461663035643566326634 Sep 6 00:25:09.668000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.668000 audit: BPF prog-id=137 op=LOAD Sep 6 00:25:09.668000 audit[3810]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001c80d0 items=0 ppid=3765 pid=3810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:09.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431313965646261376236353731376434303461663035643566326634 Sep 6 00:25:09.669000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.669000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.669000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.669000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.669000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.669000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.669000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.669000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.669000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.669000 audit: BPF prog-id=138 op=LOAD Sep 6 00:25:09.669000 audit[3810]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001c8118 items=0 ppid=3765 pid=3810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:09.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431313965646261376236353731376434303461663035643566326634 Sep 6 00:25:09.669000 audit: BPF prog-id=138 op=UNLOAD Sep 6 00:25:09.669000 audit: BPF prog-id=137 op=UNLOAD Sep 6 00:25:09.669000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.669000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.669000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.669000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.669000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.669000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.669000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.669000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.669000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.669000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:09.669000 audit: BPF prog-id=139 op=LOAD Sep 6 00:25:09.669000 audit[3810]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001c8528 items=0 ppid=3765 pid=3810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:09.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431313965646261376236353731376434303461663035643566326634 Sep 6 00:25:09.688725 env[1743]: time="2025-09-06T00:25:09.688679586Z" level=info msg="StartContainer for \"d119edba7b65717d404af05d5f2f40622a4027b817cf8752bae43b64e4e7ab89\" returns successfully" Sep 6 00:25:10.593272 kubelet[2124]: E0906 00:25:10.593233 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:10.686372 systemd-networkd[1465]: cali5ec59c6bf6e: Gained IPv6LL Sep 6 00:25:11.593927 kubelet[2124]: E0906 00:25:11.593890 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:12.595009 kubelet[2124]: E0906 00:25:12.594968 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:13.596068 kubelet[2124]: E0906 00:25:13.596028 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:14.596804 kubelet[2124]: E0906 00:25:14.596765 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:15.597360 kubelet[2124]: E0906 00:25:15.597302 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:16.598336 kubelet[2124]: E0906 00:25:16.598285 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:17.599487 kubelet[2124]: E0906 00:25:17.599445 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:18.599797 kubelet[2124]: E0906 00:25:18.599753 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:19.600873 kubelet[2124]: E0906 00:25:19.600829 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:20.602273 kubelet[2124]: E0906 00:25:20.602219 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:21.602407 kubelet[2124]: E0906 00:25:21.602366 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:22.501759 kubelet[2124]: E0906 00:25:22.501697 2124 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:22.602732 kubelet[2124]: E0906 00:25:22.602674 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:23.603814 kubelet[2124]: E0906 00:25:23.603758 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:24.604172 kubelet[2124]: E0906 00:25:24.604129 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:25.605316 kubelet[2124]: E0906 00:25:25.605274 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:26.606109 kubelet[2124]: E0906 00:25:26.606062 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:27.606926 kubelet[2124]: E0906 00:25:27.606884 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:28.607743 kubelet[2124]: E0906 00:25:28.607701 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:29.608644 kubelet[2124]: E0906 00:25:29.608603 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:30.609182 kubelet[2124]: E0906 00:25:30.609105 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:31.610112 kubelet[2124]: E0906 00:25:31.610069 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:32.610651 kubelet[2124]: E0906 00:25:32.610611 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:33.610953 kubelet[2124]: E0906 00:25:33.610911 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:34.611105 kubelet[2124]: E0906 00:25:34.611063 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:35.109624 kubelet[2124]: E0906 00:25:35.109407 2124 controller.go:195] "Failed to update lease" err="Put \"https://172.31.27.3:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.25.70?timeout=10s\": context deadline exceeded" Sep 6 00:25:35.611260 kubelet[2124]: E0906 00:25:35.611212 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:36.612435 kubelet[2124]: E0906 00:25:36.612366 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:37.613487 kubelet[2124]: E0906 00:25:37.613414 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:38.613633 kubelet[2124]: E0906 00:25:38.613590 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:39.614423 kubelet[2124]: E0906 00:25:39.614378 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:40.615116 kubelet[2124]: E0906 00:25:40.615063 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:41.616102 kubelet[2124]: E0906 00:25:41.616048 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:42.501736 kubelet[2124]: E0906 00:25:42.501683 2124 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:42.616605 kubelet[2124]: E0906 00:25:42.616549 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:43.617620 kubelet[2124]: E0906 00:25:43.617579 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:44.617791 kubelet[2124]: E0906 00:25:44.617739 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:45.110301 kubelet[2124]: E0906 00:25:45.110250 2124 controller.go:195] "Failed to update lease" err="the server was unable to return a response in the time allotted, but may still be processing the request (put leases.coordination.k8s.io 172.31.25.70)" Sep 6 00:25:45.618604 kubelet[2124]: E0906 00:25:45.618564 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:46.619302 kubelet[2124]: E0906 00:25:46.619244 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:47.619459 kubelet[2124]: E0906 00:25:47.619418 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:48.620193 kubelet[2124]: E0906 00:25:48.620142 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:49.620451 kubelet[2124]: E0906 00:25:49.620396 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:50.620666 kubelet[2124]: E0906 00:25:50.620625 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:51.621659 kubelet[2124]: E0906 00:25:51.621618 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:52.622746 kubelet[2124]: E0906 00:25:52.622688 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:52.827841 systemd[1]: run-containerd-runc-k8s.io-f38bc36ce47c7c8521349069925e608203290641f71b66415ce0cd2c145149c2-runc.22CBkS.mount: Deactivated successfully. Sep 6 00:25:53.623664 kubelet[2124]: E0906 00:25:53.623608 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:54.624040 kubelet[2124]: E0906 00:25:54.623999 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:55.110862 kubelet[2124]: E0906 00:25:55.110719 2124 controller.go:195] "Failed to update lease" err="the server was unable to return a response in the time allotted, but may still be processing the request (put leases.coordination.k8s.io 172.31.25.70)" Sep 6 00:25:55.146679 kubelet[2124]: E0906 00:25:55.146615 2124 controller.go:195] "Failed to update lease" err="Put \"https://172.31.27.3:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.25.70?timeout=10s\": read tcp 172.31.25.70:36106->172.31.27.3:6443: read: connection reset by peer" Sep 6 00:25:55.148276 kubelet[2124]: E0906 00:25:55.147693 2124 controller.go:195] "Failed to update lease" err="Put \"https://172.31.27.3:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.25.70?timeout=10s\": dial tcp 172.31.27.3:6443: connect: connection refused" Sep 6 00:25:55.148276 kubelet[2124]: I0906 00:25:55.147735 2124 controller.go:115] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Sep 6 00:25:55.148276 kubelet[2124]: E0906 00:25:55.147982 2124 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.3:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.25.70?timeout=10s\": dial tcp 172.31.27.3:6443: connect: connection refused" interval="200ms" Sep 6 00:25:55.149674 kubelet[2124]: E0906 00:25:55.149555 2124 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.27.3:6443/api/v1/namespaces/calico-system/events\": read tcp 172.31.25.70:36106->172.31.27.3:6443: read: connection reset by peer" event=< Sep 6 00:25:55.149674 kubelet[2124]: &Event{ObjectMeta:{calico-node-dxnrb.186289d5156e1b74 calico-system 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:calico-system,Name:calico-node-dxnrb,UID:04b770ce-3ee5-4631-b7da-bf234f121419,APIVersion:v1,ResourceVersion:910,FieldPath:spec.containers{calico-node},},Reason:Unhealthy,Message:Readiness probe failed: 2025-09-06 00:25:52.904 [INFO][319] node/health.go 202: Number of node(s) with BGP peering established = 0 Sep 6 00:25:55.149674 kubelet[2124]: calico/node is not ready: BIRD is not ready: BGP not established with 172.31.27.3 Sep 6 00:25:55.149674 kubelet[2124]: ,Source:EventSource{Component:kubelet,Host:172.31.25.70,},FirstTimestamp:2025-09-06 00:25:52.908491636 +0000 UTC m=+111.398877520,LastTimestamp:2025-09-06 00:25:52.908491636 +0000 UTC m=+111.398877520,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.25.70,} Sep 6 00:25:55.149674 kubelet[2124]: > Sep 6 00:25:55.349391 kubelet[2124]: E0906 00:25:55.349346 2124 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.3:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.25.70?timeout=10s\": dial tcp 172.31.27.3:6443: connect: connection refused" interval="400ms" Sep 6 00:25:55.624391 kubelet[2124]: E0906 00:25:55.624334 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:55.753446 kubelet[2124]: E0906 00:25:55.753403 2124 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.3:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.25.70?timeout=10s\": dial tcp 172.31.27.3:6443: connect: connection refused" interval="800ms" Sep 6 00:25:56.625134 kubelet[2124]: E0906 00:25:56.625093 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:57.625531 kubelet[2124]: E0906 00:25:57.625468 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:58.626231 kubelet[2124]: E0906 00:25:58.626194 2124 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"