Sep 6 00:06:12.992847 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Sep 6 00:06:12.992882 kernel: Linux version 5.15.190-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Sep 5 23:00:12 -00 2025 Sep 6 00:06:12.992926 kernel: efi: EFI v2.70 by EDK II Sep 6 00:06:12.992945 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7affea98 MEMRESERVE=0x716fcf98 Sep 6 00:06:12.992960 kernel: ACPI: Early table checksum verification disabled Sep 6 00:06:12.992974 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Sep 6 00:06:12.992990 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Sep 6 00:06:12.993005 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Sep 6 00:06:12.993019 kernel: ACPI: DSDT 0x0000000078640000 00159D (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Sep 6 00:06:12.993033 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Sep 6 00:06:12.993052 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Sep 6 00:06:12.993066 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Sep 6 00:06:12.993081 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Sep 6 00:06:12.993095 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Sep 6 00:06:12.993112 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Sep 6 00:06:12.993132 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Sep 6 00:06:12.993147 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Sep 6 00:06:12.993162 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Sep 6 00:06:12.993176 kernel: printk: bootconsole [uart0] enabled Sep 6 00:06:12.993191 kernel: NUMA: Failed to initialise from firmware Sep 6 00:06:12.993207 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Sep 6 00:06:12.993222 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Sep 6 00:06:12.993237 kernel: Zone ranges: Sep 6 00:06:12.993252 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Sep 6 00:06:12.993267 kernel: DMA32 empty Sep 6 00:06:12.993282 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Sep 6 00:06:12.993300 kernel: Movable zone start for each node Sep 6 00:06:12.993315 kernel: Early memory node ranges Sep 6 00:06:12.993330 kernel: node 0: [mem 0x0000000040000000-0x000000007862ffff] Sep 6 00:06:12.993345 kernel: node 0: [mem 0x0000000078630000-0x000000007863ffff] Sep 6 00:06:12.993359 kernel: node 0: [mem 0x0000000078640000-0x00000000786effff] Sep 6 00:06:12.993374 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Sep 6 00:06:12.993389 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Sep 6 00:06:12.993404 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Sep 6 00:06:12.993419 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Sep 6 00:06:12.993433 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Sep 6 00:06:12.993448 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Sep 6 00:06:12.993463 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Sep 6 00:06:12.993481 kernel: psci: probing for conduit method from ACPI. Sep 6 00:06:12.993497 kernel: psci: PSCIv1.0 detected in firmware. Sep 6 00:06:12.993517 kernel: psci: Using standard PSCI v0.2 function IDs Sep 6 00:06:12.993533 kernel: psci: Trusted OS migration not required Sep 6 00:06:12.993549 kernel: psci: SMC Calling Convention v1.1 Sep 6 00:06:12.993569 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000001) Sep 6 00:06:12.993584 kernel: ACPI: SRAT not present Sep 6 00:06:13.009961 kernel: percpu: Embedded 30 pages/cpu s82968 r8192 d31720 u122880 Sep 6 00:06:13.009989 kernel: pcpu-alloc: s82968 r8192 d31720 u122880 alloc=30*4096 Sep 6 00:06:13.010006 kernel: pcpu-alloc: [0] 0 [0] 1 Sep 6 00:06:13.010022 kernel: Detected PIPT I-cache on CPU0 Sep 6 00:06:13.010039 kernel: CPU features: detected: GIC system register CPU interface Sep 6 00:06:13.010055 kernel: CPU features: detected: Spectre-v2 Sep 6 00:06:13.010070 kernel: CPU features: detected: Spectre-v3a Sep 6 00:06:13.010086 kernel: CPU features: detected: Spectre-BHB Sep 6 00:06:13.010102 kernel: CPU features: kernel page table isolation forced ON by KASLR Sep 6 00:06:13.010127 kernel: CPU features: detected: Kernel page table isolation (KPTI) Sep 6 00:06:13.010143 kernel: CPU features: detected: ARM erratum 1742098 Sep 6 00:06:13.010159 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Sep 6 00:06:13.010175 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Sep 6 00:06:13.010190 kernel: Policy zone: Normal Sep 6 00:06:13.010209 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=5cb382ab59aa1336098b36da02e2d4491706a6fda80ee56c4ff8582cce9206a4 Sep 6 00:06:13.010226 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 6 00:06:13.010242 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 6 00:06:13.010258 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 6 00:06:13.010273 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 6 00:06:13.010293 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Sep 6 00:06:13.010310 kernel: Memory: 3824460K/4030464K available (9792K kernel code, 2094K rwdata, 7592K rodata, 36416K init, 777K bss, 206004K reserved, 0K cma-reserved) Sep 6 00:06:13.010326 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Sep 6 00:06:13.010341 kernel: trace event string verifier disabled Sep 6 00:06:13.010357 kernel: rcu: Preemptible hierarchical RCU implementation. Sep 6 00:06:13.010373 kernel: rcu: RCU event tracing is enabled. Sep 6 00:06:13.010389 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Sep 6 00:06:13.010405 kernel: Trampoline variant of Tasks RCU enabled. Sep 6 00:06:13.010421 kernel: Tracing variant of Tasks RCU enabled. Sep 6 00:06:13.010436 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 6 00:06:13.010452 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Sep 6 00:06:13.010467 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Sep 6 00:06:13.010487 kernel: GICv3: 96 SPIs implemented Sep 6 00:06:13.010502 kernel: GICv3: 0 Extended SPIs implemented Sep 6 00:06:13.010518 kernel: GICv3: Distributor has no Range Selector support Sep 6 00:06:13.010533 kernel: Root IRQ handler: gic_handle_irq Sep 6 00:06:13.010548 kernel: GICv3: 16 PPIs implemented Sep 6 00:06:13.010564 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Sep 6 00:06:13.010579 kernel: ACPI: SRAT not present Sep 6 00:06:13.010594 kernel: ITS [mem 0x10080000-0x1009ffff] Sep 6 00:06:13.010610 kernel: ITS@0x0000000010080000: allocated 8192 Devices @400090000 (indirect, esz 8, psz 64K, shr 1) Sep 6 00:06:13.010626 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000a0000 (flat, esz 8, psz 64K, shr 1) Sep 6 00:06:13.010642 kernel: GICv3: using LPI property table @0x00000004000b0000 Sep 6 00:06:13.010661 kernel: ITS: Using hypervisor restricted LPI range [128] Sep 6 00:06:13.010677 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Sep 6 00:06:13.010709 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Sep 6 00:06:13.010730 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Sep 6 00:06:13.010746 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Sep 6 00:06:13.010762 kernel: Console: colour dummy device 80x25 Sep 6 00:06:13.010779 kernel: printk: console [tty1] enabled Sep 6 00:06:13.010795 kernel: ACPI: Core revision 20210730 Sep 6 00:06:13.010812 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Sep 6 00:06:13.010828 kernel: pid_max: default: 32768 minimum: 301 Sep 6 00:06:13.010850 kernel: LSM: Security Framework initializing Sep 6 00:06:13.010866 kernel: SELinux: Initializing. Sep 6 00:06:13.010882 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 6 00:06:13.010899 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 6 00:06:13.010951 kernel: rcu: Hierarchical SRCU implementation. Sep 6 00:06:13.010968 kernel: Platform MSI: ITS@0x10080000 domain created Sep 6 00:06:13.010985 kernel: PCI/MSI: ITS@0x10080000 domain created Sep 6 00:06:13.011001 kernel: Remapping and enabling EFI services. Sep 6 00:06:13.011017 kernel: smp: Bringing up secondary CPUs ... Sep 6 00:06:13.011032 kernel: Detected PIPT I-cache on CPU1 Sep 6 00:06:13.011054 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Sep 6 00:06:13.011070 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Sep 6 00:06:13.011086 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Sep 6 00:06:13.011102 kernel: smp: Brought up 1 node, 2 CPUs Sep 6 00:06:13.011118 kernel: SMP: Total of 2 processors activated. Sep 6 00:06:13.011134 kernel: CPU features: detected: 32-bit EL0 Support Sep 6 00:06:13.011150 kernel: CPU features: detected: 32-bit EL1 Support Sep 6 00:06:13.011166 kernel: CPU features: detected: CRC32 instructions Sep 6 00:06:13.011182 kernel: CPU: All CPU(s) started at EL1 Sep 6 00:06:13.011202 kernel: alternatives: patching kernel code Sep 6 00:06:13.011218 kernel: devtmpfs: initialized Sep 6 00:06:13.011244 kernel: KASLR disabled due to lack of seed Sep 6 00:06:13.011265 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 6 00:06:13.011282 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Sep 6 00:06:13.011298 kernel: pinctrl core: initialized pinctrl subsystem Sep 6 00:06:13.011315 kernel: SMBIOS 3.0.0 present. Sep 6 00:06:13.011331 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Sep 6 00:06:13.011348 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 6 00:06:13.011365 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Sep 6 00:06:13.011382 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Sep 6 00:06:13.011402 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Sep 6 00:06:13.011419 kernel: audit: initializing netlink subsys (disabled) Sep 6 00:06:13.011436 kernel: audit: type=2000 audit(0.294:1): state=initialized audit_enabled=0 res=1 Sep 6 00:06:13.011453 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 6 00:06:13.011469 kernel: cpuidle: using governor menu Sep 6 00:06:13.011490 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Sep 6 00:06:13.011507 kernel: ASID allocator initialised with 32768 entries Sep 6 00:06:13.011523 kernel: ACPI: bus type PCI registered Sep 6 00:06:13.011540 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 6 00:06:13.011556 kernel: Serial: AMBA PL011 UART driver Sep 6 00:06:13.011573 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 6 00:06:13.011590 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Sep 6 00:06:13.011607 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 6 00:06:13.011623 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Sep 6 00:06:13.011643 kernel: cryptd: max_cpu_qlen set to 1000 Sep 6 00:06:13.011660 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Sep 6 00:06:13.011677 kernel: ACPI: Added _OSI(Module Device) Sep 6 00:06:13.011693 kernel: ACPI: Added _OSI(Processor Device) Sep 6 00:06:13.011710 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 6 00:06:13.011726 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 6 00:06:13.011743 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 6 00:06:13.011759 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 6 00:06:13.011776 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 6 00:06:13.011792 kernel: ACPI: Interpreter enabled Sep 6 00:06:13.011813 kernel: ACPI: Using GIC for interrupt routing Sep 6 00:06:13.011830 kernel: ACPI: MCFG table detected, 1 entries Sep 6 00:06:13.011846 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Sep 6 00:06:13.012153 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Sep 6 00:06:13.012352 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Sep 6 00:06:13.012580 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Sep 6 00:06:13.012778 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Sep 6 00:06:13.013012 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Sep 6 00:06:13.013037 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Sep 6 00:06:13.013054 kernel: acpiphp: Slot [1] registered Sep 6 00:06:13.013071 kernel: acpiphp: Slot [2] registered Sep 6 00:06:13.013088 kernel: acpiphp: Slot [3] registered Sep 6 00:06:13.013105 kernel: acpiphp: Slot [4] registered Sep 6 00:06:13.013122 kernel: acpiphp: Slot [5] registered Sep 6 00:06:13.013138 kernel: acpiphp: Slot [6] registered Sep 6 00:06:13.013155 kernel: acpiphp: Slot [7] registered Sep 6 00:06:13.013177 kernel: acpiphp: Slot [8] registered Sep 6 00:06:13.013193 kernel: acpiphp: Slot [9] registered Sep 6 00:06:13.013210 kernel: acpiphp: Slot [10] registered Sep 6 00:06:13.013226 kernel: acpiphp: Slot [11] registered Sep 6 00:06:13.013243 kernel: acpiphp: Slot [12] registered Sep 6 00:06:13.013260 kernel: acpiphp: Slot [13] registered Sep 6 00:06:13.013276 kernel: acpiphp: Slot [14] registered Sep 6 00:06:13.013293 kernel: acpiphp: Slot [15] registered Sep 6 00:06:13.013309 kernel: acpiphp: Slot [16] registered Sep 6 00:06:13.013330 kernel: acpiphp: Slot [17] registered Sep 6 00:06:13.013347 kernel: acpiphp: Slot [18] registered Sep 6 00:06:13.013363 kernel: acpiphp: Slot [19] registered Sep 6 00:06:13.013380 kernel: acpiphp: Slot [20] registered Sep 6 00:06:13.013396 kernel: acpiphp: Slot [21] registered Sep 6 00:06:13.013413 kernel: acpiphp: Slot [22] registered Sep 6 00:06:13.013429 kernel: acpiphp: Slot [23] registered Sep 6 00:06:13.013446 kernel: acpiphp: Slot [24] registered Sep 6 00:06:13.013462 kernel: acpiphp: Slot [25] registered Sep 6 00:06:13.013478 kernel: acpiphp: Slot [26] registered Sep 6 00:06:13.013498 kernel: acpiphp: Slot [27] registered Sep 6 00:06:13.013515 kernel: acpiphp: Slot [28] registered Sep 6 00:06:13.013532 kernel: acpiphp: Slot [29] registered Sep 6 00:06:13.013548 kernel: acpiphp: Slot [30] registered Sep 6 00:06:13.013564 kernel: acpiphp: Slot [31] registered Sep 6 00:06:13.013581 kernel: PCI host bridge to bus 0000:00 Sep 6 00:06:13.013789 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Sep 6 00:06:13.013998 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Sep 6 00:06:13.014182 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Sep 6 00:06:13.014355 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Sep 6 00:06:13.014576 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Sep 6 00:06:13.014815 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Sep 6 00:06:13.015059 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Sep 6 00:06:13.015277 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Sep 6 00:06:13.015485 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Sep 6 00:06:13.015686 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Sep 6 00:06:13.027526 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Sep 6 00:06:13.027812 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Sep 6 00:06:13.028060 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Sep 6 00:06:13.028258 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Sep 6 00:06:13.028454 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Sep 6 00:06:13.028657 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Sep 6 00:06:13.028853 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Sep 6 00:06:13.030127 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Sep 6 00:06:13.030331 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Sep 6 00:06:13.030530 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Sep 6 00:06:13.030731 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Sep 6 00:06:13.030929 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Sep 6 00:06:13.031118 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Sep 6 00:06:13.031141 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Sep 6 00:06:13.031159 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Sep 6 00:06:13.031176 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Sep 6 00:06:13.031193 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Sep 6 00:06:13.031210 kernel: iommu: Default domain type: Translated Sep 6 00:06:13.031227 kernel: iommu: DMA domain TLB invalidation policy: strict mode Sep 6 00:06:13.031244 kernel: vgaarb: loaded Sep 6 00:06:13.031261 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 6 00:06:13.031283 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 6 00:06:13.031300 kernel: PTP clock support registered Sep 6 00:06:13.031317 kernel: Registered efivars operations Sep 6 00:06:13.031333 kernel: clocksource: Switched to clocksource arch_sys_counter Sep 6 00:06:13.031350 kernel: VFS: Disk quotas dquot_6.6.0 Sep 6 00:06:13.031366 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 6 00:06:13.031383 kernel: pnp: PnP ACPI init Sep 6 00:06:13.031579 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Sep 6 00:06:13.031604 kernel: pnp: PnP ACPI: found 1 devices Sep 6 00:06:13.031626 kernel: NET: Registered PF_INET protocol family Sep 6 00:06:13.031644 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 6 00:06:13.031661 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Sep 6 00:06:13.031678 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 6 00:06:13.031694 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 6 00:06:13.031711 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Sep 6 00:06:13.031728 kernel: TCP: Hash tables configured (established 32768 bind 32768) Sep 6 00:06:13.031745 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 6 00:06:13.031766 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 6 00:06:13.031783 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 6 00:06:13.031799 kernel: PCI: CLS 0 bytes, default 64 Sep 6 00:06:13.031816 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Sep 6 00:06:13.031832 kernel: kvm [1]: HYP mode not available Sep 6 00:06:13.031849 kernel: Initialise system trusted keyrings Sep 6 00:06:13.031866 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Sep 6 00:06:13.031883 kernel: Key type asymmetric registered Sep 6 00:06:13.031914 kernel: Asymmetric key parser 'x509' registered Sep 6 00:06:13.033978 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 6 00:06:13.033997 kernel: io scheduler mq-deadline registered Sep 6 00:06:13.034015 kernel: io scheduler kyber registered Sep 6 00:06:13.034032 kernel: io scheduler bfq registered Sep 6 00:06:13.034271 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Sep 6 00:06:13.034297 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Sep 6 00:06:13.034315 kernel: ACPI: button: Power Button [PWRB] Sep 6 00:06:13.034332 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1 Sep 6 00:06:13.034349 kernel: ACPI: button: Sleep Button [SLPB] Sep 6 00:06:13.034370 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 6 00:06:13.034388 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Sep 6 00:06:13.034586 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Sep 6 00:06:13.034610 kernel: printk: console [ttyS0] disabled Sep 6 00:06:13.034628 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Sep 6 00:06:13.034644 kernel: printk: console [ttyS0] enabled Sep 6 00:06:13.034661 kernel: printk: bootconsole [uart0] disabled Sep 6 00:06:13.034678 kernel: thunder_xcv, ver 1.0 Sep 6 00:06:13.034711 kernel: thunder_bgx, ver 1.0 Sep 6 00:06:13.034736 kernel: nicpf, ver 1.0 Sep 6 00:06:13.034753 kernel: nicvf, ver 1.0 Sep 6 00:06:13.036014 kernel: rtc-efi rtc-efi.0: registered as rtc0 Sep 6 00:06:13.036209 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-09-06T00:06:12 UTC (1757117172) Sep 6 00:06:13.036233 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 6 00:06:13.036250 kernel: NET: Registered PF_INET6 protocol family Sep 6 00:06:13.036267 kernel: Segment Routing with IPv6 Sep 6 00:06:13.036283 kernel: In-situ OAM (IOAM) with IPv6 Sep 6 00:06:13.036307 kernel: NET: Registered PF_PACKET protocol family Sep 6 00:06:13.036323 kernel: Key type dns_resolver registered Sep 6 00:06:13.036340 kernel: registered taskstats version 1 Sep 6 00:06:13.036356 kernel: Loading compiled-in X.509 certificates Sep 6 00:06:13.036373 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.190-flatcar: 72ab5ba99c2368429c7a4d04fccfc5a39dd84386' Sep 6 00:06:13.036389 kernel: Key type .fscrypt registered Sep 6 00:06:13.036406 kernel: Key type fscrypt-provisioning registered Sep 6 00:06:13.036422 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 6 00:06:13.036439 kernel: ima: Allocated hash algorithm: sha1 Sep 6 00:06:13.036460 kernel: ima: No architecture policies found Sep 6 00:06:13.036476 kernel: clk: Disabling unused clocks Sep 6 00:06:13.036493 kernel: Freeing unused kernel memory: 36416K Sep 6 00:06:13.036510 kernel: Run /init as init process Sep 6 00:06:13.036527 kernel: with arguments: Sep 6 00:06:13.036543 kernel: /init Sep 6 00:06:13.036559 kernel: with environment: Sep 6 00:06:13.036575 kernel: HOME=/ Sep 6 00:06:13.036592 kernel: TERM=linux Sep 6 00:06:13.036612 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 6 00:06:13.036633 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 00:06:13.036655 systemd[1]: Detected virtualization amazon. Sep 6 00:06:13.036674 systemd[1]: Detected architecture arm64. Sep 6 00:06:13.036692 systemd[1]: Running in initrd. Sep 6 00:06:13.036710 systemd[1]: No hostname configured, using default hostname. Sep 6 00:06:13.036728 systemd[1]: Hostname set to . Sep 6 00:06:13.036750 systemd[1]: Initializing machine ID from VM UUID. Sep 6 00:06:13.036769 systemd[1]: Queued start job for default target initrd.target. Sep 6 00:06:13.036786 systemd[1]: Started systemd-ask-password-console.path. Sep 6 00:06:13.036804 systemd[1]: Reached target cryptsetup.target. Sep 6 00:06:13.036822 systemd[1]: Reached target paths.target. Sep 6 00:06:13.036839 systemd[1]: Reached target slices.target. Sep 6 00:06:13.036857 systemd[1]: Reached target swap.target. Sep 6 00:06:13.036875 systemd[1]: Reached target timers.target. Sep 6 00:06:13.036897 systemd[1]: Listening on iscsid.socket. Sep 6 00:06:13.036938 systemd[1]: Listening on iscsiuio.socket. Sep 6 00:06:13.036958 systemd[1]: Listening on systemd-journald-audit.socket. Sep 6 00:06:13.036976 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 6 00:06:13.036995 systemd[1]: Listening on systemd-journald.socket. Sep 6 00:06:13.037013 systemd[1]: Listening on systemd-networkd.socket. Sep 6 00:06:13.037032 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 00:06:13.037050 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 00:06:13.037068 systemd[1]: Reached target sockets.target. Sep 6 00:06:13.037092 systemd[1]: Starting kmod-static-nodes.service... Sep 6 00:06:13.037110 systemd[1]: Finished network-cleanup.service. Sep 6 00:06:13.037128 systemd[1]: Starting systemd-fsck-usr.service... Sep 6 00:06:13.037146 systemd[1]: Starting systemd-journald.service... Sep 6 00:06:13.037165 systemd[1]: Starting systemd-modules-load.service... Sep 6 00:06:13.037183 systemd[1]: Starting systemd-resolved.service... Sep 6 00:06:13.037201 systemd[1]: Starting systemd-vconsole-setup.service... Sep 6 00:06:13.037220 systemd[1]: Finished kmod-static-nodes.service. Sep 6 00:06:13.037243 kernel: audit: type=1130 audit(1757117172.981:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:13.037262 systemd[1]: Finished systemd-fsck-usr.service. Sep 6 00:06:13.037281 kernel: audit: type=1130 audit(1757117172.996:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:13.037299 systemd[1]: Finished systemd-vconsole-setup.service. Sep 6 00:06:13.037317 kernel: audit: type=1130 audit(1757117173.017:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:13.037339 systemd-journald[310]: Journal started Sep 6 00:06:13.037429 systemd-journald[310]: Runtime Journal (/run/log/journal/ec255fa7bbcd93b44bf54c15d5b19783) is 8.0M, max 75.4M, 67.4M free. Sep 6 00:06:12.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:12.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:13.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:12.994797 systemd-modules-load[311]: Inserted module 'overlay' Sep 6 00:06:13.047597 systemd[1]: Starting dracut-cmdline-ask.service... Sep 6 00:06:13.060842 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 6 00:06:13.060925 systemd[1]: Started systemd-journald.service. Sep 6 00:06:13.075503 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 6 00:06:13.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:13.086010 systemd-resolved[312]: Positive Trust Anchors: Sep 6 00:06:13.086375 systemd-resolved[312]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 00:06:13.094870 systemd-resolved[312]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 00:06:13.110784 kernel: audit: type=1130 audit(1757117173.071:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:13.110824 kernel: Bridge firewalling registered Sep 6 00:06:13.102009 systemd-modules-load[311]: Inserted module 'br_netfilter' Sep 6 00:06:13.121991 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 6 00:06:13.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:13.135927 kernel: audit: type=1130 audit(1757117173.120:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:13.138395 systemd[1]: Finished dracut-cmdline-ask.service. Sep 6 00:06:13.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:13.143302 systemd[1]: Starting dracut-cmdline.service... Sep 6 00:06:13.160924 kernel: audit: type=1130 audit(1757117173.137:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:13.171938 kernel: SCSI subsystem initialized Sep 6 00:06:13.173505 dracut-cmdline[327]: dracut-dracut-053 Sep 6 00:06:13.183124 dracut-cmdline[327]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=5cb382ab59aa1336098b36da02e2d4491706a6fda80ee56c4ff8582cce9206a4 Sep 6 00:06:13.206988 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 6 00:06:13.207046 kernel: device-mapper: uevent: version 1.0.3 Sep 6 00:06:13.211220 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 6 00:06:13.223094 systemd-modules-load[311]: Inserted module 'dm_multipath' Sep 6 00:06:13.226786 systemd[1]: Finished systemd-modules-load.service. Sep 6 00:06:13.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:13.239113 systemd[1]: Starting systemd-sysctl.service... Sep 6 00:06:13.251950 kernel: audit: type=1130 audit(1757117173.227:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:13.269949 systemd[1]: Finished systemd-sysctl.service. Sep 6 00:06:13.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:13.281947 kernel: audit: type=1130 audit(1757117173.268:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:13.355937 kernel: Loading iSCSI transport class v2.0-870. Sep 6 00:06:13.377943 kernel: iscsi: registered transport (tcp) Sep 6 00:06:13.405650 kernel: iscsi: registered transport (qla4xxx) Sep 6 00:06:13.405720 kernel: QLogic iSCSI HBA Driver Sep 6 00:06:13.591943 kernel: random: crng init done Sep 6 00:06:13.592126 systemd-resolved[312]: Defaulting to hostname 'linux'. Sep 6 00:06:13.596142 systemd[1]: Started systemd-resolved.service. Sep 6 00:06:13.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:13.598109 systemd[1]: Reached target nss-lookup.target. Sep 6 00:06:13.611128 kernel: audit: type=1130 audit(1757117173.596:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:13.625186 systemd[1]: Finished dracut-cmdline.service. Sep 6 00:06:13.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:13.628509 systemd[1]: Starting dracut-pre-udev.service... Sep 6 00:06:13.694957 kernel: raid6: neonx8 gen() 6339 MB/s Sep 6 00:06:13.712939 kernel: raid6: neonx8 xor() 4800 MB/s Sep 6 00:06:13.730936 kernel: raid6: neonx4 gen() 6487 MB/s Sep 6 00:06:13.748937 kernel: raid6: neonx4 xor() 5003 MB/s Sep 6 00:06:13.766935 kernel: raid6: neonx2 gen() 5714 MB/s Sep 6 00:06:13.784938 kernel: raid6: neonx2 xor() 4588 MB/s Sep 6 00:06:13.802936 kernel: raid6: neonx1 gen() 4431 MB/s Sep 6 00:06:13.820937 kernel: raid6: neonx1 xor() 3709 MB/s Sep 6 00:06:13.838936 kernel: raid6: int64x8 gen() 3410 MB/s Sep 6 00:06:13.856937 kernel: raid6: int64x8 xor() 2098 MB/s Sep 6 00:06:13.874936 kernel: raid6: int64x4 gen() 3779 MB/s Sep 6 00:06:13.892937 kernel: raid6: int64x4 xor() 2199 MB/s Sep 6 00:06:13.910938 kernel: raid6: int64x2 gen() 3562 MB/s Sep 6 00:06:13.928937 kernel: raid6: int64x2 xor() 1951 MB/s Sep 6 00:06:13.946936 kernel: raid6: int64x1 gen() 2759 MB/s Sep 6 00:06:13.966431 kernel: raid6: int64x1 xor() 1453 MB/s Sep 6 00:06:13.966460 kernel: raid6: using algorithm neonx4 gen() 6487 MB/s Sep 6 00:06:13.966485 kernel: raid6: .... xor() 5003 MB/s, rmw enabled Sep 6 00:06:13.968270 kernel: raid6: using neon recovery algorithm Sep 6 00:06:13.988527 kernel: xor: measuring software checksum speed Sep 6 00:06:13.988589 kernel: 8regs : 9033 MB/sec Sep 6 00:06:13.990490 kernel: 32regs : 11104 MB/sec Sep 6 00:06:13.992509 kernel: arm64_neon : 9304 MB/sec Sep 6 00:06:13.992539 kernel: xor: using function: 32regs (11104 MB/sec) Sep 6 00:06:14.088955 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Sep 6 00:06:14.106216 systemd[1]: Finished dracut-pre-udev.service. Sep 6 00:06:14.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:14.108000 audit: BPF prog-id=7 op=LOAD Sep 6 00:06:14.108000 audit: BPF prog-id=8 op=LOAD Sep 6 00:06:14.111155 systemd[1]: Starting systemd-udevd.service... Sep 6 00:06:14.142804 systemd-udevd[509]: Using default interface naming scheme 'v252'. Sep 6 00:06:14.151664 systemd[1]: Started systemd-udevd.service. Sep 6 00:06:14.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:14.165464 systemd[1]: Starting dracut-pre-trigger.service... Sep 6 00:06:14.194244 dracut-pre-trigger[525]: rd.md=0: removing MD RAID activation Sep 6 00:06:14.254236 systemd[1]: Finished dracut-pre-trigger.service. Sep 6 00:06:14.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:14.259674 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 00:06:14.361337 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 00:06:14.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:14.480392 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Sep 6 00:06:14.480457 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Sep 6 00:06:14.511232 kernel: ena 0000:00:05.0: ENA device version: 0.10 Sep 6 00:06:14.511462 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Sep 6 00:06:14.511675 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Sep 6 00:06:14.511701 kernel: nvme nvme0: pci function 0000:00:04.0 Sep 6 00:06:14.511966 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:31:6c:6c:54:97 Sep 6 00:06:14.517939 kernel: nvme nvme0: 2/0/0 default/read/poll queues Sep 6 00:06:14.525025 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 6 00:06:14.525063 kernel: GPT:9289727 != 16777215 Sep 6 00:06:14.527311 kernel: GPT:Alternate GPT header not at the end of the disk. Sep 6 00:06:14.528645 kernel: GPT:9289727 != 16777215 Sep 6 00:06:14.530604 kernel: GPT: Use GNU Parted to correct GPT errors. Sep 6 00:06:14.530641 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 6 00:06:14.536497 (udev-worker)[559]: Network interface NamePolicy= disabled on kernel command line. Sep 6 00:06:14.611961 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/nvme0n1p6 scanned by (udev-worker) (563) Sep 6 00:06:14.681749 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 6 00:06:14.701459 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 6 00:06:14.713555 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 6 00:06:14.717258 systemd[1]: Starting disk-uuid.service... Sep 6 00:06:14.736420 disk-uuid[666]: Primary Header is updated. Sep 6 00:06:14.736420 disk-uuid[666]: Secondary Entries is updated. Sep 6 00:06:14.736420 disk-uuid[666]: Secondary Header is updated. Sep 6 00:06:14.752945 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 6 00:06:14.757271 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 00:06:14.767173 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 6 00:06:14.771985 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 6 00:06:15.154932 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 6 00:06:15.781938 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 6 00:06:15.782617 disk-uuid[667]: The operation has completed successfully. Sep 6 00:06:15.934553 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 6 00:06:15.934784 systemd[1]: Finished disk-uuid.service. Sep 6 00:06:15.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:15.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:15.968081 systemd[1]: Starting verity-setup.service... Sep 6 00:06:16.006939 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Sep 6 00:06:16.095918 systemd[1]: Found device dev-mapper-usr.device. Sep 6 00:06:16.102752 systemd[1]: Mounting sysusr-usr.mount... Sep 6 00:06:16.112140 systemd[1]: Finished verity-setup.service. Sep 6 00:06:16.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:16.200954 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 6 00:06:16.201759 systemd[1]: Mounted sysusr-usr.mount. Sep 6 00:06:16.204883 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 6 00:06:16.207049 systemd[1]: Starting ignition-setup.service... Sep 6 00:06:16.216013 systemd[1]: Starting parse-ip-for-networkd.service... Sep 6 00:06:16.243270 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Sep 6 00:06:16.243337 kernel: BTRFS info (device nvme0n1p6): using free space tree Sep 6 00:06:16.243374 kernel: BTRFS info (device nvme0n1p6): has skinny extents Sep 6 00:06:16.283096 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Sep 6 00:06:16.301871 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 6 00:06:16.328061 systemd[1]: Finished ignition-setup.service. Sep 6 00:06:16.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:16.332769 systemd[1]: Starting ignition-fetch-offline.service... Sep 6 00:06:16.372595 systemd[1]: Finished parse-ip-for-networkd.service. Sep 6 00:06:16.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:16.377000 audit: BPF prog-id=9 op=LOAD Sep 6 00:06:16.380125 systemd[1]: Starting systemd-networkd.service... Sep 6 00:06:16.431760 systemd-networkd[1178]: lo: Link UP Sep 6 00:06:16.431782 systemd-networkd[1178]: lo: Gained carrier Sep 6 00:06:16.436724 systemd-networkd[1178]: Enumeration completed Sep 6 00:06:16.436889 systemd[1]: Started systemd-networkd.service. Sep 6 00:06:16.439999 systemd-networkd[1178]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 00:06:16.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:16.445527 systemd[1]: Reached target network.target. Sep 6 00:06:16.448564 systemd-networkd[1178]: eth0: Link UP Sep 6 00:06:16.448585 systemd-networkd[1178]: eth0: Gained carrier Sep 6 00:06:16.453518 systemd[1]: Starting iscsiuio.service... Sep 6 00:06:16.469279 systemd[1]: Started iscsiuio.service. Sep 6 00:06:16.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:16.472372 systemd[1]: Starting iscsid.service... Sep 6 00:06:16.477797 systemd-networkd[1178]: eth0: DHCPv4 address 172.31.26.60/20, gateway 172.31.16.1 acquired from 172.31.16.1 Sep 6 00:06:16.487047 iscsid[1183]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 6 00:06:16.487047 iscsid[1183]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 6 00:06:16.487047 iscsid[1183]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 6 00:06:16.487047 iscsid[1183]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 6 00:06:16.487047 iscsid[1183]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 6 00:06:16.487047 iscsid[1183]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 6 00:06:16.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:16.498098 systemd[1]: Started iscsid.service. Sep 6 00:06:16.514966 systemd[1]: Starting dracut-initqueue.service... Sep 6 00:06:16.549173 systemd[1]: Finished dracut-initqueue.service. Sep 6 00:06:16.553123 systemd[1]: Reached target remote-fs-pre.target. Sep 6 00:06:16.559945 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 00:06:16.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:16.561956 systemd[1]: Reached target remote-fs.target. Sep 6 00:06:16.566414 systemd[1]: Starting dracut-pre-mount.service... Sep 6 00:06:16.587577 systemd[1]: Finished dracut-pre-mount.service. Sep 6 00:06:16.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:17.124972 ignition[1150]: Ignition 2.14.0 Sep 6 00:06:17.126760 ignition[1150]: Stage: fetch-offline Sep 6 00:06:17.128776 ignition[1150]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:06:17.131569 ignition[1150]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 6 00:06:17.150439 ignition[1150]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 6 00:06:17.151162 ignition[1150]: Ignition finished successfully Sep 6 00:06:17.156554 systemd[1]: Finished ignition-fetch-offline.service. Sep 6 00:06:17.171399 kernel: kauditd_printk_skb: 18 callbacks suppressed Sep 6 00:06:17.172952 kernel: audit: type=1130 audit(1757117177.157:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:17.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:17.160164 systemd[1]: Starting ignition-fetch.service... Sep 6 00:06:17.178931 ignition[1202]: Ignition 2.14.0 Sep 6 00:06:17.178950 ignition[1202]: Stage: fetch Sep 6 00:06:17.179370 ignition[1202]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:06:17.179506 ignition[1202]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 6 00:06:17.194419 ignition[1202]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 6 00:06:17.198389 ignition[1202]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 6 00:06:17.206545 ignition[1202]: INFO : PUT result: OK Sep 6 00:06:17.210505 ignition[1202]: DEBUG : parsed url from cmdline: "" Sep 6 00:06:17.212507 ignition[1202]: INFO : no config URL provided Sep 6 00:06:17.214331 ignition[1202]: INFO : reading system config file "/usr/lib/ignition/user.ign" Sep 6 00:06:17.216922 ignition[1202]: INFO : no config at "/usr/lib/ignition/user.ign" Sep 6 00:06:17.219097 ignition[1202]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 6 00:06:17.222466 ignition[1202]: INFO : PUT result: OK Sep 6 00:06:17.224371 ignition[1202]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Sep 6 00:06:17.227704 ignition[1202]: INFO : GET result: OK Sep 6 00:06:17.229781 ignition[1202]: DEBUG : parsing config with SHA512: ad60695622d7d27cd3ccbd08575bb4c797dd8477012dc2d6eea1d5e99ef4cb990dd9e220275fadab65f2bf63a7202118f4bee1218cb855dd71aa3778b4e1ccf1 Sep 6 00:06:17.236271 unknown[1202]: fetched base config from "system" Sep 6 00:06:17.237454 unknown[1202]: fetched base config from "system" Sep 6 00:06:17.239241 ignition[1202]: fetch: fetch complete Sep 6 00:06:17.237507 unknown[1202]: fetched user config from "aws" Sep 6 00:06:17.239286 ignition[1202]: fetch: fetch passed Sep 6 00:06:17.239419 ignition[1202]: Ignition finished successfully Sep 6 00:06:17.250843 systemd[1]: Finished ignition-fetch.service. Sep 6 00:06:17.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:17.255559 systemd[1]: Starting ignition-kargs.service... Sep 6 00:06:17.266955 kernel: audit: type=1130 audit(1757117177.253:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:17.278577 ignition[1208]: Ignition 2.14.0 Sep 6 00:06:17.278604 ignition[1208]: Stage: kargs Sep 6 00:06:17.278941 ignition[1208]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:06:17.279002 ignition[1208]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 6 00:06:17.294555 ignition[1208]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 6 00:06:17.296938 ignition[1208]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 6 00:06:17.301212 ignition[1208]: INFO : PUT result: OK Sep 6 00:06:17.305820 ignition[1208]: kargs: kargs passed Sep 6 00:06:17.306151 ignition[1208]: Ignition finished successfully Sep 6 00:06:17.310660 systemd[1]: Finished ignition-kargs.service. Sep 6 00:06:17.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:17.312288 systemd[1]: Starting ignition-disks.service... Sep 6 00:06:17.324895 ignition[1214]: Ignition 2.14.0 Sep 6 00:06:17.324956 ignition[1214]: Stage: disks Sep 6 00:06:17.335422 kernel: audit: type=1130 audit(1757117177.308:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:17.325363 ignition[1214]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:06:17.325442 ignition[1214]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 6 00:06:17.343661 ignition[1214]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 6 00:06:17.346166 ignition[1214]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 6 00:06:17.349467 ignition[1214]: INFO : PUT result: OK Sep 6 00:06:17.354458 ignition[1214]: disks: disks passed Sep 6 00:06:17.354765 ignition[1214]: Ignition finished successfully Sep 6 00:06:17.360129 systemd[1]: Finished ignition-disks.service. Sep 6 00:06:17.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:17.366127 systemd[1]: Reached target initrd-root-device.target. Sep 6 00:06:17.380119 kernel: audit: type=1130 audit(1757117177.363:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:17.374602 systemd[1]: Reached target local-fs-pre.target. Sep 6 00:06:17.376519 systemd[1]: Reached target local-fs.target. Sep 6 00:06:17.378275 systemd[1]: Reached target sysinit.target. Sep 6 00:06:17.381804 systemd[1]: Reached target basic.target. Sep 6 00:06:17.386643 systemd[1]: Starting systemd-fsck-root.service... Sep 6 00:06:17.437955 systemd-fsck[1222]: ROOT: clean, 629/553520 files, 56027/553472 blocks Sep 6 00:06:17.443708 systemd[1]: Finished systemd-fsck-root.service. Sep 6 00:06:17.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:17.450350 systemd[1]: Mounting sysroot.mount... Sep 6 00:06:17.457964 kernel: audit: type=1130 audit(1757117177.445:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:17.481981 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 6 00:06:17.482571 systemd[1]: Mounted sysroot.mount. Sep 6 00:06:17.483312 systemd[1]: Reached target initrd-root-fs.target. Sep 6 00:06:17.494865 systemd[1]: Mounting sysroot-usr.mount... Sep 6 00:06:17.499562 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Sep 6 00:06:17.499639 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 6 00:06:17.499695 systemd[1]: Reached target ignition-diskful.target. Sep 6 00:06:17.515272 systemd[1]: Mounted sysroot-usr.mount. Sep 6 00:06:17.547668 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 6 00:06:17.559048 systemd[1]: Starting initrd-setup-root.service... Sep 6 00:06:17.578334 initrd-setup-root[1244]: cut: /sysroot/etc/passwd: No such file or directory Sep 6 00:06:17.586955 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/nvme0n1p6 scanned by mount (1239) Sep 6 00:06:17.593858 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Sep 6 00:06:17.593931 kernel: BTRFS info (device nvme0n1p6): using free space tree Sep 6 00:06:17.596085 kernel: BTRFS info (device nvme0n1p6): has skinny extents Sep 6 00:06:17.599317 initrd-setup-root[1268]: cut: /sysroot/etc/group: No such file or directory Sep 6 00:06:17.608944 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Sep 6 00:06:17.611004 initrd-setup-root[1278]: cut: /sysroot/etc/shadow: No such file or directory Sep 6 00:06:17.622088 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 6 00:06:17.630324 initrd-setup-root[1286]: cut: /sysroot/etc/gshadow: No such file or directory Sep 6 00:06:17.709088 systemd-networkd[1178]: eth0: Gained IPv6LL Sep 6 00:06:17.836417 systemd[1]: Finished initrd-setup-root.service. Sep 6 00:06:17.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:17.841217 systemd[1]: Starting ignition-mount.service... Sep 6 00:06:17.856537 kernel: audit: type=1130 audit(1757117177.834:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:17.857072 systemd[1]: Starting sysroot-boot.service... Sep 6 00:06:17.869324 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Sep 6 00:06:17.872018 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Sep 6 00:06:17.891372 ignition[1304]: INFO : Ignition 2.14.0 Sep 6 00:06:17.891372 ignition[1304]: INFO : Stage: mount Sep 6 00:06:17.897948 ignition[1304]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:06:17.897948 ignition[1304]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 6 00:06:17.914220 ignition[1304]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 6 00:06:17.917026 ignition[1304]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 6 00:06:17.921495 ignition[1304]: INFO : PUT result: OK Sep 6 00:06:17.926565 ignition[1304]: INFO : mount: mount passed Sep 6 00:06:17.929725 ignition[1304]: INFO : Ignition finished successfully Sep 6 00:06:17.930420 systemd[1]: Finished sysroot-boot.service. Sep 6 00:06:17.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:17.936711 systemd[1]: Finished ignition-mount.service. Sep 6 00:06:17.955201 kernel: audit: type=1130 audit(1757117177.933:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:17.955240 kernel: audit: type=1130 audit(1757117177.942:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:17.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:17.945989 systemd[1]: Starting ignition-files.service... Sep 6 00:06:17.964953 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 6 00:06:17.989458 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by mount (1314) Sep 6 00:06:17.995146 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Sep 6 00:06:17.995189 kernel: BTRFS info (device nvme0n1p6): using free space tree Sep 6 00:06:17.995214 kernel: BTRFS info (device nvme0n1p6): has skinny extents Sep 6 00:06:18.011939 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Sep 6 00:06:18.017231 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 6 00:06:18.036662 ignition[1333]: INFO : Ignition 2.14.0 Sep 6 00:06:18.036662 ignition[1333]: INFO : Stage: files Sep 6 00:06:18.040293 ignition[1333]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:06:18.040293 ignition[1333]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 6 00:06:18.058826 ignition[1333]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 6 00:06:18.061579 ignition[1333]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 6 00:06:18.064931 ignition[1333]: INFO : PUT result: OK Sep 6 00:06:18.070244 ignition[1333]: DEBUG : files: compiled without relabeling support, skipping Sep 6 00:06:18.076352 ignition[1333]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 6 00:06:18.076352 ignition[1333]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 6 00:06:18.115036 ignition[1333]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 6 00:06:18.118445 ignition[1333]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 6 00:06:18.123333 unknown[1333]: wrote ssh authorized keys file for user: core Sep 6 00:06:18.125727 ignition[1333]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 6 00:06:18.136490 ignition[1333]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Sep 6 00:06:18.140371 ignition[1333]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 6 00:06:18.152442 ignition[1333]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3050706540" Sep 6 00:06:18.155663 ignition[1333]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3050706540": device or resource busy Sep 6 00:06:18.155663 ignition[1333]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3050706540", trying btrfs: device or resource busy Sep 6 00:06:18.155663 ignition[1333]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3050706540" Sep 6 00:06:18.155663 ignition[1333]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3050706540" Sep 6 00:06:18.181393 ignition[1333]: INFO : op(3): [started] unmounting "/mnt/oem3050706540" Sep 6 00:06:18.183869 ignition[1333]: INFO : op(3): [finished] unmounting "/mnt/oem3050706540" Sep 6 00:06:18.186473 ignition[1333]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Sep 6 00:06:18.190317 ignition[1333]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Sep 6 00:06:18.194350 ignition[1333]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Sep 6 00:06:18.194350 ignition[1333]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 00:06:18.202048 ignition[1333]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 00:06:18.202048 ignition[1333]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Sep 6 00:06:18.202048 ignition[1333]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Sep 6 00:06:18.202048 ignition[1333]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Sep 6 00:06:18.227369 ignition[1333]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 6 00:06:18.227369 ignition[1333]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1707656831" Sep 6 00:06:18.227369 ignition[1333]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1707656831": device or resource busy Sep 6 00:06:18.227369 ignition[1333]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1707656831", trying btrfs: device or resource busy Sep 6 00:06:18.227369 ignition[1333]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1707656831" Sep 6 00:06:18.227369 ignition[1333]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1707656831" Sep 6 00:06:18.257846 ignition[1333]: INFO : op(6): [started] unmounting "/mnt/oem1707656831" Sep 6 00:06:18.257846 ignition[1333]: INFO : op(6): [finished] unmounting "/mnt/oem1707656831" Sep 6 00:06:18.257846 ignition[1333]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Sep 6 00:06:18.257846 ignition[1333]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Sep 6 00:06:18.257846 ignition[1333]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 6 00:06:18.257846 ignition[1333]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem438190834" Sep 6 00:06:18.257846 ignition[1333]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem438190834": device or resource busy Sep 6 00:06:18.257846 ignition[1333]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem438190834", trying btrfs: device or resource busy Sep 6 00:06:18.257846 ignition[1333]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem438190834" Sep 6 00:06:18.257846 ignition[1333]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem438190834" Sep 6 00:06:18.257846 ignition[1333]: INFO : op(9): [started] unmounting "/mnt/oem438190834" Sep 6 00:06:18.257846 ignition[1333]: INFO : op(9): [finished] unmounting "/mnt/oem438190834" Sep 6 00:06:18.257846 ignition[1333]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Sep 6 00:06:18.298758 ignition[1333]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 6 00:06:18.298758 ignition[1333]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 6 00:06:18.311089 ignition[1333]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2144168566" Sep 6 00:06:18.317749 ignition[1333]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2144168566": device or resource busy Sep 6 00:06:18.317749 ignition[1333]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2144168566", trying btrfs: device or resource busy Sep 6 00:06:18.317749 ignition[1333]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2144168566" Sep 6 00:06:18.317749 ignition[1333]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2144168566" Sep 6 00:06:18.317749 ignition[1333]: INFO : op(c): [started] unmounting "/mnt/oem2144168566" Sep 6 00:06:18.317749 ignition[1333]: INFO : op(c): [finished] unmounting "/mnt/oem2144168566" Sep 6 00:06:18.317749 ignition[1333]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 6 00:06:18.317749 ignition[1333]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Sep 6 00:06:18.317749 ignition[1333]: INFO : GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-arm64.raw: attempt #1 Sep 6 00:06:18.917968 ignition[1333]: INFO : GET result: OK Sep 6 00:06:19.554363 ignition[1333]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Sep 6 00:06:19.559417 ignition[1333]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Sep 6 00:06:19.562840 ignition[1333]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Sep 6 00:06:19.562840 ignition[1333]: INFO : files: op(c): [started] processing unit "amazon-ssm-agent.service" Sep 6 00:06:19.562840 ignition[1333]: INFO : files: op(c): op(d): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Sep 6 00:06:19.562840 ignition[1333]: INFO : files: op(c): op(d): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Sep 6 00:06:19.562840 ignition[1333]: INFO : files: op(c): [finished] processing unit "amazon-ssm-agent.service" Sep 6 00:06:19.562840 ignition[1333]: INFO : files: op(e): [started] processing unit "nvidia.service" Sep 6 00:06:19.562840 ignition[1333]: INFO : files: op(e): [finished] processing unit "nvidia.service" Sep 6 00:06:19.562840 ignition[1333]: INFO : files: op(f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 6 00:06:19.562840 ignition[1333]: INFO : files: op(f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 6 00:06:19.562840 ignition[1333]: INFO : files: op(10): [started] setting preset to enabled for "amazon-ssm-agent.service" Sep 6 00:06:19.562840 ignition[1333]: INFO : files: op(10): [finished] setting preset to enabled for "amazon-ssm-agent.service" Sep 6 00:06:19.562840 ignition[1333]: INFO : files: op(11): [started] setting preset to enabled for "nvidia.service" Sep 6 00:06:19.562840 ignition[1333]: INFO : files: op(11): [finished] setting preset to enabled for "nvidia.service" Sep 6 00:06:19.647786 kernel: audit: type=1130 audit(1757117179.572:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.647827 kernel: audit: type=1130 audit(1757117179.633:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.572682 systemd[1]: Finished ignition-files.service. Sep 6 00:06:19.650364 ignition[1333]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 6 00:06:19.650364 ignition[1333]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 6 00:06:19.650364 ignition[1333]: INFO : files: files passed Sep 6 00:06:19.650364 ignition[1333]: INFO : Ignition finished successfully Sep 6 00:06:19.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.590259 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 6 00:06:19.617285 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 6 00:06:19.670255 initrd-setup-root-after-ignition[1358]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 6 00:06:19.619096 systemd[1]: Starting ignition-quench.service... Sep 6 00:06:19.632280 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 6 00:06:19.632475 systemd[1]: Finished ignition-quench.service. Sep 6 00:06:19.650233 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 6 00:06:19.660004 systemd[1]: Reached target ignition-complete.target. Sep 6 00:06:19.686608 systemd[1]: Starting initrd-parse-etc.service... Sep 6 00:06:19.713348 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 6 00:06:19.713592 systemd[1]: Finished initrd-parse-etc.service. Sep 6 00:06:19.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.721234 systemd[1]: Reached target initrd-fs.target. Sep 6 00:06:19.723408 systemd[1]: Reached target initrd.target. Sep 6 00:06:19.725163 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 6 00:06:19.726700 systemd[1]: Starting dracut-pre-pivot.service... Sep 6 00:06:19.756424 systemd[1]: Finished dracut-pre-pivot.service. Sep 6 00:06:19.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.763161 systemd[1]: Starting initrd-cleanup.service... Sep 6 00:06:19.784844 systemd[1]: Stopped target nss-lookup.target. Sep 6 00:06:19.788691 systemd[1]: Stopped target remote-cryptsetup.target. Sep 6 00:06:19.792615 systemd[1]: Stopped target timers.target. Sep 6 00:06:19.796077 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 6 00:06:19.796811 systemd[1]: Stopped dracut-pre-pivot.service. Sep 6 00:06:19.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.801851 systemd[1]: Stopped target initrd.target. Sep 6 00:06:19.805105 systemd[1]: Stopped target basic.target. Sep 6 00:06:19.810726 systemd[1]: Stopped target ignition-complete.target. Sep 6 00:06:19.814721 systemd[1]: Stopped target ignition-diskful.target. Sep 6 00:06:19.818564 systemd[1]: Stopped target initrd-root-device.target. Sep 6 00:06:19.822506 systemd[1]: Stopped target remote-fs.target. Sep 6 00:06:19.825976 systemd[1]: Stopped target remote-fs-pre.target. Sep 6 00:06:19.829838 systemd[1]: Stopped target sysinit.target. Sep 6 00:06:19.833115 systemd[1]: Stopped target local-fs.target. Sep 6 00:06:19.836512 systemd[1]: Stopped target local-fs-pre.target. Sep 6 00:06:19.841923 systemd[1]: Stopped target swap.target. Sep 6 00:06:19.845112 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 6 00:06:19.847445 systemd[1]: Stopped dracut-pre-mount.service. Sep 6 00:06:19.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.851235 systemd[1]: Stopped target cryptsetup.target. Sep 6 00:06:19.854617 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 6 00:06:19.856791 systemd[1]: Stopped dracut-initqueue.service. Sep 6 00:06:19.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.860415 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 6 00:06:19.863022 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 6 00:06:19.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.867329 systemd[1]: ignition-files.service: Deactivated successfully. Sep 6 00:06:19.869439 systemd[1]: Stopped ignition-files.service. Sep 6 00:06:19.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.880812 iscsid[1183]: iscsid shutting down. Sep 6 00:06:19.874423 systemd[1]: Stopping ignition-mount.service... Sep 6 00:06:19.879388 systemd[1]: Stopping iscsid.service... Sep 6 00:06:19.894181 systemd[1]: Stopping sysroot-boot.service... Sep 6 00:06:19.898967 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 6 00:06:19.903527 systemd[1]: Stopped systemd-udev-trigger.service. Sep 6 00:06:19.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.911346 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 6 00:06:19.914176 systemd[1]: Stopped dracut-pre-trigger.service. Sep 6 00:06:19.919935 ignition[1371]: INFO : Ignition 2.14.0 Sep 6 00:06:19.927028 ignition[1371]: INFO : Stage: umount Sep 6 00:06:19.927028 ignition[1371]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:06:19.927028 ignition[1371]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 6 00:06:19.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.949044 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 6 00:06:19.952854 systemd[1]: iscsid.service: Deactivated successfully. Sep 6 00:06:19.955530 systemd[1]: Stopped iscsid.service. Sep 6 00:06:19.960860 ignition[1371]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 6 00:06:19.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.967855 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 6 00:06:19.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.974288 ignition[1371]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 6 00:06:19.974288 ignition[1371]: INFO : PUT result: OK Sep 6 00:06:19.968052 systemd[1]: Stopped sysroot-boot.service. Sep 6 00:06:19.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:19.986943 ignition[1371]: INFO : umount: umount passed Sep 6 00:06:19.986943 ignition[1371]: INFO : Ignition finished successfully Sep 6 00:06:19.971611 systemd[1]: Stopping iscsiuio.service... Sep 6 00:06:19.980093 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 6 00:06:19.980291 systemd[1]: Finished initrd-cleanup.service. Sep 6 00:06:19.996275 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 6 00:06:19.998398 systemd[1]: Stopped iscsiuio.service. Sep 6 00:06:20.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.001851 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 6 00:06:20.004088 systemd[1]: Stopped ignition-mount.service. Sep 6 00:06:20.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.008899 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 6 00:06:20.009026 systemd[1]: Stopped ignition-disks.service. Sep 6 00:06:20.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.012757 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 6 00:06:20.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.014327 systemd[1]: Stopped ignition-kargs.service. Sep 6 00:06:20.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.016163 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 6 00:06:20.018140 systemd[1]: Stopped ignition-fetch.service. Sep 6 00:06:20.023557 systemd[1]: Stopped target network.target. Sep 6 00:06:20.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.025337 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 6 00:06:20.026970 systemd[1]: Stopped ignition-fetch-offline.service. Sep 6 00:06:20.032672 systemd[1]: Stopped target paths.target. Sep 6 00:06:20.034346 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 6 00:06:20.041993 systemd[1]: Stopped systemd-ask-password-console.path. Sep 6 00:06:20.047880 systemd[1]: Stopped target slices.target. Sep 6 00:06:20.049581 systemd[1]: Stopped target sockets.target. Sep 6 00:06:20.052859 systemd[1]: iscsid.socket: Deactivated successfully. Sep 6 00:06:20.056240 systemd[1]: Closed iscsid.socket. Sep 6 00:06:20.057894 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 6 00:06:20.061253 systemd[1]: Closed iscsiuio.socket. Sep 6 00:06:20.064161 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 6 00:06:20.064260 systemd[1]: Stopped ignition-setup.service. Sep 6 00:06:20.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.067872 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 6 00:06:20.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.069474 systemd[1]: Stopped initrd-setup-root.service. Sep 6 00:06:20.073838 systemd[1]: Stopping systemd-networkd.service... Sep 6 00:06:20.081622 systemd[1]: Stopping systemd-resolved.service... Sep 6 00:06:20.081965 systemd-networkd[1178]: eth0: DHCPv6 lease lost Sep 6 00:06:20.085399 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 6 00:06:20.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.087235 systemd[1]: Stopped systemd-networkd.service. Sep 6 00:06:20.093168 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 6 00:06:20.092000 audit: BPF prog-id=9 op=UNLOAD Sep 6 00:06:20.093240 systemd[1]: Closed systemd-networkd.socket. Sep 6 00:06:20.101307 systemd[1]: Stopping network-cleanup.service... Sep 6 00:06:20.106282 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 6 00:06:20.108769 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 6 00:06:20.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.114106 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 6 00:06:20.114214 systemd[1]: Stopped systemd-sysctl.service. Sep 6 00:06:20.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.119526 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 6 00:06:20.119607 systemd[1]: Stopped systemd-modules-load.service. Sep 6 00:06:20.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.125469 systemd[1]: Stopping systemd-udevd.service... Sep 6 00:06:20.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.141000 audit: BPF prog-id=6 op=UNLOAD Sep 6 00:06:20.133403 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 6 00:06:20.134457 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 6 00:06:20.134643 systemd[1]: Stopped systemd-resolved.service. Sep 6 00:06:20.144215 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 6 00:06:20.144423 systemd[1]: Stopped network-cleanup.service. Sep 6 00:06:20.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.159681 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 6 00:06:20.160055 systemd[1]: Stopped systemd-udevd.service. Sep 6 00:06:20.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.164605 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 6 00:06:20.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.164683 systemd[1]: Closed systemd-udevd-control.socket. Sep 6 00:06:20.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.167383 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 6 00:06:20.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.167456 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 6 00:06:20.169340 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 6 00:06:20.169422 systemd[1]: Stopped dracut-pre-udev.service. Sep 6 00:06:20.171333 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 6 00:06:20.171578 systemd[1]: Stopped dracut-cmdline.service. Sep 6 00:06:20.175626 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 6 00:06:20.176154 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 6 00:06:20.180422 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 6 00:06:20.206106 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 6 00:06:20.208494 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Sep 6 00:06:20.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.216958 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 6 00:06:20.217059 systemd[1]: Stopped kmod-static-nodes.service. Sep 6 00:06:20.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.222601 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 6 00:06:20.222700 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 6 00:06:20.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.230409 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Sep 6 00:06:20.234300 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 6 00:06:20.236672 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 6 00:06:20.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:20.240768 systemd[1]: Reached target initrd-switch-root.target. Sep 6 00:06:20.245817 systemd[1]: Starting initrd-switch-root.service... Sep 6 00:06:20.262135 systemd[1]: Switching root. Sep 6 00:06:20.289357 systemd-journald[310]: Journal stopped Sep 6 00:06:26.297854 systemd-journald[310]: Received SIGTERM from PID 1 (systemd). Sep 6 00:06:26.298006 kernel: SELinux: Class mctp_socket not defined in policy. Sep 6 00:06:26.298050 kernel: SELinux: Class anon_inode not defined in policy. Sep 6 00:06:26.298082 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 6 00:06:26.298113 kernel: SELinux: policy capability network_peer_controls=1 Sep 6 00:06:26.298143 kernel: SELinux: policy capability open_perms=1 Sep 6 00:06:26.298182 kernel: SELinux: policy capability extended_socket_class=1 Sep 6 00:06:26.298213 kernel: SELinux: policy capability always_check_network=0 Sep 6 00:06:26.298246 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 6 00:06:26.298277 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 6 00:06:26.298307 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 6 00:06:26.298341 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 6 00:06:26.298372 systemd[1]: Successfully loaded SELinux policy in 131.822ms. Sep 6 00:06:26.298427 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 19.731ms. Sep 6 00:06:26.298463 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 00:06:26.298494 systemd[1]: Detected virtualization amazon. Sep 6 00:06:26.298527 systemd[1]: Detected architecture arm64. Sep 6 00:06:26.298560 systemd[1]: Detected first boot. Sep 6 00:06:26.299649 systemd[1]: Initializing machine ID from VM UUID. Sep 6 00:06:26.299704 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 6 00:06:26.299740 systemd[1]: Populated /etc with preset unit settings. Sep 6 00:06:26.299772 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 00:06:26.299809 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 00:06:26.299845 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 00:06:26.299881 kernel: kauditd_printk_skb: 57 callbacks suppressed Sep 6 00:06:26.299961 kernel: audit: type=1334 audit(1757117185.871:89): prog-id=12 op=LOAD Sep 6 00:06:26.300000 kernel: audit: type=1334 audit(1757117185.871:90): prog-id=3 op=UNLOAD Sep 6 00:06:26.300031 kernel: audit: type=1334 audit(1757117185.873:91): prog-id=13 op=LOAD Sep 6 00:06:26.300061 kernel: audit: type=1334 audit(1757117185.875:92): prog-id=14 op=LOAD Sep 6 00:06:26.300092 kernel: audit: type=1334 audit(1757117185.875:93): prog-id=4 op=UNLOAD Sep 6 00:06:26.300122 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 6 00:06:26.300154 kernel: audit: type=1334 audit(1757117185.875:94): prog-id=5 op=UNLOAD Sep 6 00:06:26.300189 systemd[1]: Stopped initrd-switch-root.service. Sep 6 00:06:26.300218 kernel: audit: type=1334 audit(1757117185.878:95): prog-id=15 op=LOAD Sep 6 00:06:26.300257 kernel: audit: type=1334 audit(1757117185.878:96): prog-id=12 op=UNLOAD Sep 6 00:06:26.300288 kernel: audit: type=1334 audit(1757117185.881:97): prog-id=16 op=LOAD Sep 6 00:06:26.300356 kernel: audit: type=1334 audit(1757117185.883:98): prog-id=17 op=LOAD Sep 6 00:06:26.300391 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 6 00:06:26.300424 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 6 00:06:26.300456 systemd[1]: Created slice system-addon\x2drun.slice. Sep 6 00:06:26.300488 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Sep 6 00:06:26.300523 systemd[1]: Created slice system-getty.slice. Sep 6 00:06:26.300555 systemd[1]: Created slice system-modprobe.slice. Sep 6 00:06:26.300585 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 6 00:06:26.300620 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 6 00:06:26.300652 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 6 00:06:26.300682 systemd[1]: Created slice user.slice. Sep 6 00:06:26.300712 systemd[1]: Started systemd-ask-password-console.path. Sep 6 00:06:26.300742 systemd[1]: Started systemd-ask-password-wall.path. Sep 6 00:06:26.300775 systemd[1]: Set up automount boot.automount. Sep 6 00:06:26.300808 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 6 00:06:26.300839 systemd[1]: Stopped target initrd-switch-root.target. Sep 6 00:06:26.300873 systemd[1]: Stopped target initrd-fs.target. Sep 6 00:06:26.300928 systemd[1]: Stopped target initrd-root-fs.target. Sep 6 00:06:26.300966 systemd[1]: Reached target integritysetup.target. Sep 6 00:06:26.301003 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 00:06:26.301035 systemd[1]: Reached target remote-fs.target. Sep 6 00:06:26.301068 systemd[1]: Reached target slices.target. Sep 6 00:06:26.301098 systemd[1]: Reached target swap.target. Sep 6 00:06:26.301127 systemd[1]: Reached target torcx.target. Sep 6 00:06:26.301163 systemd[1]: Reached target veritysetup.target. Sep 6 00:06:26.301194 systemd[1]: Listening on systemd-coredump.socket. Sep 6 00:06:26.301226 systemd[1]: Listening on systemd-initctl.socket. Sep 6 00:06:26.301256 systemd[1]: Listening on systemd-networkd.socket. Sep 6 00:06:26.301286 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 00:06:26.301315 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 00:06:26.301345 systemd[1]: Listening on systemd-userdbd.socket. Sep 6 00:06:26.301374 systemd[1]: Mounting dev-hugepages.mount... Sep 6 00:06:26.301406 systemd[1]: Mounting dev-mqueue.mount... Sep 6 00:06:26.301440 systemd[1]: Mounting media.mount... Sep 6 00:06:26.301471 systemd[1]: Mounting sys-kernel-debug.mount... Sep 6 00:06:26.301504 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 6 00:06:26.301533 systemd[1]: Mounting tmp.mount... Sep 6 00:06:26.301565 systemd[1]: Starting flatcar-tmpfiles.service... Sep 6 00:06:26.301595 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:06:26.301628 systemd[1]: Starting kmod-static-nodes.service... Sep 6 00:06:26.301662 systemd[1]: Starting modprobe@configfs.service... Sep 6 00:06:26.301692 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:06:26.301725 systemd[1]: Starting modprobe@drm.service... Sep 6 00:06:26.301757 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:06:26.301787 systemd[1]: Starting modprobe@fuse.service... Sep 6 00:06:26.301819 systemd[1]: Starting modprobe@loop.service... Sep 6 00:06:26.301854 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 6 00:06:26.301886 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 6 00:06:26.301948 systemd[1]: Stopped systemd-fsck-root.service. Sep 6 00:06:26.301985 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 6 00:06:26.302015 systemd[1]: Stopped systemd-fsck-usr.service. Sep 6 00:06:26.302049 systemd[1]: Stopped systemd-journald.service. Sep 6 00:06:26.302081 systemd[1]: Starting systemd-journald.service... Sep 6 00:06:26.302112 systemd[1]: Starting systemd-modules-load.service... Sep 6 00:06:26.302142 systemd[1]: Starting systemd-network-generator.service... Sep 6 00:06:26.302172 kernel: fuse: init (API version 7.34) Sep 6 00:06:26.302201 systemd[1]: Starting systemd-remount-fs.service... Sep 6 00:06:26.302233 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 00:06:26.302265 systemd[1]: verity-setup.service: Deactivated successfully. Sep 6 00:06:26.302329 systemd[1]: Stopped verity-setup.service. Sep 6 00:06:26.302370 kernel: loop: module loaded Sep 6 00:06:26.302405 systemd[1]: Mounted dev-hugepages.mount. Sep 6 00:06:26.302437 systemd[1]: Mounted dev-mqueue.mount. Sep 6 00:06:26.302467 systemd[1]: Mounted media.mount. Sep 6 00:06:26.302505 systemd[1]: Mounted sys-kernel-debug.mount. Sep 6 00:06:26.302536 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 6 00:06:26.302569 systemd[1]: Mounted tmp.mount. Sep 6 00:06:26.302599 systemd[1]: Finished kmod-static-nodes.service. Sep 6 00:06:26.302648 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 6 00:06:26.302682 systemd[1]: Finished modprobe@configfs.service. Sep 6 00:06:26.302716 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:06:26.302746 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:06:26.302779 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 00:06:26.302812 systemd[1]: Finished modprobe@drm.service. Sep 6 00:06:26.302849 systemd-journald[1486]: Journal started Sep 6 00:06:26.302998 systemd-journald[1486]: Runtime Journal (/run/log/journal/ec255fa7bbcd93b44bf54c15d5b19783) is 8.0M, max 75.4M, 67.4M free. Sep 6 00:06:21.179000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 6 00:06:21.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 00:06:21.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 00:06:21.364000 audit: BPF prog-id=10 op=LOAD Sep 6 00:06:21.365000 audit: BPF prog-id=10 op=UNLOAD Sep 6 00:06:21.365000 audit: BPF prog-id=11 op=LOAD Sep 6 00:06:21.365000 audit: BPF prog-id=11 op=UNLOAD Sep 6 00:06:21.579000 audit[1404]: AVC avc: denied { associate } for pid=1404 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 6 00:06:21.579000 audit[1404]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1387 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:21.579000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 00:06:21.584000 audit[1404]: AVC avc: denied { associate } for pid=1404 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 6 00:06:21.584000 audit[1404]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145979 a2=1ed a3=0 items=2 ppid=1387 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:21.584000 audit: CWD cwd="/" Sep 6 00:06:21.584000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:06:21.584000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:06:21.584000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 00:06:25.871000 audit: BPF prog-id=12 op=LOAD Sep 6 00:06:25.871000 audit: BPF prog-id=3 op=UNLOAD Sep 6 00:06:25.873000 audit: BPF prog-id=13 op=LOAD Sep 6 00:06:25.875000 audit: BPF prog-id=14 op=LOAD Sep 6 00:06:25.875000 audit: BPF prog-id=4 op=UNLOAD Sep 6 00:06:25.875000 audit: BPF prog-id=5 op=UNLOAD Sep 6 00:06:25.878000 audit: BPF prog-id=15 op=LOAD Sep 6 00:06:25.878000 audit: BPF prog-id=12 op=UNLOAD Sep 6 00:06:25.881000 audit: BPF prog-id=16 op=LOAD Sep 6 00:06:25.883000 audit: BPF prog-id=17 op=LOAD Sep 6 00:06:25.883000 audit: BPF prog-id=13 op=UNLOAD Sep 6 00:06:25.883000 audit: BPF prog-id=14 op=UNLOAD Sep 6 00:06:25.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:25.894000 audit: BPF prog-id=15 op=UNLOAD Sep 6 00:06:25.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:25.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.188000 audit: BPF prog-id=18 op=LOAD Sep 6 00:06:26.189000 audit: BPF prog-id=19 op=LOAD Sep 6 00:06:26.189000 audit: BPF prog-id=20 op=LOAD Sep 6 00:06:26.189000 audit: BPF prog-id=16 op=UNLOAD Sep 6 00:06:26.189000 audit: BPF prog-id=17 op=UNLOAD Sep 6 00:06:26.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.291000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 6 00:06:26.309125 systemd[1]: Started systemd-journald.service. Sep 6 00:06:26.291000 audit[1486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffda4d9910 a2=4000 a3=1 items=0 ppid=1 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:26.291000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 6 00:06:26.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:25.868871 systemd[1]: Queued start job for default target multi-user.target. Sep 6 00:06:21.576315 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 00:06:26.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:25.868892 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. Sep 6 00:06:21.576861 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:21Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 00:06:25.886422 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 6 00:06:21.576930 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:21Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 00:06:26.309763 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:06:21.576996 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:21Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 6 00:06:26.310081 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:06:21.577022 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:21Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 6 00:06:26.312544 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 6 00:06:21.577079 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:21Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 6 00:06:26.312792 systemd[1]: Finished modprobe@fuse.service. Sep 6 00:06:21.577109 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:21Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 6 00:06:26.315301 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:06:21.577499 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:21Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 6 00:06:26.315569 systemd[1]: Finished modprobe@loop.service. Sep 6 00:06:21.577572 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:21Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 00:06:26.318012 systemd[1]: Finished systemd-modules-load.service. Sep 6 00:06:21.577608 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:21Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 00:06:26.320714 systemd[1]: Finished systemd-network-generator.service. Sep 6 00:06:21.579782 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:21Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 6 00:06:26.323270 systemd[1]: Finished systemd-remount-fs.service. Sep 6 00:06:21.579866 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:21Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 6 00:06:26.325831 systemd[1]: Reached target network-pre.target. Sep 6 00:06:21.579937 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:21Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 6 00:06:26.329989 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 6 00:06:21.579982 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:21Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 6 00:06:26.335147 systemd[1]: Mounting sys-kernel-config.mount... Sep 6 00:06:21.580032 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:21Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 6 00:06:26.342284 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 6 00:06:21.580072 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:21Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 6 00:06:24.957657 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:24Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:06:24.958203 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:24Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:06:24.958431 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:24Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:06:24.958887 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:24Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:06:24.959027 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:24Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 6 00:06:24.959161 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2025-09-06T00:06:24Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 6 00:06:26.346371 systemd[1]: Starting systemd-hwdb-update.service... Sep 6 00:06:26.350365 systemd[1]: Starting systemd-journal-flush.service... Sep 6 00:06:26.352275 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:06:26.354475 systemd[1]: Starting systemd-random-seed.service... Sep 6 00:06:26.356349 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:06:26.359140 systemd[1]: Starting systemd-sysctl.service... Sep 6 00:06:26.366185 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 6 00:06:26.368754 systemd[1]: Mounted sys-kernel-config.mount. Sep 6 00:06:26.396828 systemd-journald[1486]: Time spent on flushing to /var/log/journal/ec255fa7bbcd93b44bf54c15d5b19783 is 79.141ms for 1121 entries. Sep 6 00:06:26.396828 systemd-journald[1486]: System Journal (/var/log/journal/ec255fa7bbcd93b44bf54c15d5b19783) is 8.0M, max 195.6M, 187.6M free. Sep 6 00:06:26.498210 systemd-journald[1486]: Received client request to flush runtime journal. Sep 6 00:06:26.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.408133 systemd[1]: Finished systemd-random-seed.service. Sep 6 00:06:26.410594 systemd[1]: Reached target first-boot-complete.target. Sep 6 00:06:26.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.455001 systemd[1]: Finished systemd-sysctl.service. Sep 6 00:06:26.478339 systemd[1]: Finished flatcar-tmpfiles.service. Sep 6 00:06:26.482529 systemd[1]: Starting systemd-sysusers.service... Sep 6 00:06:26.500185 systemd[1]: Finished systemd-journal-flush.service. Sep 6 00:06:26.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.534493 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 00:06:26.538783 systemd[1]: Starting systemd-udev-settle.service... Sep 6 00:06:26.555366 udevadm[1522]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Sep 6 00:06:26.632161 systemd[1]: Finished systemd-sysusers.service. Sep 6 00:06:26.636490 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 6 00:06:26.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:26.756916 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 6 00:06:26.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:27.288849 systemd[1]: Finished systemd-hwdb-update.service. Sep 6 00:06:27.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:27.291000 audit: BPF prog-id=21 op=LOAD Sep 6 00:06:27.291000 audit: BPF prog-id=22 op=LOAD Sep 6 00:06:27.291000 audit: BPF prog-id=7 op=UNLOAD Sep 6 00:06:27.291000 audit: BPF prog-id=8 op=UNLOAD Sep 6 00:06:27.294347 systemd[1]: Starting systemd-udevd.service... Sep 6 00:06:27.332045 systemd-udevd[1525]: Using default interface naming scheme 'v252'. Sep 6 00:06:27.399059 systemd[1]: Started systemd-udevd.service. Sep 6 00:06:27.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:27.400000 audit: BPF prog-id=23 op=LOAD Sep 6 00:06:27.403940 systemd[1]: Starting systemd-networkd.service... Sep 6 00:06:27.420000 audit: BPF prog-id=24 op=LOAD Sep 6 00:06:27.420000 audit: BPF prog-id=25 op=LOAD Sep 6 00:06:27.420000 audit: BPF prog-id=26 op=LOAD Sep 6 00:06:27.423936 systemd[1]: Starting systemd-userdbd.service... Sep 6 00:06:27.488598 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 6 00:06:27.498324 (udev-worker)[1536]: Network interface NamePolicy= disabled on kernel command line. Sep 6 00:06:27.502077 systemd[1]: Started systemd-userdbd.service. Sep 6 00:06:27.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:27.712649 systemd-networkd[1528]: lo: Link UP Sep 6 00:06:27.712672 systemd-networkd[1528]: lo: Gained carrier Sep 6 00:06:27.713663 systemd-networkd[1528]: Enumeration completed Sep 6 00:06:27.713836 systemd[1]: Started systemd-networkd.service. Sep 6 00:06:27.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:27.716132 systemd-networkd[1528]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 00:06:27.718049 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 6 00:06:27.725963 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:06:27.725358 systemd-networkd[1528]: eth0: Link UP Sep 6 00:06:27.725697 systemd-networkd[1528]: eth0: Gained carrier Sep 6 00:06:27.740172 systemd-networkd[1528]: eth0: DHCPv4 address 172.31.26.60/20, gateway 172.31.16.1 acquired from 172.31.16.1 Sep 6 00:06:27.871250 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 00:06:27.879633 systemd[1]: Finished systemd-udev-settle.service. Sep 6 00:06:27.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:27.883953 systemd[1]: Starting lvm2-activation-early.service... Sep 6 00:06:27.939313 lvm[1644]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 00:06:27.978724 systemd[1]: Finished lvm2-activation-early.service. Sep 6 00:06:27.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:27.980796 systemd[1]: Reached target cryptsetup.target. Sep 6 00:06:27.984594 systemd[1]: Starting lvm2-activation.service... Sep 6 00:06:27.993890 lvm[1645]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 00:06:28.033559 systemd[1]: Finished lvm2-activation.service. Sep 6 00:06:28.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:28.035684 systemd[1]: Reached target local-fs-pre.target. Sep 6 00:06:28.037561 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 6 00:06:28.037601 systemd[1]: Reached target local-fs.target. Sep 6 00:06:28.039439 systemd[1]: Reached target machines.target. Sep 6 00:06:28.043634 systemd[1]: Starting ldconfig.service... Sep 6 00:06:28.046285 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:06:28.046433 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:06:28.049049 systemd[1]: Starting systemd-boot-update.service... Sep 6 00:06:28.053387 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 6 00:06:28.059363 systemd[1]: Starting systemd-machine-id-commit.service... Sep 6 00:06:28.065439 systemd[1]: Starting systemd-sysext.service... Sep 6 00:06:28.088077 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1647 (bootctl) Sep 6 00:06:28.090489 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 6 00:06:28.099969 systemd[1]: Unmounting usr-share-oem.mount... Sep 6 00:06:28.120717 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 6 00:06:28.121142 systemd[1]: Unmounted usr-share-oem.mount. Sep 6 00:06:28.145228 kernel: loop0: detected capacity change from 0 to 211168 Sep 6 00:06:28.150070 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 6 00:06:28.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:28.231074 systemd-fsck[1658]: fsck.fat 4.2 (2021-01-31) Sep 6 00:06:28.231074 systemd-fsck[1658]: /dev/nvme0n1p1: 236 files, 117310/258078 clusters Sep 6 00:06:28.234463 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 6 00:06:28.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:28.239416 systemd[1]: Mounting boot.mount... Sep 6 00:06:28.277017 systemd[1]: Mounted boot.mount. Sep 6 00:06:28.300963 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 6 00:06:28.311101 systemd[1]: Finished systemd-boot-update.service. Sep 6 00:06:28.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:28.335053 kernel: loop1: detected capacity change from 0 to 211168 Sep 6 00:06:28.355467 (sd-sysext)[1673]: Using extensions 'kubernetes'. Sep 6 00:06:28.356747 (sd-sysext)[1673]: Merged extensions into '/usr'. Sep 6 00:06:28.397893 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 6 00:06:28.399830 systemd[1]: Finished systemd-machine-id-commit.service. Sep 6 00:06:28.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:28.405419 systemd[1]: Mounting usr-share-oem.mount... Sep 6 00:06:28.407469 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:06:28.413655 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:06:28.418052 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:06:28.423735 systemd[1]: Starting modprobe@loop.service... Sep 6 00:06:28.425639 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:06:28.427046 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:06:28.434424 systemd[1]: Mounted usr-share-oem.mount. Sep 6 00:06:28.437010 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:06:28.437311 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:06:28.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:28.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:28.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:28.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:28.440031 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:06:28.440286 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:06:28.443073 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:06:28.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:28.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:28.443361 systemd[1]: Finished modprobe@loop.service. Sep 6 00:06:28.446055 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:06:28.446266 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:06:28.449707 systemd[1]: Finished systemd-sysext.service. Sep 6 00:06:28.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:28.454204 systemd[1]: Starting ensure-sysext.service... Sep 6 00:06:28.462452 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 6 00:06:28.471258 systemd[1]: Reloading. Sep 6 00:06:28.486003 systemd-tmpfiles[1680]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 6 00:06:28.488937 systemd-tmpfiles[1680]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 6 00:06:28.501888 systemd-tmpfiles[1680]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 6 00:06:28.594708 /usr/lib/systemd/system-generators/torcx-generator[1699]: time="2025-09-06T00:06:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 00:06:28.597530 /usr/lib/systemd/system-generators/torcx-generator[1699]: time="2025-09-06T00:06:28Z" level=info msg="torcx already run" Sep 6 00:06:28.781049 systemd-networkd[1528]: eth0: Gained IPv6LL Sep 6 00:06:28.830218 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 00:06:28.830255 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 00:06:28.884564 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 00:06:29.027000 audit: BPF prog-id=27 op=LOAD Sep 6 00:06:29.027000 audit: BPF prog-id=23 op=UNLOAD Sep 6 00:06:29.031000 audit: BPF prog-id=28 op=LOAD Sep 6 00:06:29.031000 audit: BPF prog-id=18 op=UNLOAD Sep 6 00:06:29.031000 audit: BPF prog-id=29 op=LOAD Sep 6 00:06:29.032000 audit: BPF prog-id=30 op=LOAD Sep 6 00:06:29.032000 audit: BPF prog-id=19 op=UNLOAD Sep 6 00:06:29.032000 audit: BPF prog-id=20 op=UNLOAD Sep 6 00:06:29.036000 audit: BPF prog-id=31 op=LOAD Sep 6 00:06:29.036000 audit: BPF prog-id=32 op=LOAD Sep 6 00:06:29.037000 audit: BPF prog-id=21 op=UNLOAD Sep 6 00:06:29.037000 audit: BPF prog-id=22 op=UNLOAD Sep 6 00:06:29.040000 audit: BPF prog-id=33 op=LOAD Sep 6 00:06:29.040000 audit: BPF prog-id=24 op=UNLOAD Sep 6 00:06:29.041000 audit: BPF prog-id=34 op=LOAD Sep 6 00:06:29.041000 audit: BPF prog-id=35 op=LOAD Sep 6 00:06:29.041000 audit: BPF prog-id=25 op=UNLOAD Sep 6 00:06:29.041000 audit: BPF prog-id=26 op=UNLOAD Sep 6 00:06:29.061844 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 6 00:06:29.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:29.067297 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 6 00:06:29.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:29.084892 systemd[1]: Starting audit-rules.service... Sep 6 00:06:29.093431 systemd[1]: Starting clean-ca-certificates.service... Sep 6 00:06:29.098452 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 6 00:06:29.102000 audit: BPF prog-id=36 op=LOAD Sep 6 00:06:29.106583 systemd[1]: Starting systemd-resolved.service... Sep 6 00:06:29.108000 audit: BPF prog-id=37 op=LOAD Sep 6 00:06:29.113435 systemd[1]: Starting systemd-timesyncd.service... Sep 6 00:06:29.117761 systemd[1]: Starting systemd-update-utmp.service... Sep 6 00:06:29.131363 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:06:29.136834 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:06:29.142471 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:06:29.146951 systemd[1]: Starting modprobe@loop.service... Sep 6 00:06:29.148729 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:06:29.149106 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:06:29.155818 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:06:29.156188 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:06:29.156409 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:06:29.155000 audit[1762]: SYSTEM_BOOT pid=1762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 6 00:06:29.160653 systemd[1]: Finished clean-ca-certificates.service. Sep 6 00:06:29.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:29.171320 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:06:29.178198 systemd[1]: Starting modprobe@drm.service... Sep 6 00:06:29.180214 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:06:29.180538 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:06:29.180875 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 00:06:29.182595 systemd[1]: Finished systemd-update-utmp.service. Sep 6 00:06:29.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:29.185655 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:06:29.185986 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:06:29.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:29.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:29.191312 systemd[1]: Finished ensure-sysext.service. Sep 6 00:06:29.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:29.195779 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:06:29.196381 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:06:29.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:29.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:29.200508 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:06:29.206515 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 00:06:29.206833 systemd[1]: Finished modprobe@drm.service. Sep 6 00:06:29.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:29.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:29.211660 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:06:29.211979 systemd[1]: Finished modprobe@loop.service. Sep 6 00:06:29.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:29.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:29.214727 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:06:29.266555 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 6 00:06:29.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:29.322514 augenrules[1780]: No rules Sep 6 00:06:29.320000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 6 00:06:29.320000 audit[1780]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdac414e0 a2=420 a3=0 items=0 ppid=1756 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:29.320000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 6 00:06:29.325614 systemd[1]: Finished audit-rules.service. Sep 6 00:06:29.341984 systemd-resolved[1760]: Positive Trust Anchors: Sep 6 00:06:29.342012 systemd-resolved[1760]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 00:06:29.342065 systemd-resolved[1760]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 00:06:29.361010 systemd[1]: Started systemd-timesyncd.service. Sep 6 00:06:29.363254 systemd[1]: Reached target time-set.target. Sep 6 00:06:29.401459 systemd-resolved[1760]: Defaulting to hostname 'linux'. Sep 6 00:06:29.404523 systemd[1]: Started systemd-resolved.service. Sep 6 00:06:29.406623 systemd[1]: Reached target network.target. Sep 6 00:06:29.412009 ldconfig[1646]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 6 00:06:29.413377 systemd[1]: Reached target network-online.target. Sep 6 00:06:29.415505 systemd[1]: Reached target nss-lookup.target. Sep 6 00:06:29.422728 systemd[1]: Finished ldconfig.service. Sep 6 00:06:29.426809 systemd[1]: Starting systemd-update-done.service... Sep 6 00:06:29.431202 systemd-timesyncd[1761]: Contacted time server 23.150.40.242:123 (0.flatcar.pool.ntp.org). Sep 6 00:06:29.431317 systemd-timesyncd[1761]: Initial clock synchronization to Sat 2025-09-06 00:06:29.386195 UTC. Sep 6 00:06:29.441852 systemd[1]: Finished systemd-update-done.service. Sep 6 00:06:29.444257 systemd[1]: Reached target sysinit.target. Sep 6 00:06:29.446419 systemd[1]: Started motdgen.path. Sep 6 00:06:29.448182 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 6 00:06:29.450971 systemd[1]: Started logrotate.timer. Sep 6 00:06:29.452843 systemd[1]: Started mdadm.timer. Sep 6 00:06:29.454467 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 6 00:06:29.456425 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 6 00:06:29.456487 systemd[1]: Reached target paths.target. Sep 6 00:06:29.458301 systemd[1]: Reached target timers.target. Sep 6 00:06:29.460593 systemd[1]: Listening on dbus.socket. Sep 6 00:06:29.464445 systemd[1]: Starting docker.socket... Sep 6 00:06:29.471167 systemd[1]: Listening on sshd.socket. Sep 6 00:06:29.473185 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:06:29.474108 systemd[1]: Listening on docker.socket. Sep 6 00:06:29.476019 systemd[1]: Reached target sockets.target. Sep 6 00:06:29.477797 systemd[1]: Reached target basic.target. Sep 6 00:06:29.479606 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 00:06:29.479672 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 00:06:29.481783 systemd[1]: Started amazon-ssm-agent.service. Sep 6 00:06:29.487025 systemd[1]: Starting containerd.service... Sep 6 00:06:29.492345 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Sep 6 00:06:29.497673 systemd[1]: Starting dbus.service... Sep 6 00:06:29.501254 systemd[1]: Starting enable-oem-cloudinit.service... Sep 6 00:06:29.505410 systemd[1]: Starting extend-filesystems.service... Sep 6 00:06:29.507881 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 6 00:06:29.522570 systemd[1]: Starting kubelet.service... Sep 6 00:06:29.531232 systemd[1]: Starting motdgen.service... Sep 6 00:06:29.547642 systemd[1]: Started nvidia.service. Sep 6 00:06:29.552617 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 6 00:06:29.556701 systemd[1]: Starting sshd-keygen.service... Sep 6 00:06:29.564467 systemd[1]: Starting systemd-logind.service... Sep 6 00:06:29.566205 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:06:29.566316 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 6 00:06:29.567337 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 6 00:06:29.569662 systemd[1]: Starting update-engine.service... Sep 6 00:06:29.574835 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 6 00:06:29.586325 jq[1793]: false Sep 6 00:06:29.590045 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 6 00:06:29.590463 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 6 00:06:29.635751 jq[1805]: true Sep 6 00:06:29.635934 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 6 00:06:29.636325 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 6 00:06:29.664124 jq[1812]: true Sep 6 00:06:29.807273 dbus-daemon[1792]: [system] SELinux support is enabled Sep 6 00:06:29.809677 systemd[1]: Started dbus.service. Sep 6 00:06:29.815210 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 6 00:06:29.815265 systemd[1]: Reached target system-config.target. Sep 6 00:06:29.817267 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 6 00:06:29.817302 systemd[1]: Reached target user-config.target. Sep 6 00:06:29.819435 bash[1841]: Updated "/home/core/.ssh/authorized_keys" Sep 6 00:06:29.821102 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 6 00:06:29.826675 extend-filesystems[1794]: Found loop1 Sep 6 00:06:29.831189 extend-filesystems[1794]: Found nvme0n1 Sep 6 00:06:29.832890 systemd[1]: motdgen.service: Deactivated successfully. Sep 6 00:06:29.833276 systemd[1]: Finished motdgen.service. Sep 6 00:06:29.837008 extend-filesystems[1794]: Found nvme0n1p1 Sep 6 00:06:29.844456 extend-filesystems[1794]: Found nvme0n1p2 Sep 6 00:06:29.848663 extend-filesystems[1794]: Found nvme0n1p3 Sep 6 00:06:29.856141 extend-filesystems[1794]: Found usr Sep 6 00:06:29.858651 extend-filesystems[1794]: Found nvme0n1p4 Sep 6 00:06:29.861826 extend-filesystems[1794]: Found nvme0n1p6 Sep 6 00:06:29.867094 update_engine[1803]: I0906 00:06:29.865835 1803 main.cc:92] Flatcar Update Engine starting Sep 6 00:06:29.873650 dbus-daemon[1792]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1528 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Sep 6 00:06:29.874023 extend-filesystems[1794]: Found nvme0n1p7 Sep 6 00:06:29.875933 extend-filesystems[1794]: Found nvme0n1p9 Sep 6 00:06:29.879721 extend-filesystems[1794]: Checking size of /dev/nvme0n1p9 Sep 6 00:06:29.891623 systemd[1]: Starting systemd-hostnamed.service... Sep 6 00:06:29.909162 systemd[1]: Started update-engine.service. Sep 6 00:06:29.914179 systemd[1]: Started locksmithd.service. Sep 6 00:06:29.916867 update_engine[1803]: I0906 00:06:29.916801 1803 update_check_scheduler.cc:74] Next update check in 3m16s Sep 6 00:06:29.974098 extend-filesystems[1794]: Resized partition /dev/nvme0n1p9 Sep 6 00:06:29.986681 extend-filesystems[1856]: resize2fs 1.46.5 (30-Dec-2021) Sep 6 00:06:29.998960 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Sep 6 00:06:30.089989 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Sep 6 00:06:30.101235 systemd[1]: nvidia.service: Deactivated successfully. Sep 6 00:06:30.111114 extend-filesystems[1856]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Sep 6 00:06:30.111114 extend-filesystems[1856]: old_desc_blocks = 1, new_desc_blocks = 1 Sep 6 00:06:30.111114 extend-filesystems[1856]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Sep 6 00:06:30.125391 extend-filesystems[1794]: Resized filesystem in /dev/nvme0n1p9 Sep 6 00:06:30.127440 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 6 00:06:30.127793 systemd[1]: Finished extend-filesystems.service. Sep 6 00:06:30.152485 amazon-ssm-agent[1789]: 2025/09/06 00:06:30 Failed to load instance info from vault. RegistrationKey does not exist. Sep 6 00:06:30.159969 systemd-logind[1802]: Watching system buttons on /dev/input/event0 (Power Button) Sep 6 00:06:30.160024 systemd-logind[1802]: Watching system buttons on /dev/input/event1 (Sleep Button) Sep 6 00:06:30.173338 systemd-logind[1802]: New seat seat0. Sep 6 00:06:30.178622 systemd[1]: Started systemd-logind.service. Sep 6 00:06:30.184816 amazon-ssm-agent[1789]: Initializing new seelog logger Sep 6 00:06:30.185072 amazon-ssm-agent[1789]: New Seelog Logger Creation Complete Sep 6 00:06:30.185187 amazon-ssm-agent[1789]: 2025/09/06 00:06:30 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Sep 6 00:06:30.185187 amazon-ssm-agent[1789]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Sep 6 00:06:30.185655 amazon-ssm-agent[1789]: 2025/09/06 00:06:30 processing appconfig overrides Sep 6 00:06:30.308840 env[1811]: time="2025-09-06T00:06:30.308735640Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 6 00:06:30.417566 dbus-daemon[1792]: [system] Successfully activated service 'org.freedesktop.hostname1' Sep 6 00:06:30.417832 systemd[1]: Started systemd-hostnamed.service. Sep 6 00:06:30.422730 dbus-daemon[1792]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1847 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Sep 6 00:06:30.427843 systemd[1]: Starting polkit.service... Sep 6 00:06:30.471726 env[1811]: time="2025-09-06T00:06:30.471647353Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 6 00:06:30.472169 env[1811]: time="2025-09-06T00:06:30.472122586Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:06:30.474877 polkitd[1908]: Started polkitd version 121 Sep 6 00:06:30.484513 env[1811]: time="2025-09-06T00:06:30.484427435Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.190-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 6 00:06:30.484513 env[1811]: time="2025-09-06T00:06:30.484501016Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:06:30.485043 env[1811]: time="2025-09-06T00:06:30.484983046Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 00:06:30.485139 env[1811]: time="2025-09-06T00:06:30.485039241Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 6 00:06:30.485139 env[1811]: time="2025-09-06T00:06:30.485074362Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 6 00:06:30.485139 env[1811]: time="2025-09-06T00:06:30.485098893Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 6 00:06:30.485332 env[1811]: time="2025-09-06T00:06:30.485301915Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:06:30.485966 env[1811]: time="2025-09-06T00:06:30.485886509Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:06:30.486590 env[1811]: time="2025-09-06T00:06:30.486526819Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 00:06:30.486590 env[1811]: time="2025-09-06T00:06:30.486582331Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 6 00:06:30.489447 env[1811]: time="2025-09-06T00:06:30.489373611Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 6 00:06:30.489447 env[1811]: time="2025-09-06T00:06:30.489438349Z" level=info msg="metadata content store policy set" policy=shared Sep 6 00:06:30.502974 env[1811]: time="2025-09-06T00:06:30.502877349Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 6 00:06:30.503155 env[1811]: time="2025-09-06T00:06:30.502980392Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 6 00:06:30.503155 env[1811]: time="2025-09-06T00:06:30.503017284Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 6 00:06:30.503155 env[1811]: time="2025-09-06T00:06:30.503096095Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 6 00:06:30.503330 env[1811]: time="2025-09-06T00:06:30.503129876Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 6 00:06:30.503330 env[1811]: time="2025-09-06T00:06:30.503262535Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 6 00:06:30.503330 env[1811]: time="2025-09-06T00:06:30.503294976Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 6 00:06:30.503938 env[1811]: time="2025-09-06T00:06:30.503854668Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 6 00:06:30.504072 env[1811]: time="2025-09-06T00:06:30.503939714Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 6 00:06:30.504072 env[1811]: time="2025-09-06T00:06:30.503983080Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 6 00:06:30.504072 env[1811]: time="2025-09-06T00:06:30.504018823Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 6 00:06:30.504072 env[1811]: time="2025-09-06T00:06:30.504050522Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 6 00:06:30.504287 env[1811]: time="2025-09-06T00:06:30.504264386Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 6 00:06:30.504514 env[1811]: time="2025-09-06T00:06:30.504468748Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 6 00:06:30.505170 env[1811]: time="2025-09-06T00:06:30.505119325Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 6 00:06:30.505303 env[1811]: time="2025-09-06T00:06:30.505203843Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 6 00:06:30.505303 env[1811]: time="2025-09-06T00:06:30.505242004Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 6 00:06:30.505506 env[1811]: time="2025-09-06T00:06:30.505465237Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 6 00:06:30.505666 env[1811]: time="2025-09-06T00:06:30.505623481Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 6 00:06:30.505733 env[1811]: time="2025-09-06T00:06:30.505671322Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 6 00:06:30.505733 env[1811]: time="2025-09-06T00:06:30.505703284Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 6 00:06:30.505856 env[1811]: time="2025-09-06T00:06:30.505736120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 6 00:06:30.505856 env[1811]: time="2025-09-06T00:06:30.505766623Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 6 00:06:30.505856 env[1811]: time="2025-09-06T00:06:30.505795354Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 6 00:06:30.505856 env[1811]: time="2025-09-06T00:06:30.505824324Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 6 00:06:30.506087 env[1811]: time="2025-09-06T00:06:30.505858357Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 6 00:06:30.506204 env[1811]: time="2025-09-06T00:06:30.506161633Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 6 00:06:30.506271 env[1811]: time="2025-09-06T00:06:30.506217061Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 6 00:06:30.506271 env[1811]: time="2025-09-06T00:06:30.506250651Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 6 00:06:30.506372 env[1811]: time="2025-09-06T00:06:30.506279825Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 6 00:06:30.506372 env[1811]: time="2025-09-06T00:06:30.506313642Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 6 00:06:30.506372 env[1811]: time="2025-09-06T00:06:30.506341416Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 6 00:06:30.506554 env[1811]: time="2025-09-06T00:06:30.506375126Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 6 00:06:30.506554 env[1811]: time="2025-09-06T00:06:30.506437171Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 6 00:06:30.506878 env[1811]: time="2025-09-06T00:06:30.506763531Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 6 00:06:30.508808 env[1811]: time="2025-09-06T00:06:30.506876996Z" level=info msg="Connect containerd service" Sep 6 00:06:30.508808 env[1811]: time="2025-09-06T00:06:30.506966935Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 6 00:06:30.508808 env[1811]: time="2025-09-06T00:06:30.508672960Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 6 00:06:30.514363 env[1811]: time="2025-09-06T00:06:30.514283786Z" level=info msg="Start subscribing containerd event" Sep 6 00:06:30.515272 env[1811]: time="2025-09-06T00:06:30.514374898Z" level=info msg="Start recovering state" Sep 6 00:06:30.515272 env[1811]: time="2025-09-06T00:06:30.514825731Z" level=info msg="Start event monitor" Sep 6 00:06:30.515272 env[1811]: time="2025-09-06T00:06:30.514883697Z" level=info msg="Start snapshots syncer" Sep 6 00:06:30.515272 env[1811]: time="2025-09-06T00:06:30.514930509Z" level=info msg="Start cni network conf syncer for default" Sep 6 00:06:30.515272 env[1811]: time="2025-09-06T00:06:30.514957158Z" level=info msg="Start streaming server" Sep 6 00:06:30.515787 env[1811]: time="2025-09-06T00:06:30.515273729Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 6 00:06:30.518416 env[1811]: time="2025-09-06T00:06:30.518355685Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 6 00:06:30.537811 systemd[1]: Started containerd.service. Sep 6 00:06:30.542562 env[1811]: time="2025-09-06T00:06:30.542499173Z" level=info msg="containerd successfully booted in 0.243313s" Sep 6 00:06:30.544215 polkitd[1908]: Loading rules from directory /etc/polkit-1/rules.d Sep 6 00:06:30.545646 polkitd[1908]: Loading rules from directory /usr/share/polkit-1/rules.d Sep 6 00:06:30.552924 polkitd[1908]: Finished loading, compiling and executing 2 rules Sep 6 00:06:30.554662 dbus-daemon[1792]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Sep 6 00:06:30.554980 systemd[1]: Started polkit.service. Sep 6 00:06:30.562179 polkitd[1908]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Sep 6 00:06:30.574745 coreos-metadata[1791]: Sep 06 00:06:30.574 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Sep 6 00:06:30.578563 coreos-metadata[1791]: Sep 06 00:06:30.578 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Sep 6 00:06:30.582198 coreos-metadata[1791]: Sep 06 00:06:30.582 INFO Fetch successful Sep 6 00:06:30.582198 coreos-metadata[1791]: Sep 06 00:06:30.582 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Sep 6 00:06:30.583682 coreos-metadata[1791]: Sep 06 00:06:30.583 INFO Fetch successful Sep 6 00:06:30.588516 unknown[1791]: wrote ssh authorized keys file for user: core Sep 6 00:06:30.611185 systemd-hostnamed[1847]: Hostname set to (transient) Sep 6 00:06:30.611367 systemd-resolved[1760]: System hostname changed to 'ip-172-31-26-60'. Sep 6 00:06:30.631273 update-ssh-keys[1932]: Updated "/home/core/.ssh/authorized_keys" Sep 6 00:06:30.632589 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Sep 6 00:06:30.949083 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO Create new startup processor Sep 6 00:06:30.950021 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [LongRunningPluginsManager] registered plugins: {} Sep 6 00:06:30.951955 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO Initializing bookkeeping folders Sep 6 00:06:30.951955 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO removing the completed state files Sep 6 00:06:30.951955 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO Initializing bookkeeping folders for long running plugins Sep 6 00:06:30.951955 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Sep 6 00:06:30.951955 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO Initializing healthcheck folders for long running plugins Sep 6 00:06:30.951955 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO Initializing locations for inventory plugin Sep 6 00:06:30.951955 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO Initializing default location for custom inventory Sep 6 00:06:30.951955 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO Initializing default location for file inventory Sep 6 00:06:30.951955 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO Initializing default location for role inventory Sep 6 00:06:30.952470 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO Init the cloudwatchlogs publisher Sep 6 00:06:30.952470 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [instanceID=i-0bc7b803e1ad6d43c] Successfully loaded platform independent plugin aws:refreshAssociation Sep 6 00:06:30.952470 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [instanceID=i-0bc7b803e1ad6d43c] Successfully loaded platform independent plugin aws:downloadContent Sep 6 00:06:30.952470 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [instanceID=i-0bc7b803e1ad6d43c] Successfully loaded platform independent plugin aws:runPowerShellScript Sep 6 00:06:30.952470 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [instanceID=i-0bc7b803e1ad6d43c] Successfully loaded platform independent plugin aws:updateSsmAgent Sep 6 00:06:30.952470 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [instanceID=i-0bc7b803e1ad6d43c] Successfully loaded platform independent plugin aws:runDockerAction Sep 6 00:06:30.952470 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [instanceID=i-0bc7b803e1ad6d43c] Successfully loaded platform independent plugin aws:runDocument Sep 6 00:06:30.952470 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [instanceID=i-0bc7b803e1ad6d43c] Successfully loaded platform independent plugin aws:softwareInventory Sep 6 00:06:30.952470 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [instanceID=i-0bc7b803e1ad6d43c] Successfully loaded platform independent plugin aws:configureDocker Sep 6 00:06:30.952470 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [instanceID=i-0bc7b803e1ad6d43c] Successfully loaded platform independent plugin aws:configurePackage Sep 6 00:06:30.952470 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [instanceID=i-0bc7b803e1ad6d43c] Successfully loaded platform dependent plugin aws:runShellScript Sep 6 00:06:30.952470 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Sep 6 00:06:30.952470 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO OS: linux, Arch: arm64 Sep 6 00:06:30.959207 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [MessageGatewayService] Starting session document processing engine... Sep 6 00:06:30.960760 amazon-ssm-agent[1789]: datastore file /var/lib/amazon/ssm/i-0bc7b803e1ad6d43c/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Sep 6 00:06:31.055006 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [MessageGatewayService] [EngineProcessor] Starting Sep 6 00:06:31.149924 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Sep 6 00:06:31.244990 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0bc7b803e1ad6d43c, requestId: 4659ade1-c24c-4977-b8d5-3a8d1b5c8c53 Sep 6 00:06:31.251282 locksmithd[1848]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 6 00:06:31.339646 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [MessagingDeliveryService] Starting document processing engine... Sep 6 00:06:31.434577 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [MessagingDeliveryService] [EngineProcessor] Starting Sep 6 00:06:31.529751 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Sep 6 00:06:31.625033 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [MessagingDeliveryService] Starting message polling Sep 6 00:06:31.720543 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [MessagingDeliveryService] Starting send replies to MDS Sep 6 00:06:31.816316 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [instanceID=i-0bc7b803e1ad6d43c] Starting association polling Sep 6 00:06:31.912175 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Sep 6 00:06:32.008279 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [MessagingDeliveryService] [Association] Launching response handler Sep 6 00:06:32.104631 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Sep 6 00:06:32.201071 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Sep 6 00:06:32.297759 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Sep 6 00:06:32.394710 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [MessageGatewayService] listening reply. Sep 6 00:06:32.491749 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [HealthCheck] HealthCheck reporting agent health. Sep 6 00:06:32.559569 systemd[1]: Started kubelet.service. Sep 6 00:06:32.589036 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [OfflineService] Starting document processing engine... Sep 6 00:06:32.686582 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [OfflineService] [EngineProcessor] Starting Sep 6 00:06:32.737051 sshd_keygen[1837]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 6 00:06:32.776539 systemd[1]: Finished sshd-keygen.service. Sep 6 00:06:32.781378 systemd[1]: Starting issuegen.service... Sep 6 00:06:32.784708 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [OfflineService] [EngineProcessor] Initial processing Sep 6 00:06:32.794128 systemd[1]: issuegen.service: Deactivated successfully. Sep 6 00:06:32.794492 systemd[1]: Finished issuegen.service. Sep 6 00:06:32.799158 systemd[1]: Starting systemd-user-sessions.service... Sep 6 00:06:32.818181 systemd[1]: Finished systemd-user-sessions.service. Sep 6 00:06:32.823766 systemd[1]: Started getty@tty1.service. Sep 6 00:06:32.829309 systemd[1]: Started serial-getty@ttyS0.service. Sep 6 00:06:32.831693 systemd[1]: Reached target getty.target. Sep 6 00:06:32.833618 systemd[1]: Reached target multi-user.target. Sep 6 00:06:32.839358 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 6 00:06:32.854412 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 6 00:06:32.854767 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 6 00:06:32.857254 systemd[1]: Startup finished in 1.195s (kernel) + 8.431s (initrd) + 11.824s (userspace) = 21.451s. Sep 6 00:06:32.882469 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [OfflineService] Starting message polling Sep 6 00:06:32.980543 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [OfflineService] Starting send replies to MDS Sep 6 00:06:33.078808 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [LongRunningPluginsManager] starting long running plugin manager Sep 6 00:06:33.177198 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Sep 6 00:06:33.275880 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Sep 6 00:06:33.374678 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [StartupProcessor] Executing startup processor tasks Sep 6 00:06:33.473760 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Sep 6 00:06:33.573239 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Sep 6 00:06:33.672564 amazon-ssm-agent[1789]: 2025-09-06 00:06:30 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.8 Sep 6 00:06:33.772228 amazon-ssm-agent[1789]: 2025-09-06 00:06:31 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0bc7b803e1ad6d43c?role=subscribe&stream=input Sep 6 00:06:33.830945 kubelet[1984]: E0906 00:06:33.830795 1984 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:06:33.834744 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:06:33.835089 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:06:33.835502 systemd[1]: kubelet.service: Consumed 1.558s CPU time. Sep 6 00:06:33.872123 amazon-ssm-agent[1789]: 2025-09-06 00:06:31 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0bc7b803e1ad6d43c?role=subscribe&stream=input Sep 6 00:06:33.972093 amazon-ssm-agent[1789]: 2025-09-06 00:06:31 INFO [MessageGatewayService] Starting receiving message from control channel Sep 6 00:06:34.072252 amazon-ssm-agent[1789]: 2025-09-06 00:06:31 INFO [MessageGatewayService] [EngineProcessor] Initial processing Sep 6 00:06:37.980089 systemd[1]: Created slice system-sshd.slice. Sep 6 00:06:37.982443 systemd[1]: Started sshd@0-172.31.26.60:22-147.75.109.163:38738.service. Sep 6 00:06:38.289284 sshd[2005]: Accepted publickey for core from 147.75.109.163 port 38738 ssh2: RSA SHA256:CT8P9x8s4J0T70k8+LLVTP4XjE3e1SNW15vyou+QijI Sep 6 00:06:38.295121 sshd[2005]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:06:38.316243 systemd[1]: Created slice user-500.slice. Sep 6 00:06:38.318593 systemd[1]: Starting user-runtime-dir@500.service... Sep 6 00:06:38.329338 systemd-logind[1802]: New session 1 of user core. Sep 6 00:06:38.339015 systemd[1]: Finished user-runtime-dir@500.service. Sep 6 00:06:38.341950 systemd[1]: Starting user@500.service... Sep 6 00:06:38.349532 (systemd)[2008]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:06:38.536819 systemd[2008]: Queued start job for default target default.target. Sep 6 00:06:38.537841 systemd[2008]: Reached target paths.target. Sep 6 00:06:38.537929 systemd[2008]: Reached target sockets.target. Sep 6 00:06:38.537969 systemd[2008]: Reached target timers.target. Sep 6 00:06:38.537999 systemd[2008]: Reached target basic.target. Sep 6 00:06:38.538094 systemd[2008]: Reached target default.target. Sep 6 00:06:38.538159 systemd[2008]: Startup finished in 176ms. Sep 6 00:06:38.539018 systemd[1]: Started user@500.service. Sep 6 00:06:38.542072 systemd[1]: Started session-1.scope. Sep 6 00:06:38.688832 systemd[1]: Started sshd@1-172.31.26.60:22-147.75.109.163:38744.service. Sep 6 00:06:38.867212 sshd[2018]: Accepted publickey for core from 147.75.109.163 port 38744 ssh2: RSA SHA256:CT8P9x8s4J0T70k8+LLVTP4XjE3e1SNW15vyou+QijI Sep 6 00:06:38.869704 sshd[2018]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:06:38.877108 systemd-logind[1802]: New session 2 of user core. Sep 6 00:06:38.879003 systemd[1]: Started session-2.scope. Sep 6 00:06:39.010283 sshd[2018]: pam_unix(sshd:session): session closed for user core Sep 6 00:06:39.015784 systemd-logind[1802]: Session 2 logged out. Waiting for processes to exit. Sep 6 00:06:39.016848 systemd[1]: sshd@1-172.31.26.60:22-147.75.109.163:38744.service: Deactivated successfully. Sep 6 00:06:39.018161 systemd[1]: session-2.scope: Deactivated successfully. Sep 6 00:06:39.019451 systemd-logind[1802]: Removed session 2. Sep 6 00:06:39.037195 systemd[1]: Started sshd@2-172.31.26.60:22-147.75.109.163:38748.service. Sep 6 00:06:39.208262 sshd[2024]: Accepted publickey for core from 147.75.109.163 port 38748 ssh2: RSA SHA256:CT8P9x8s4J0T70k8+LLVTP4XjE3e1SNW15vyou+QijI Sep 6 00:06:39.211195 sshd[2024]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:06:39.219640 systemd[1]: Started session-3.scope. Sep 6 00:06:39.220583 systemd-logind[1802]: New session 3 of user core. Sep 6 00:06:39.340578 sshd[2024]: pam_unix(sshd:session): session closed for user core Sep 6 00:06:39.346055 systemd[1]: sshd@2-172.31.26.60:22-147.75.109.163:38748.service: Deactivated successfully. Sep 6 00:06:39.346682 systemd-logind[1802]: Session 3 logged out. Waiting for processes to exit. Sep 6 00:06:39.347273 systemd[1]: session-3.scope: Deactivated successfully. Sep 6 00:06:39.349368 systemd-logind[1802]: Removed session 3. Sep 6 00:06:39.367866 systemd[1]: Started sshd@3-172.31.26.60:22-147.75.109.163:38758.service. Sep 6 00:06:39.540427 sshd[2030]: Accepted publickey for core from 147.75.109.163 port 38758 ssh2: RSA SHA256:CT8P9x8s4J0T70k8+LLVTP4XjE3e1SNW15vyou+QijI Sep 6 00:06:39.543350 sshd[2030]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:06:39.550859 systemd-logind[1802]: New session 4 of user core. Sep 6 00:06:39.551748 systemd[1]: Started session-4.scope. Sep 6 00:06:39.681665 sshd[2030]: pam_unix(sshd:session): session closed for user core Sep 6 00:06:39.686348 systemd-logind[1802]: Session 4 logged out. Waiting for processes to exit. Sep 6 00:06:39.687310 systemd[1]: session-4.scope: Deactivated successfully. Sep 6 00:06:39.688379 systemd[1]: sshd@3-172.31.26.60:22-147.75.109.163:38758.service: Deactivated successfully. Sep 6 00:06:39.690215 systemd-logind[1802]: Removed session 4. Sep 6 00:06:39.711182 systemd[1]: Started sshd@4-172.31.26.60:22-147.75.109.163:38768.service. Sep 6 00:06:39.885267 sshd[2036]: Accepted publickey for core from 147.75.109.163 port 38768 ssh2: RSA SHA256:CT8P9x8s4J0T70k8+LLVTP4XjE3e1SNW15vyou+QijI Sep 6 00:06:39.888259 sshd[2036]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:06:39.896058 systemd-logind[1802]: New session 5 of user core. Sep 6 00:06:39.896613 systemd[1]: Started session-5.scope. Sep 6 00:06:40.108984 sudo[2039]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 6 00:06:40.110058 sudo[2039]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:06:40.140161 dbus-daemon[1792]: avc: received setenforce notice (enforcing=1) Sep 6 00:06:40.143707 sudo[2039]: pam_unix(sudo:session): session closed for user root Sep 6 00:06:40.169319 sshd[2036]: pam_unix(sshd:session): session closed for user core Sep 6 00:06:40.174716 systemd-logind[1802]: Session 5 logged out. Waiting for processes to exit. Sep 6 00:06:40.175298 systemd[1]: session-5.scope: Deactivated successfully. Sep 6 00:06:40.177609 systemd[1]: sshd@4-172.31.26.60:22-147.75.109.163:38768.service: Deactivated successfully. Sep 6 00:06:40.179680 systemd-logind[1802]: Removed session 5. Sep 6 00:06:40.197690 systemd[1]: Started sshd@5-172.31.26.60:22-147.75.109.163:38574.service. Sep 6 00:06:40.375414 sshd[2043]: Accepted publickey for core from 147.75.109.163 port 38574 ssh2: RSA SHA256:CT8P9x8s4J0T70k8+LLVTP4XjE3e1SNW15vyou+QijI Sep 6 00:06:40.378542 sshd[2043]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:06:40.386094 systemd-logind[1802]: New session 6 of user core. Sep 6 00:06:40.386993 systemd[1]: Started session-6.scope. Sep 6 00:06:40.495776 sudo[2047]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 6 00:06:40.497023 sudo[2047]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:06:40.502173 sudo[2047]: pam_unix(sudo:session): session closed for user root Sep 6 00:06:40.511577 sudo[2046]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 6 00:06:40.512621 sudo[2046]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:06:40.532584 systemd[1]: Stopping audit-rules.service... Sep 6 00:06:40.533000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 00:06:40.536273 kernel: kauditd_printk_skb: 107 callbacks suppressed Sep 6 00:06:40.536332 kernel: audit: type=1305 audit(1757117200.533:202): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 00:06:40.536745 auditctl[2050]: No rules Sep 6 00:06:40.537652 systemd[1]: audit-rules.service: Deactivated successfully. Sep 6 00:06:40.538017 systemd[1]: Stopped audit-rules.service. Sep 6 00:06:40.533000 audit[2050]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc8d6e340 a2=420 a3=0 items=0 ppid=1 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:40.544084 systemd[1]: Starting audit-rules.service... Sep 6 00:06:40.552922 kernel: audit: type=1300 audit(1757117200.533:202): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc8d6e340 a2=420 a3=0 items=0 ppid=1 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:40.533000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 6 00:06:40.556499 kernel: audit: type=1327 audit(1757117200.533:202): proctitle=2F7362696E2F617564697463746C002D44 Sep 6 00:06:40.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:40.564864 kernel: audit: type=1131 audit(1757117200.537:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:40.583534 augenrules[2067]: No rules Sep 6 00:06:40.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:40.585026 systemd[1]: Finished audit-rules.service. Sep 6 00:06:40.594589 sudo[2046]: pam_unix(sudo:session): session closed for user root Sep 6 00:06:40.593000 audit[2046]: USER_END pid=2046 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:06:40.604066 kernel: audit: type=1130 audit(1757117200.584:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:40.604141 kernel: audit: type=1106 audit(1757117200.593:205): pid=2046 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:06:40.593000 audit[2046]: CRED_DISP pid=2046 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:06:40.612567 kernel: audit: type=1104 audit(1757117200.593:206): pid=2046 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:06:40.619296 sshd[2043]: pam_unix(sshd:session): session closed for user core Sep 6 00:06:40.620000 audit[2043]: USER_END pid=2043 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 6 00:06:40.623308 systemd[1]: session-6.scope: Deactivated successfully. Sep 6 00:06:40.620000 audit[2043]: CRED_DISP pid=2043 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 6 00:06:40.624411 systemd[1]: sshd@5-172.31.26.60:22-147.75.109.163:38574.service: Deactivated successfully. Sep 6 00:06:40.644379 kernel: audit: type=1106 audit(1757117200.620:207): pid=2043 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 6 00:06:40.644469 kernel: audit: type=1104 audit(1757117200.620:208): pid=2043 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 6 00:06:40.644817 systemd-logind[1802]: Session 6 logged out. Waiting for processes to exit. Sep 6 00:06:40.656114 kernel: audit: type=1131 audit(1757117200.623:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.26.60:22-147.75.109.163:38574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:40.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.26.60:22-147.75.109.163:38574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:40.651928 systemd[1]: Started sshd@6-172.31.26.60:22-147.75.109.163:38590.service. Sep 6 00:06:40.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.26.60:22-147.75.109.163:38590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:40.660644 systemd-logind[1802]: Removed session 6. Sep 6 00:06:40.822000 audit[2073]: USER_ACCT pid=2073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 6 00:06:40.824858 sshd[2073]: Accepted publickey for core from 147.75.109.163 port 38590 ssh2: RSA SHA256:CT8P9x8s4J0T70k8+LLVTP4XjE3e1SNW15vyou+QijI Sep 6 00:06:40.825000 audit[2073]: CRED_ACQ pid=2073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 6 00:06:40.825000 audit[2073]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc1ebd1d0 a2=3 a3=1 items=0 ppid=1 pid=2073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:40.825000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:06:40.826803 sshd[2073]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:06:40.834490 systemd-logind[1802]: New session 7 of user core. Sep 6 00:06:40.835402 systemd[1]: Started session-7.scope. Sep 6 00:06:40.843000 audit[2073]: USER_START pid=2073 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 6 00:06:40.845000 audit[2075]: CRED_ACQ pid=2075 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 6 00:06:40.939000 audit[2076]: USER_ACCT pid=2076 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:06:40.940609 sudo[2076]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 6 00:06:40.939000 audit[2076]: CRED_REFR pid=2076 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:06:40.941260 sudo[2076]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:06:40.943000 audit[2076]: USER_START pid=2076 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:06:40.968174 systemd[1]: Starting coreos-metadata.service... Sep 6 00:06:41.128793 coreos-metadata[2080]: Sep 06 00:06:41.127 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Sep 6 00:06:41.129863 coreos-metadata[2080]: Sep 06 00:06:41.129 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Sep 6 00:06:41.130604 coreos-metadata[2080]: Sep 06 00:06:41.130 INFO Fetch successful Sep 6 00:06:41.130720 coreos-metadata[2080]: Sep 06 00:06:41.130 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Sep 6 00:06:41.131272 coreos-metadata[2080]: Sep 06 00:06:41.131 INFO Fetch successful Sep 6 00:06:41.131362 coreos-metadata[2080]: Sep 06 00:06:41.131 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Sep 6 00:06:41.132065 coreos-metadata[2080]: Sep 06 00:06:41.132 INFO Fetch successful Sep 6 00:06:41.132149 coreos-metadata[2080]: Sep 06 00:06:41.132 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Sep 6 00:06:41.132728 coreos-metadata[2080]: Sep 06 00:06:41.132 INFO Fetch successful Sep 6 00:06:41.132810 coreos-metadata[2080]: Sep 06 00:06:41.132 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Sep 6 00:06:41.133378 coreos-metadata[2080]: Sep 06 00:06:41.133 INFO Fetch successful Sep 6 00:06:41.133474 coreos-metadata[2080]: Sep 06 00:06:41.133 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Sep 6 00:06:41.134071 coreos-metadata[2080]: Sep 06 00:06:41.134 INFO Fetch successful Sep 6 00:06:41.134157 coreos-metadata[2080]: Sep 06 00:06:41.134 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Sep 6 00:06:41.134852 coreos-metadata[2080]: Sep 06 00:06:41.134 INFO Fetch successful Sep 6 00:06:41.134972 coreos-metadata[2080]: Sep 06 00:06:41.134 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Sep 6 00:06:41.135638 coreos-metadata[2080]: Sep 06 00:06:41.135 INFO Fetch successful Sep 6 00:06:41.149551 systemd[1]: Finished coreos-metadata.service. Sep 6 00:06:41.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:42.302720 systemd[1]: Stopped kubelet.service. Sep 6 00:06:42.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:42.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:42.303628 systemd[1]: kubelet.service: Consumed 1.558s CPU time. Sep 6 00:06:42.308298 systemd[1]: Starting kubelet.service... Sep 6 00:06:42.361064 systemd[1]: Reloading. Sep 6 00:06:42.523847 /usr/lib/systemd/system-generators/torcx-generator[2137]: time="2025-09-06T00:06:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 00:06:42.532030 /usr/lib/systemd/system-generators/torcx-generator[2137]: time="2025-09-06T00:06:42Z" level=info msg="torcx already run" Sep 6 00:06:42.732200 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 00:06:42.732239 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 00:06:42.771145 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 00:06:42.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.938000 audit: BPF prog-id=46 op=LOAD Sep 6 00:06:42.938000 audit: BPF prog-id=38 op=UNLOAD Sep 6 00:06:42.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.939000 audit: BPF prog-id=47 op=LOAD Sep 6 00:06:42.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.939000 audit: BPF prog-id=48 op=LOAD Sep 6 00:06:42.939000 audit: BPF prog-id=39 op=UNLOAD Sep 6 00:06:42.939000 audit: BPF prog-id=40 op=UNLOAD Sep 6 00:06:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.942000 audit: BPF prog-id=49 op=LOAD Sep 6 00:06:42.942000 audit: BPF prog-id=27 op=UNLOAD Sep 6 00:06:42.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.947000 audit: BPF prog-id=50 op=LOAD Sep 6 00:06:42.947000 audit: BPF prog-id=28 op=UNLOAD Sep 6 00:06:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.947000 audit: BPF prog-id=51 op=LOAD Sep 6 00:06:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.947000 audit: BPF prog-id=52 op=LOAD Sep 6 00:06:42.947000 audit: BPF prog-id=29 op=UNLOAD Sep 6 00:06:42.947000 audit: BPF prog-id=30 op=UNLOAD Sep 6 00:06:42.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.951000 audit: BPF prog-id=53 op=LOAD Sep 6 00:06:42.952000 audit: BPF prog-id=36 op=UNLOAD Sep 6 00:06:42.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.954000 audit: BPF prog-id=54 op=LOAD Sep 6 00:06:42.954000 audit: BPF prog-id=37 op=UNLOAD Sep 6 00:06:42.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.956000 audit: BPF prog-id=55 op=LOAD Sep 6 00:06:42.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.957000 audit: BPF prog-id=56 op=LOAD Sep 6 00:06:42.957000 audit: BPF prog-id=31 op=UNLOAD Sep 6 00:06:42.957000 audit: BPF prog-id=32 op=UNLOAD Sep 6 00:06:42.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.958000 audit: BPF prog-id=57 op=LOAD Sep 6 00:06:42.958000 audit: BPF prog-id=44 op=UNLOAD Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit: BPF prog-id=58 op=LOAD Sep 6 00:06:42.961000 audit: BPF prog-id=41 op=UNLOAD Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit: BPF prog-id=59 op=LOAD Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.962000 audit: BPF prog-id=60 op=LOAD Sep 6 00:06:42.962000 audit: BPF prog-id=42 op=UNLOAD Sep 6 00:06:42.962000 audit: BPF prog-id=43 op=UNLOAD Sep 6 00:06:42.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.964000 audit: BPF prog-id=61 op=LOAD Sep 6 00:06:42.965000 audit: BPF prog-id=33 op=UNLOAD Sep 6 00:06:42.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.965000 audit: BPF prog-id=62 op=LOAD Sep 6 00:06:42.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:42.965000 audit: BPF prog-id=63 op=LOAD Sep 6 00:06:42.965000 audit: BPF prog-id=34 op=UNLOAD Sep 6 00:06:42.965000 audit: BPF prog-id=35 op=UNLOAD Sep 6 00:06:42.990134 systemd[1]: Started kubelet.service. Sep 6 00:06:42.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:43.006677 systemd[1]: Stopping kubelet.service... Sep 6 00:06:43.010425 systemd[1]: kubelet.service: Deactivated successfully. Sep 6 00:06:43.010797 systemd[1]: Stopped kubelet.service. Sep 6 00:06:43.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:43.014277 systemd[1]: Starting kubelet.service... Sep 6 00:06:43.316884 systemd[1]: Started kubelet.service. Sep 6 00:06:43.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:43.401408 kubelet[2204]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 00:06:43.402047 kubelet[2204]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 6 00:06:43.402159 kubelet[2204]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 00:06:43.402396 kubelet[2204]: I0906 00:06:43.402348 2204 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 6 00:06:44.624380 kubelet[2204]: I0906 00:06:44.624327 2204 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Sep 6 00:06:44.625083 kubelet[2204]: I0906 00:06:44.624983 2204 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 6 00:06:44.625410 kubelet[2204]: I0906 00:06:44.625363 2204 server.go:956] "Client rotation is on, will bootstrap in background" Sep 6 00:06:44.676068 kubelet[2204]: I0906 00:06:44.676008 2204 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 6 00:06:44.695653 kubelet[2204]: E0906 00:06:44.695571 2204 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 6 00:06:44.695653 kubelet[2204]: I0906 00:06:44.695641 2204 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 6 00:06:44.701163 kubelet[2204]: I0906 00:06:44.701122 2204 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 6 00:06:44.701838 kubelet[2204]: I0906 00:06:44.701789 2204 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 6 00:06:44.702131 kubelet[2204]: I0906 00:06:44.701839 2204 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.31.26.60","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 6 00:06:44.702325 kubelet[2204]: I0906 00:06:44.702264 2204 topology_manager.go:138] "Creating topology manager with none policy" Sep 6 00:06:44.702325 kubelet[2204]: I0906 00:06:44.702287 2204 container_manager_linux.go:303] "Creating device plugin manager" Sep 6 00:06:44.702630 kubelet[2204]: I0906 00:06:44.702603 2204 state_mem.go:36] "Initialized new in-memory state store" Sep 6 00:06:44.709118 kubelet[2204]: I0906 00:06:44.709079 2204 kubelet.go:480] "Attempting to sync node with API server" Sep 6 00:06:44.709118 kubelet[2204]: I0906 00:06:44.709122 2204 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 6 00:06:44.716504 kubelet[2204]: I0906 00:06:44.716454 2204 kubelet.go:386] "Adding apiserver pod source" Sep 6 00:06:44.722921 kubelet[2204]: I0906 00:06:44.722831 2204 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 6 00:06:44.724873 kubelet[2204]: E0906 00:06:44.724816 2204 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:06:44.725112 kubelet[2204]: E0906 00:06:44.724898 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:06:44.726072 kubelet[2204]: I0906 00:06:44.726038 2204 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 6 00:06:44.727649 kubelet[2204]: I0906 00:06:44.727602 2204 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Sep 6 00:06:44.728121 kubelet[2204]: W0906 00:06:44.728095 2204 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 6 00:06:44.735092 kubelet[2204]: I0906 00:06:44.735041 2204 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 6 00:06:44.735256 kubelet[2204]: I0906 00:06:44.735122 2204 server.go:1289] "Started kubelet" Sep 6 00:06:44.735418 kubelet[2204]: I0906 00:06:44.735376 2204 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Sep 6 00:06:44.747538 kubelet[2204]: I0906 00:06:44.747503 2204 server.go:317] "Adding debug handlers to kubelet server" Sep 6 00:06:44.748709 kubelet[2204]: I0906 00:06:44.748613 2204 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 6 00:06:44.749329 kubelet[2204]: I0906 00:06:44.749286 2204 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 6 00:06:44.755000 audit[2204]: AVC avc: denied { mac_admin } for pid=2204 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:44.755000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:06:44.755000 audit[2204]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007ec6f0 a1=40005b1ef0 a2=40007ec6c0 a3=25 items=0 ppid=1 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:44.755000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:06:44.757391 kubelet[2204]: I0906 00:06:44.757333 2204 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 6 00:06:44.756000 audit[2204]: AVC avc: denied { mac_admin } for pid=2204 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:44.756000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:06:44.756000 audit[2204]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007be280 a1=40005b1f08 a2=40007ec780 a3=25 items=0 ppid=1 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:44.756000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:06:44.757931 kubelet[2204]: I0906 00:06:44.757876 2204 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 6 00:06:44.758188 kubelet[2204]: I0906 00:06:44.758164 2204 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 6 00:06:44.758654 kubelet[2204]: E0906 00:06:44.756337 2204 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.26.60.186288c9c0f61633 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.26.60,UID:172.31.26.60,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.31.26.60,},FirstTimestamp:2025-09-06 00:06:44.735071795 +0000 UTC m=+1.405767423,LastTimestamp:2025-09-06 00:06:44.735071795 +0000 UTC m=+1.405767423,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.26.60,}" Sep 6 00:06:44.758810 kubelet[2204]: E0906 00:06:44.758753 2204 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: nodes \"172.31.26.60\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Sep 6 00:06:44.759040 kubelet[2204]: E0906 00:06:44.758996 2204 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Sep 6 00:06:44.763384 kubelet[2204]: I0906 00:06:44.763335 2204 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 6 00:06:44.772228 kubelet[2204]: E0906 00:06:44.772163 2204 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 6 00:06:44.772530 kubelet[2204]: I0906 00:06:44.772492 2204 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 6 00:06:44.772872 kubelet[2204]: E0906 00:06:44.772834 2204 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.26.60\" not found" Sep 6 00:06:44.773154 kubelet[2204]: I0906 00:06:44.773124 2204 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 6 00:06:44.773244 kubelet[2204]: I0906 00:06:44.773220 2204 reconciler.go:26] "Reconciler: start to sync state" Sep 6 00:06:44.774670 kubelet[2204]: I0906 00:06:44.774622 2204 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 6 00:06:44.777767 kubelet[2204]: I0906 00:06:44.777735 2204 factory.go:223] Registration of the containerd container factory successfully Sep 6 00:06:44.778017 kubelet[2204]: I0906 00:06:44.777995 2204 factory.go:223] Registration of the systemd container factory successfully Sep 6 00:06:44.785729 kubelet[2204]: E0906 00:06:44.782276 2204 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.26.60.186288c9c32b9863 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.26.60,UID:172.31.26.60,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:172.31.26.60,},FirstTimestamp:2025-09-06 00:06:44.772132963 +0000 UTC m=+1.442828520,LastTimestamp:2025-09-06 00:06:44.772132963 +0000 UTC m=+1.442828520,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.26.60,}" Sep 6 00:06:44.785729 kubelet[2204]: E0906 00:06:44.782562 2204 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Sep 6 00:06:44.785729 kubelet[2204]: E0906 00:06:44.782667 2204 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.26.60\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Sep 6 00:06:44.806414 kubelet[2204]: I0906 00:06:44.806368 2204 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 6 00:06:44.806414 kubelet[2204]: I0906 00:06:44.806402 2204 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 6 00:06:44.806640 kubelet[2204]: I0906 00:06:44.806437 2204 state_mem.go:36] "Initialized new in-memory state store" Sep 6 00:06:44.808775 kubelet[2204]: I0906 00:06:44.808736 2204 policy_none.go:49] "None policy: Start" Sep 6 00:06:44.808775 kubelet[2204]: I0906 00:06:44.808776 2204 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 6 00:06:44.809004 kubelet[2204]: I0906 00:06:44.808802 2204 state_mem.go:35] "Initializing new in-memory state store" Sep 6 00:06:44.817412 systemd[1]: Created slice kubepods.slice. Sep 6 00:06:44.845956 systemd[1]: Created slice kubepods-burstable.slice. Sep 6 00:06:44.859509 systemd[1]: Created slice kubepods-besteffort.slice. Sep 6 00:06:44.867000 audit[2227]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:44.867000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe54a9e50 a2=0 a3=1 items=0 ppid=2204 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:44.867000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 00:06:44.870000 audit[2228]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:44.870000 audit[2228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffe489ef10 a2=0 a3=1 items=0 ppid=2204 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:44.870000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 00:06:44.874114 kubelet[2204]: E0906 00:06:44.874068 2204 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Sep 6 00:06:44.873000 audit[2204]: AVC avc: denied { mac_admin } for pid=2204 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:44.873000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:06:44.873000 audit[2204]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e0b5f0 a1=4000dfcc48 a2=4000e0b5c0 a3=25 items=0 ppid=1 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:44.873000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:06:44.881124 kubelet[2204]: E0906 00:06:44.874239 2204 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Sep 6 00:06:44.881124 kubelet[2204]: I0906 00:06:44.874425 2204 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 6 00:06:44.881124 kubelet[2204]: I0906 00:06:44.874445 2204 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 6 00:06:44.881124 kubelet[2204]: I0906 00:06:44.875426 2204 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 6 00:06:44.881124 kubelet[2204]: E0906 00:06:44.877751 2204 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 6 00:06:44.881124 kubelet[2204]: E0906 00:06:44.877834 2204 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.26.60\" not found" Sep 6 00:06:44.884000 audit[2230]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:44.884000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffd6c7d40 a2=0 a3=1 items=0 ppid=2204 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:44.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:06:44.918000 audit[2235]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:44.918000 audit[2235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff84d0150 a2=0 a3=1 items=0 ppid=2204 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:44.918000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:06:44.975838 kubelet[2204]: I0906 00:06:44.975798 2204 kubelet_node_status.go:75] "Attempting to register node" node="172.31.26.60" Sep 6 00:06:44.991534 kubelet[2204]: I0906 00:06:44.991479 2204 kubelet_node_status.go:78] "Successfully registered node" node="172.31.26.60" Sep 6 00:06:44.991534 kubelet[2204]: E0906 00:06:44.991531 2204 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"172.31.26.60\": node \"172.31.26.60\" not found" Sep 6 00:06:45.053535 kubelet[2204]: E0906 00:06:45.053467 2204 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.26.60\" not found" Sep 6 00:06:45.054000 audit[2240]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:45.054000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd7200520 a2=0 a3=1 items=0 ppid=2204 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:45.054000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 6 00:06:45.057788 kubelet[2204]: I0906 00:06:45.057717 2204 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Sep 6 00:06:45.057000 audit[2242]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:45.057000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff734f7b0 a2=0 a3=1 items=0 ppid=2204 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:45.057000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 00:06:45.058000 audit[2241]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:45.058000 audit[2241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff9a90130 a2=0 a3=1 items=0 ppid=2204 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:45.058000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 00:06:45.061799 kubelet[2204]: I0906 00:06:45.061762 2204 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Sep 6 00:06:45.059000 audit[2243]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:45.059000 audit[2243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffee675300 a2=0 a3=1 items=0 ppid=2204 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:45.059000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 00:06:45.062374 kubelet[2204]: I0906 00:06:45.062350 2204 status_manager.go:230] "Starting to sync pod status with apiserver" Sep 6 00:06:45.062514 kubelet[2204]: I0906 00:06:45.062489 2204 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 6 00:06:45.062650 kubelet[2204]: I0906 00:06:45.062628 2204 kubelet.go:2436] "Starting kubelet main sync loop" Sep 6 00:06:45.062942 kubelet[2204]: E0906 00:06:45.062879 2204 kubelet.go:2460] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Sep 6 00:06:45.063000 audit[2245]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:45.063000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd3cf19f0 a2=0 a3=1 items=0 ppid=2204 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:45.063000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 00:06:45.063000 audit[2244]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:45.063000 audit[2244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc55d5e50 a2=0 a3=1 items=0 ppid=2204 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:45.063000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 00:06:45.066000 audit[2246]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:45.066000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffdaeb4f40 a2=0 a3=1 items=0 ppid=2204 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:45.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 00:06:45.068000 audit[2247]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:45.068000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffed1deac0 a2=0 a3=1 items=0 ppid=2204 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:45.068000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 00:06:45.154148 kubelet[2204]: E0906 00:06:45.154011 2204 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.26.60\" not found" Sep 6 00:06:45.254325 kubelet[2204]: E0906 00:06:45.254266 2204 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.26.60\" not found" Sep 6 00:06:45.354920 kubelet[2204]: E0906 00:06:45.354842 2204 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.26.60\" not found" Sep 6 00:06:45.369255 sudo[2076]: pam_unix(sudo:session): session closed for user root Sep 6 00:06:45.368000 audit[2076]: USER_END pid=2076 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:06:45.368000 audit[2076]: CRED_DISP pid=2076 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:06:45.391946 sshd[2073]: pam_unix(sshd:session): session closed for user core Sep 6 00:06:45.393000 audit[2073]: USER_END pid=2073 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 6 00:06:45.393000 audit[2073]: CRED_DISP pid=2073 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 6 00:06:45.397454 systemd-logind[1802]: Session 7 logged out. Waiting for processes to exit. Sep 6 00:06:45.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.26.60:22-147.75.109.163:38590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:06:45.398706 systemd[1]: sshd@6-172.31.26.60:22-147.75.109.163:38590.service: Deactivated successfully. Sep 6 00:06:45.400098 systemd[1]: session-7.scope: Deactivated successfully. Sep 6 00:06:45.401586 systemd-logind[1802]: Removed session 7. Sep 6 00:06:45.455658 kubelet[2204]: E0906 00:06:45.455533 2204 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.26.60\" not found" Sep 6 00:06:45.556366 kubelet[2204]: E0906 00:06:45.556331 2204 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.26.60\" not found" Sep 6 00:06:45.628531 kubelet[2204]: I0906 00:06:45.628493 2204 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 6 00:06:45.629361 kubelet[2204]: I0906 00:06:45.629327 2204 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Sep 6 00:06:45.629603 kubelet[2204]: I0906 00:06:45.629327 2204 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Sep 6 00:06:45.656631 kubelet[2204]: E0906 00:06:45.656576 2204 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.26.60\" not found" Sep 6 00:06:45.725556 kubelet[2204]: E0906 00:06:45.725444 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:06:45.757021 kubelet[2204]: E0906 00:06:45.756970 2204 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.26.60\" not found" Sep 6 00:06:45.857770 kubelet[2204]: E0906 00:06:45.857714 2204 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.26.60\" not found" Sep 6 00:06:45.958795 kubelet[2204]: I0906 00:06:45.958740 2204 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 6 00:06:45.959293 env[1811]: time="2025-09-06T00:06:45.959233394Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 6 00:06:45.960311 kubelet[2204]: I0906 00:06:45.960272 2204 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 6 00:06:46.726438 kubelet[2204]: E0906 00:06:46.726387 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:06:46.726438 kubelet[2204]: I0906 00:06:46.726404 2204 apiserver.go:52] "Watching apiserver" Sep 6 00:06:46.738227 kubelet[2204]: E0906 00:06:46.738168 2204 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kswk5" podUID="cdb34975-5312-4f42-97e3-78ac269aa123" Sep 6 00:06:46.751698 systemd[1]: Created slice kubepods-besteffort-poda5000671_0b50_486c_a4ca_ee95395c271d.slice. Sep 6 00:06:46.775006 kubelet[2204]: I0906 00:06:46.774950 2204 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 6 00:06:46.778790 systemd[1]: Created slice kubepods-besteffort-pod14c13487_7aa7_4e80_b886_d9af0baca4d6.slice. Sep 6 00:06:46.790159 kubelet[2204]: I0906 00:06:46.790101 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/a5000671-0b50-486c-a4ca-ee95395c271d-cni-bin-dir\") pod \"calico-node-5b2h8\" (UID: \"a5000671-0b50-486c-a4ca-ee95395c271d\") " pod="calico-system/calico-node-5b2h8" Sep 6 00:06:46.790347 kubelet[2204]: I0906 00:06:46.790230 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/a5000671-0b50-486c-a4ca-ee95395c271d-flexvol-driver-host\") pod \"calico-node-5b2h8\" (UID: \"a5000671-0b50-486c-a4ca-ee95395c271d\") " pod="calico-system/calico-node-5b2h8" Sep 6 00:06:46.790423 kubelet[2204]: I0906 00:06:46.790344 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-94gb4\" (UniqueName: \"kubernetes.io/projected/a5000671-0b50-486c-a4ca-ee95395c271d-kube-api-access-94gb4\") pod \"calico-node-5b2h8\" (UID: \"a5000671-0b50-486c-a4ca-ee95395c271d\") " pod="calico-system/calico-node-5b2h8" Sep 6 00:06:46.790495 kubelet[2204]: I0906 00:06:46.790439 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/a5000671-0b50-486c-a4ca-ee95395c271d-cni-log-dir\") pod \"calico-node-5b2h8\" (UID: \"a5000671-0b50-486c-a4ca-ee95395c271d\") " pod="calico-system/calico-node-5b2h8" Sep 6 00:06:46.790562 kubelet[2204]: I0906 00:06:46.790528 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/a5000671-0b50-486c-a4ca-ee95395c271d-cni-net-dir\") pod \"calico-node-5b2h8\" (UID: \"a5000671-0b50-486c-a4ca-ee95395c271d\") " pod="calico-system/calico-node-5b2h8" Sep 6 00:06:46.790630 kubelet[2204]: I0906 00:06:46.790611 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/a5000671-0b50-486c-a4ca-ee95395c271d-node-certs\") pod \"calico-node-5b2h8\" (UID: \"a5000671-0b50-486c-a4ca-ee95395c271d\") " pod="calico-system/calico-node-5b2h8" Sep 6 00:06:46.790761 kubelet[2204]: I0906 00:06:46.790724 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a5000671-0b50-486c-a4ca-ee95395c271d-xtables-lock\") pod \"calico-node-5b2h8\" (UID: \"a5000671-0b50-486c-a4ca-ee95395c271d\") " pod="calico-system/calico-node-5b2h8" Sep 6 00:06:46.790876 kubelet[2204]: I0906 00:06:46.790835 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/cdb34975-5312-4f42-97e3-78ac269aa123-kubelet-dir\") pod \"csi-node-driver-kswk5\" (UID: \"cdb34975-5312-4f42-97e3-78ac269aa123\") " pod="calico-system/csi-node-driver-kswk5" Sep 6 00:06:46.791017 kubelet[2204]: I0906 00:06:46.790986 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/14c13487-7aa7-4e80-b886-d9af0baca4d6-kube-proxy\") pod \"kube-proxy-p85c6\" (UID: \"14c13487-7aa7-4e80-b886-d9af0baca4d6\") " pod="kube-system/kube-proxy-p85c6" Sep 6 00:06:46.791130 kubelet[2204]: I0906 00:06:46.791095 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/14c13487-7aa7-4e80-b886-d9af0baca4d6-lib-modules\") pod \"kube-proxy-p85c6\" (UID: \"14c13487-7aa7-4e80-b886-d9af0baca4d6\") " pod="kube-system/kube-proxy-p85c6" Sep 6 00:06:46.791229 kubelet[2204]: I0906 00:06:46.791199 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qrmml\" (UniqueName: \"kubernetes.io/projected/14c13487-7aa7-4e80-b886-d9af0baca4d6-kube-api-access-qrmml\") pod \"kube-proxy-p85c6\" (UID: \"14c13487-7aa7-4e80-b886-d9af0baca4d6\") " pod="kube-system/kube-proxy-p85c6" Sep 6 00:06:46.791296 kubelet[2204]: I0906 00:06:46.791281 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a5000671-0b50-486c-a4ca-ee95395c271d-lib-modules\") pod \"calico-node-5b2h8\" (UID: \"a5000671-0b50-486c-a4ca-ee95395c271d\") " pod="calico-system/calico-node-5b2h8" Sep 6 00:06:46.791391 kubelet[2204]: I0906 00:06:46.791320 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a5000671-0b50-486c-a4ca-ee95395c271d-tigera-ca-bundle\") pod \"calico-node-5b2h8\" (UID: \"a5000671-0b50-486c-a4ca-ee95395c271d\") " pod="calico-system/calico-node-5b2h8" Sep 6 00:06:46.792039 kubelet[2204]: I0906 00:06:46.791995 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/cdb34975-5312-4f42-97e3-78ac269aa123-varrun\") pod \"csi-node-driver-kswk5\" (UID: \"cdb34975-5312-4f42-97e3-78ac269aa123\") " pod="calico-system/csi-node-driver-kswk5" Sep 6 00:06:46.798821 kubelet[2204]: I0906 00:06:46.798768 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nt59r\" (UniqueName: \"kubernetes.io/projected/cdb34975-5312-4f42-97e3-78ac269aa123-kube-api-access-nt59r\") pod \"csi-node-driver-kswk5\" (UID: \"cdb34975-5312-4f42-97e3-78ac269aa123\") " pod="calico-system/csi-node-driver-kswk5" Sep 6 00:06:46.799144 kubelet[2204]: I0906 00:06:46.799112 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/14c13487-7aa7-4e80-b886-d9af0baca4d6-xtables-lock\") pod \"kube-proxy-p85c6\" (UID: \"14c13487-7aa7-4e80-b886-d9af0baca4d6\") " pod="kube-system/kube-proxy-p85c6" Sep 6 00:06:46.799284 kubelet[2204]: I0906 00:06:46.799258 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/a5000671-0b50-486c-a4ca-ee95395c271d-policysync\") pod \"calico-node-5b2h8\" (UID: \"a5000671-0b50-486c-a4ca-ee95395c271d\") " pod="calico-system/calico-node-5b2h8" Sep 6 00:06:46.799416 kubelet[2204]: I0906 00:06:46.799391 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a5000671-0b50-486c-a4ca-ee95395c271d-var-lib-calico\") pod \"calico-node-5b2h8\" (UID: \"a5000671-0b50-486c-a4ca-ee95395c271d\") " pod="calico-system/calico-node-5b2h8" Sep 6 00:06:46.799581 kubelet[2204]: I0906 00:06:46.799554 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/a5000671-0b50-486c-a4ca-ee95395c271d-var-run-calico\") pod \"calico-node-5b2h8\" (UID: \"a5000671-0b50-486c-a4ca-ee95395c271d\") " pod="calico-system/calico-node-5b2h8" Sep 6 00:06:46.799756 kubelet[2204]: I0906 00:06:46.799730 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/cdb34975-5312-4f42-97e3-78ac269aa123-registration-dir\") pod \"csi-node-driver-kswk5\" (UID: \"cdb34975-5312-4f42-97e3-78ac269aa123\") " pod="calico-system/csi-node-driver-kswk5" Sep 6 00:06:46.799987 kubelet[2204]: I0906 00:06:46.799961 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/cdb34975-5312-4f42-97e3-78ac269aa123-socket-dir\") pod \"csi-node-driver-kswk5\" (UID: \"cdb34975-5312-4f42-97e3-78ac269aa123\") " pod="calico-system/csi-node-driver-kswk5" Sep 6 00:06:46.903015 kubelet[2204]: I0906 00:06:46.902964 2204 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 6 00:06:46.905277 kubelet[2204]: E0906 00:06:46.905237 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.905532 kubelet[2204]: W0906 00:06:46.905500 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.905729 kubelet[2204]: E0906 00:06:46.905672 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.906394 kubelet[2204]: E0906 00:06:46.906365 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.906574 kubelet[2204]: W0906 00:06:46.906547 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.906735 kubelet[2204]: E0906 00:06:46.906710 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.907295 kubelet[2204]: E0906 00:06:46.907269 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.907454 kubelet[2204]: W0906 00:06:46.907426 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.907613 kubelet[2204]: E0906 00:06:46.907584 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.908322 kubelet[2204]: E0906 00:06:46.908289 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.908501 kubelet[2204]: W0906 00:06:46.908473 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.908651 kubelet[2204]: E0906 00:06:46.908624 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.909302 kubelet[2204]: E0906 00:06:46.909273 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.909461 kubelet[2204]: W0906 00:06:46.909434 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.909607 kubelet[2204]: E0906 00:06:46.909582 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.910337 kubelet[2204]: E0906 00:06:46.910307 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.910499 kubelet[2204]: W0906 00:06:46.910473 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.910645 kubelet[2204]: E0906 00:06:46.910619 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.911186 kubelet[2204]: E0906 00:06:46.911161 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.911349 kubelet[2204]: W0906 00:06:46.911324 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.911499 kubelet[2204]: E0906 00:06:46.911475 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.912028 kubelet[2204]: E0906 00:06:46.912004 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.912164 kubelet[2204]: W0906 00:06:46.912140 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.912299 kubelet[2204]: E0906 00:06:46.912275 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.912836 kubelet[2204]: E0906 00:06:46.912813 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.912984 kubelet[2204]: W0906 00:06:46.912960 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.913197 kubelet[2204]: E0906 00:06:46.913113 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.913773 kubelet[2204]: E0906 00:06:46.913751 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.913897 kubelet[2204]: W0906 00:06:46.913873 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.914038 kubelet[2204]: E0906 00:06:46.914014 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.914516 kubelet[2204]: E0906 00:06:46.914482 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.921281 kubelet[2204]: W0906 00:06:46.915399 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.921281 kubelet[2204]: E0906 00:06:46.915454 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.921281 kubelet[2204]: E0906 00:06:46.919031 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.921281 kubelet[2204]: W0906 00:06:46.919060 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.921281 kubelet[2204]: E0906 00:06:46.919091 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.924289 kubelet[2204]: E0906 00:06:46.924237 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.924289 kubelet[2204]: W0906 00:06:46.924278 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.924496 kubelet[2204]: E0906 00:06:46.924313 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.935980 kubelet[2204]: E0906 00:06:46.931842 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.935980 kubelet[2204]: W0906 00:06:46.931881 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.935980 kubelet[2204]: E0906 00:06:46.931953 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.946354 kubelet[2204]: E0906 00:06:46.946306 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.946354 kubelet[2204]: W0906 00:06:46.946342 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.946592 kubelet[2204]: E0906 00:06:46.946375 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.946816 kubelet[2204]: E0906 00:06:46.946781 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.946816 kubelet[2204]: W0906 00:06:46.946810 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.946998 kubelet[2204]: E0906 00:06:46.946834 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.947287 kubelet[2204]: E0906 00:06:46.947251 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.947287 kubelet[2204]: W0906 00:06:46.947283 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.947470 kubelet[2204]: E0906 00:06:46.947307 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.947665 kubelet[2204]: E0906 00:06:46.947633 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.947665 kubelet[2204]: W0906 00:06:46.947660 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.947829 kubelet[2204]: E0906 00:06:46.947683 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.955465 kubelet[2204]: E0906 00:06:46.955428 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.955677 kubelet[2204]: W0906 00:06:46.955648 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.955805 kubelet[2204]: E0906 00:06:46.955779 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.956477 kubelet[2204]: E0906 00:06:46.956450 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.956634 kubelet[2204]: W0906 00:06:46.956594 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.956752 kubelet[2204]: E0906 00:06:46.956728 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.957343 kubelet[2204]: E0906 00:06:46.957318 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.957494 kubelet[2204]: W0906 00:06:46.957469 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.957617 kubelet[2204]: E0906 00:06:46.957593 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.958085 kubelet[2204]: E0906 00:06:46.958062 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.958219 kubelet[2204]: W0906 00:06:46.958196 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.958332 kubelet[2204]: E0906 00:06:46.958309 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.958793 kubelet[2204]: E0906 00:06:46.958771 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.958928 kubelet[2204]: W0906 00:06:46.958889 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.959060 kubelet[2204]: E0906 00:06:46.959037 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.959500 kubelet[2204]: E0906 00:06:46.959478 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.959616 kubelet[2204]: W0906 00:06:46.959593 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.959734 kubelet[2204]: E0906 00:06:46.959705 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.960224 kubelet[2204]: E0906 00:06:46.960201 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.960341 kubelet[2204]: W0906 00:06:46.960318 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.960471 kubelet[2204]: E0906 00:06:46.960449 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:46.961015 kubelet[2204]: E0906 00:06:46.960991 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:46.961145 kubelet[2204]: W0906 00:06:46.961120 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:46.961261 kubelet[2204]: E0906 00:06:46.961235 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:47.078185 env[1811]: time="2025-09-06T00:06:47.077873449Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5b2h8,Uid:a5000671-0b50-486c-a4ca-ee95395c271d,Namespace:calico-system,Attempt:0,}" Sep 6 00:06:47.085176 env[1811]: time="2025-09-06T00:06:47.085119061Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-p85c6,Uid:14c13487-7aa7-4e80-b886-d9af0baca4d6,Namespace:kube-system,Attempt:0,}" Sep 6 00:06:47.678996 env[1811]: time="2025-09-06T00:06:47.678891010Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:47.682380 env[1811]: time="2025-09-06T00:06:47.682307776Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:47.686819 env[1811]: time="2025-09-06T00:06:47.685029386Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:47.690489 env[1811]: time="2025-09-06T00:06:47.690423426Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:47.692369 env[1811]: time="2025-09-06T00:06:47.692310880Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:47.695168 env[1811]: time="2025-09-06T00:06:47.695123675Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:47.699747 env[1811]: time="2025-09-06T00:06:47.699695633Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:47.702309 env[1811]: time="2025-09-06T00:06:47.702264445Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:47.727107 kubelet[2204]: E0906 00:06:47.727007 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:06:47.741048 env[1811]: time="2025-09-06T00:06:47.740849473Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:06:47.741485 env[1811]: time="2025-09-06T00:06:47.740982645Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:06:47.741485 env[1811]: time="2025-09-06T00:06:47.741260281Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:06:47.741485 env[1811]: time="2025-09-06T00:06:47.740933383Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:06:47.741485 env[1811]: time="2025-09-06T00:06:47.741087930Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:06:47.741485 env[1811]: time="2025-09-06T00:06:47.741114725Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:06:47.742128 env[1811]: time="2025-09-06T00:06:47.742034672Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/14446822dc8f6b14d44161841a2bd8719f0288929e4170b610a9486b4dd24891 pid=2295 runtime=io.containerd.runc.v2 Sep 6 00:06:47.742563 env[1811]: time="2025-09-06T00:06:47.742462120Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ad397e2393aad6f4244549bd0050d32fca1305408a7ab25ce93fcd4eafecc9c1 pid=2293 runtime=io.containerd.runc.v2 Sep 6 00:06:47.787164 systemd[1]: Started cri-containerd-14446822dc8f6b14d44161841a2bd8719f0288929e4170b610a9486b4dd24891.scope. Sep 6 00:06:47.813673 systemd[1]: Started cri-containerd-ad397e2393aad6f4244549bd0050d32fca1305408a7ab25ce93fcd4eafecc9c1.scope. Sep 6 00:06:47.852150 kernel: kauditd_printk_skb: 276 callbacks suppressed Sep 6 00:06:47.852291 kernel: audit: type=1400 audit(1757117207.841:451): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.861804 kernel: audit: type=1400 audit(1757117207.841:452): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.869747 kernel: audit: type=1400 audit(1757117207.841:453): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.877931 kernel: audit: type=1400 audit(1757117207.841:454): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.886165 kernel: audit: type=1400 audit(1757117207.841:455): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.890835 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 6 00:06:47.890987 kernel: audit: type=1400 audit(1757117207.841:456): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.900834 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Sep 6 00:06:47.902522 kernel: audit: backlog limit exceeded Sep 6 00:06:47.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.905940 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 6 00:06:47.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.843000 audit: BPF prog-id=64 op=LOAD Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2295 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:47.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134343436383232646338663662313464343431363138343161326264 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2295 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:47.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134343436383232646338663662313464343431363138343161326264 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit: BPF prog-id=65 op=LOAD Sep 6 00:06:47.852000 audit[2316]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2295 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:47.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134343436383232646338663662313464343431363138343161326264 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit: BPF prog-id=66 op=LOAD Sep 6 00:06:47.852000 audit[2316]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2295 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:47.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134343436383232646338663662313464343431363138343161326264 Sep 6 00:06:47.852000 audit: BPF prog-id=66 op=UNLOAD Sep 6 00:06:47.852000 audit: BPF prog-id=65 op=UNLOAD Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.852000 audit: BPF prog-id=67 op=LOAD Sep 6 00:06:47.852000 audit[2316]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2295 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:47.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134343436383232646338663662313464343431363138343161326264 Sep 6 00:06:47.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.906000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.906000 audit[2317]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2293 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:47.920995 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1630638962.mount: Deactivated successfully. Sep 6 00:06:47.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164333937653233393361616436663432343435343962643030353064 Sep 6 00:06:47.922000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.922000 audit[2317]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2293 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:47.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164333937653233393361616436663432343435343962643030353064 Sep 6 00:06:47.923000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.923000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.923000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.923000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.923000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.923000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.923000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.923000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.923000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.923000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.923000 audit: BPF prog-id=69 op=LOAD Sep 6 00:06:47.923000 audit[2317]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2293 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:47.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164333937653233393361616436663432343435343962643030353064 Sep 6 00:06:47.925000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.925000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.925000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.925000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.925000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.925000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.925000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.925000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.925000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.925000 audit: BPF prog-id=70 op=LOAD Sep 6 00:06:47.925000 audit[2317]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2293 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:47.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164333937653233393361616436663432343435343962643030353064 Sep 6 00:06:47.927000 audit: BPF prog-id=70 op=UNLOAD Sep 6 00:06:47.927000 audit: BPF prog-id=69 op=UNLOAD Sep 6 00:06:47.928000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.928000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.928000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.928000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.928000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.928000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.928000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.928000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.928000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.928000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:47.928000 audit: BPF prog-id=71 op=LOAD Sep 6 00:06:47.928000 audit[2317]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2293 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:47.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164333937653233393361616436663432343435343962643030353064 Sep 6 00:06:47.943144 env[1811]: time="2025-09-06T00:06:47.943065092Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-p85c6,Uid:14c13487-7aa7-4e80-b886-d9af0baca4d6,Namespace:kube-system,Attempt:0,} returns sandbox id \"14446822dc8f6b14d44161841a2bd8719f0288929e4170b610a9486b4dd24891\"" Sep 6 00:06:47.950161 env[1811]: time="2025-09-06T00:06:47.950099162Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.4\"" Sep 6 00:06:47.964105 env[1811]: time="2025-09-06T00:06:47.964008629Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5b2h8,Uid:a5000671-0b50-486c-a4ca-ee95395c271d,Namespace:calico-system,Attempt:0,} returns sandbox id \"ad397e2393aad6f4244549bd0050d32fca1305408a7ab25ce93fcd4eafecc9c1\"" Sep 6 00:06:48.063778 kubelet[2204]: E0906 00:06:48.063701 2204 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kswk5" podUID="cdb34975-5312-4f42-97e3-78ac269aa123" Sep 6 00:06:48.728209 kubelet[2204]: E0906 00:06:48.728104 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:06:49.263200 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3183892984.mount: Deactivated successfully. Sep 6 00:06:49.729337 kubelet[2204]: E0906 00:06:49.728880 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:06:50.064729 kubelet[2204]: E0906 00:06:50.063685 2204 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kswk5" podUID="cdb34975-5312-4f42-97e3-78ac269aa123" Sep 6 00:06:50.205533 env[1811]: time="2025-09-06T00:06:50.205459435Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:50.208839 env[1811]: time="2025-09-06T00:06:50.208775731Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e19c0cda155dad39120317830ddb8b2bc22070f2c6a97973e96fb09ef504ee64,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:50.212134 env[1811]: time="2025-09-06T00:06:50.211036504Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:50.214368 env[1811]: time="2025-09-06T00:06:50.214317235Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.4\" returns image reference \"sha256:e19c0cda155dad39120317830ddb8b2bc22070f2c6a97973e96fb09ef504ee64\"" Sep 6 00:06:50.215027 env[1811]: time="2025-09-06T00:06:50.213310802Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bb04e9247da3aaeb96406b4d530a79fc865695b6807353dd1a28871df0d7f837,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:50.217711 env[1811]: time="2025-09-06T00:06:50.217389446Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 6 00:06:50.221673 env[1811]: time="2025-09-06T00:06:50.221617171Z" level=info msg="CreateContainer within sandbox \"14446822dc8f6b14d44161841a2bd8719f0288929e4170b610a9486b4dd24891\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 6 00:06:50.243158 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3650645302.mount: Deactivated successfully. Sep 6 00:06:50.262564 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3880671093.mount: Deactivated successfully. Sep 6 00:06:50.263732 env[1811]: time="2025-09-06T00:06:50.263603665Z" level=info msg="CreateContainer within sandbox \"14446822dc8f6b14d44161841a2bd8719f0288929e4170b610a9486b4dd24891\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"265df55f4416e4e31bc546cc2e7cf6ab4a724760fad0d0b9cd8a2c374caf7a91\"" Sep 6 00:06:50.265708 env[1811]: time="2025-09-06T00:06:50.265658018Z" level=info msg="StartContainer for \"265df55f4416e4e31bc546cc2e7cf6ab4a724760fad0d0b9cd8a2c374caf7a91\"" Sep 6 00:06:50.306524 systemd[1]: Started cri-containerd-265df55f4416e4e31bc546cc2e7cf6ab4a724760fad0d0b9cd8a2c374caf7a91.scope. Sep 6 00:06:50.315894 systemd[1]: run-containerd-runc-k8s.io-265df55f4416e4e31bc546cc2e7cf6ab4a724760fad0d0b9cd8a2c374caf7a91-runc.K86WZe.mount: Deactivated successfully. Sep 6 00:06:50.359000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.359000 audit[2373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2295 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236356466353566343431366534653331626335343663633265376366 Sep 6 00:06:50.360000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.360000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.360000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.360000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.360000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.360000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.360000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.360000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.360000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.360000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.360000 audit: BPF prog-id=72 op=LOAD Sep 6 00:06:50.360000 audit[2373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2295 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236356466353566343431366534653331626335343663633265376366 Sep 6 00:06:50.362000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.362000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.362000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.362000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.362000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.362000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.362000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.362000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.362000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.362000 audit: BPF prog-id=73 op=LOAD Sep 6 00:06:50.362000 audit[2373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2295 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236356466353566343431366534653331626335343663633265376366 Sep 6 00:06:50.363000 audit: BPF prog-id=73 op=UNLOAD Sep 6 00:06:50.364000 audit: BPF prog-id=72 op=UNLOAD Sep 6 00:06:50.364000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.364000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.364000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.364000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.364000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.364000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.364000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.364000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.364000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.364000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:50.364000 audit: BPF prog-id=74 op=LOAD Sep 6 00:06:50.364000 audit[2373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2295 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236356466353566343431366534653331626335343663633265376366 Sep 6 00:06:50.392802 env[1811]: time="2025-09-06T00:06:50.392581882Z" level=info msg="StartContainer for \"265df55f4416e4e31bc546cc2e7cf6ab4a724760fad0d0b9cd8a2c374caf7a91\" returns successfully" Sep 6 00:06:50.649000 audit[2434]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=2434 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:50.649000 audit[2434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffee33bb0 a2=0 a3=1 items=0 ppid=2384 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.649000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 00:06:50.655000 audit[2435]: NETFILTER_CFG table=nat:15 family=10 entries=1 op=nft_register_chain pid=2435 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:50.655000 audit[2435]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd9bd6a0 a2=0 a3=1 items=0 ppid=2384 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.655000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 00:06:50.657000 audit[2436]: NETFILTER_CFG table=mangle:16 family=2 entries=1 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.657000 audit[2436]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe6bdc230 a2=0 a3=1 items=0 ppid=2384 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.657000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 00:06:50.661000 audit[2440]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=2440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.661000 audit[2440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4b084c0 a2=0 a3=1 items=0 ppid=2384 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.661000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 00:06:50.664000 audit[2441]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.664000 audit[2441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff80a5e50 a2=0 a3=1 items=0 ppid=2384 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.664000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 00:06:50.665000 audit[2442]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2442 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:50.665000 audit[2442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff7377970 a2=0 a3=1 items=0 ppid=2384 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 00:06:50.729193 kubelet[2204]: E0906 00:06:50.729112 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:06:50.765000 audit[2443]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.765000 audit[2443]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe7cd70c0 a2=0 a3=1 items=0 ppid=2384 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.765000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 00:06:50.770000 audit[2445]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.770000 audit[2445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff442c4e0 a2=0 a3=1 items=0 ppid=2384 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.770000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 6 00:06:50.777000 audit[2448]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.777000 audit[2448]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc6d24770 a2=0 a3=1 items=0 ppid=2384 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.777000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 6 00:06:50.780000 audit[2449]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.780000 audit[2449]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe16163e0 a2=0 a3=1 items=0 ppid=2384 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.780000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 00:06:50.785000 audit[2451]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.785000 audit[2451]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc7f60a00 a2=0 a3=1 items=0 ppid=2384 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.785000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 00:06:50.787000 audit[2452]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.787000 audit[2452]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd8462240 a2=0 a3=1 items=0 ppid=2384 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.787000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 00:06:50.792000 audit[2454]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.792000 audit[2454]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd03f4ea0 a2=0 a3=1 items=0 ppid=2384 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.792000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 00:06:50.800000 audit[2457]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.800000 audit[2457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffddc4b380 a2=0 a3=1 items=0 ppid=2384 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.800000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 6 00:06:50.803000 audit[2458]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.803000 audit[2458]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc65fda40 a2=0 a3=1 items=0 ppid=2384 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 00:06:50.808000 audit[2460]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.808000 audit[2460]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffda6889d0 a2=0 a3=1 items=0 ppid=2384 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.808000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 00:06:50.811000 audit[2461]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.811000 audit[2461]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe1a59e90 a2=0 a3=1 items=0 ppid=2384 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.811000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 00:06:50.817000 audit[2463]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.817000 audit[2463]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff8a111f0 a2=0 a3=1 items=0 ppid=2384 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.817000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 00:06:50.824000 audit[2466]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.824000 audit[2466]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc341d9e0 a2=0 a3=1 items=0 ppid=2384 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.824000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 00:06:50.831000 audit[2469]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.831000 audit[2469]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff41cfd80 a2=0 a3=1 items=0 ppid=2384 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.831000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 00:06:50.834000 audit[2470]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.834000 audit[2470]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffee6c4c40 a2=0 a3=1 items=0 ppid=2384 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.834000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 00:06:50.838000 audit[2472]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.838000 audit[2472]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd88bcac0 a2=0 a3=1 items=0 ppid=2384 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.838000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:06:50.889000 audit[2476]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.889000 audit[2476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffda330150 a2=0 a3=1 items=0 ppid=2384 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.889000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:06:50.892000 audit[2477]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2477 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.892000 audit[2477]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcd0f8d20 a2=0 a3=1 items=0 ppid=2384 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.892000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 00:06:50.897000 audit[2479]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:06:50.897000 audit[2479]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffeb81e7a0 a2=0 a3=1 items=0 ppid=2384 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.897000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 00:06:50.953000 audit[2485]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=2485 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:06:50.953000 audit[2485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffe9fb8a50 a2=0 a3=1 items=0 ppid=2384 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.953000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:06:50.984000 audit[2485]: NETFILTER_CFG table=nat:40 family=2 entries=42 op=nft_register_chain pid=2485 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:06:50.984000 audit[2485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19812 a0=3 a1=ffffe9fb8a50 a2=0 a3=1 items=0 ppid=2384 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:50.984000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:06:51.004000 audit[2493]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2493 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.004000 audit[2493]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe9b2e0a0 a2=0 a3=1 items=0 ppid=2384 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.004000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 00:06:51.010000 audit[2495]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2495 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.010000 audit[2495]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd72ba7c0 a2=0 a3=1 items=0 ppid=2384 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.010000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 6 00:06:51.018000 audit[2498]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2498 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.018000 audit[2498]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff4eb8eb0 a2=0 a3=1 items=0 ppid=2384 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.018000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 6 00:06:51.020000 audit[2499]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2499 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.020000 audit[2499]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd4f4100 a2=0 a3=1 items=0 ppid=2384 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.020000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 00:06:51.024000 audit[2501]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2501 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.024000 audit[2501]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd10835c0 a2=0 a3=1 items=0 ppid=2384 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.024000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 00:06:51.027000 audit[2502]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2502 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.027000 audit[2502]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff4abf4f0 a2=0 a3=1 items=0 ppid=2384 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.027000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 00:06:51.033000 audit[2504]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2504 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.033000 audit[2504]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe960e180 a2=0 a3=1 items=0 ppid=2384 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.033000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 6 00:06:51.048000 audit[2507]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2507 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.048000 audit[2507]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc1f46b70 a2=0 a3=1 items=0 ppid=2384 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.048000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 00:06:51.052000 audit[2508]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2508 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.052000 audit[2508]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc7f7fb60 a2=0 a3=1 items=0 ppid=2384 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.052000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 00:06:51.057000 audit[2510]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2510 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.057000 audit[2510]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff5fbe090 a2=0 a3=1 items=0 ppid=2384 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.057000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 00:06:51.059000 audit[2511]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2511 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.059000 audit[2511]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeaf691e0 a2=0 a3=1 items=0 ppid=2384 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.059000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 00:06:51.069000 audit[2513]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2513 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.069000 audit[2513]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffeaad1f90 a2=0 a3=1 items=0 ppid=2384 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.069000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 00:06:51.080000 audit[2516]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2516 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.080000 audit[2516]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd36c1110 a2=0 a3=1 items=0 ppid=2384 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.080000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 00:06:51.101000 audit[2519]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2519 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.101000 audit[2519]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdf6e5700 a2=0 a3=1 items=0 ppid=2384 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.101000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 6 00:06:51.105000 audit[2520]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2520 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.105000 audit[2520]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe6c58bc0 a2=0 a3=1 items=0 ppid=2384 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.105000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 00:06:51.111000 audit[2522]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2522 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.111000 audit[2522]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe1cb9fa0 a2=0 a3=1 items=0 ppid=2384 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.111000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:06:51.114729 kubelet[2204]: I0906 00:06:51.114628 2204 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-p85c6" podStartSLOduration=3.84718593 podStartE2EDuration="6.114608417s" podCreationTimestamp="2025-09-06 00:06:45 +0000 UTC" firstStartedPulling="2025-09-06 00:06:47.949322768 +0000 UTC m=+4.620018313" lastFinishedPulling="2025-09-06 00:06:50.216745255 +0000 UTC m=+6.887440800" observedRunningTime="2025-09-06 00:06:51.114429243 +0000 UTC m=+7.785124812" watchObservedRunningTime="2025-09-06 00:06:51.114608417 +0000 UTC m=+7.785303962" Sep 6 00:06:51.118174 kubelet[2204]: E0906 00:06:51.118128 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.118174 kubelet[2204]: W0906 00:06:51.118168 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.118422 kubelet[2204]: E0906 00:06:51.118202 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.118794 kubelet[2204]: E0906 00:06:51.118763 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.118880 kubelet[2204]: W0906 00:06:51.118794 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.119002 kubelet[2204]: E0906 00:06:51.118876 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.120108 kubelet[2204]: E0906 00:06:51.120068 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.120108 kubelet[2204]: W0906 00:06:51.120103 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.120368 kubelet[2204]: E0906 00:06:51.120135 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.120803 kubelet[2204]: E0906 00:06:51.120770 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.120896 kubelet[2204]: W0906 00:06:51.120802 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.120896 kubelet[2204]: E0906 00:06:51.120830 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.121512 kubelet[2204]: E0906 00:06:51.121477 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.121600 kubelet[2204]: W0906 00:06:51.121510 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.121600 kubelet[2204]: E0906 00:06:51.121537 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.122346 kubelet[2204]: E0906 00:06:51.122158 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.122346 kubelet[2204]: W0906 00:06:51.122193 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.122346 kubelet[2204]: E0906 00:06:51.122264 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.123778 kubelet[2204]: E0906 00:06:51.123729 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.123778 kubelet[2204]: W0906 00:06:51.123768 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.123998 kubelet[2204]: E0906 00:06:51.123802 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.125362 kubelet[2204]: E0906 00:06:51.125019 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.125362 kubelet[2204]: W0906 00:06:51.125067 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.125362 kubelet[2204]: E0906 00:06:51.125113 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.126000 audit[2533]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2533 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.126000 audit[2533]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffed64ab50 a2=0 a3=1 items=0 ppid=2384 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.126000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:06:51.128068 kubelet[2204]: E0906 00:06:51.128035 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.128213 kubelet[2204]: W0906 00:06:51.128184 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.128340 kubelet[2204]: E0906 00:06:51.128314 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.128858 kubelet[2204]: E0906 00:06:51.128830 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.129067 kubelet[2204]: W0906 00:06:51.129022 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.129199 kubelet[2204]: E0906 00:06:51.129172 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.129811 kubelet[2204]: E0906 00:06:51.129783 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.130015 kubelet[2204]: W0906 00:06:51.129986 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.130256 kubelet[2204]: E0906 00:06:51.130227 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.130761 kubelet[2204]: E0906 00:06:51.130733 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.130957 kubelet[2204]: W0906 00:06:51.130892 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.131085 kubelet[2204]: E0906 00:06:51.131059 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.130000 audit[2535]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2535 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.130000 audit[2535]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeb561dc0 a2=0 a3=1 items=0 ppid=2384 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.130000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 00:06:51.134069 kubelet[2204]: E0906 00:06:51.134031 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.134258 kubelet[2204]: W0906 00:06:51.134230 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.134410 kubelet[2204]: E0906 00:06:51.134383 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.134955 kubelet[2204]: E0906 00:06:51.134895 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.135623 kubelet[2204]: W0906 00:06:51.135572 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.135845 kubelet[2204]: E0906 00:06:51.135787 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.136483 kubelet[2204]: E0906 00:06:51.136452 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.136648 kubelet[2204]: W0906 00:06:51.136620 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.136806 kubelet[2204]: E0906 00:06:51.136779 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.138140 kubelet[2204]: E0906 00:06:51.138104 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.138324 kubelet[2204]: W0906 00:06:51.138296 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.138475 kubelet[2204]: E0906 00:06:51.138448 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.137000 audit[2543]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2543 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.137000 audit[2543]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc22769d0 a2=0 a3=1 items=0 ppid=2384 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.137000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 00:06:51.140043 kubelet[2204]: E0906 00:06:51.140008 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.140221 kubelet[2204]: W0906 00:06:51.140192 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.140346 kubelet[2204]: E0906 00:06:51.140320 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.141186 kubelet[2204]: E0906 00:06:51.141153 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.141396 kubelet[2204]: W0906 00:06:51.141368 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.141532 kubelet[2204]: E0906 00:06:51.141505 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.141000 audit[2546]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2546 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.141000 audit[2546]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff2c63b10 a2=0 a3=1 items=0 ppid=2384 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.141000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 00:06:51.143510 kubelet[2204]: E0906 00:06:51.143472 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.143692 kubelet[2204]: W0906 00:06:51.143662 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.143818 kubelet[2204]: E0906 00:06:51.143792 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.144329 kubelet[2204]: E0906 00:06:51.144304 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.144479 kubelet[2204]: W0906 00:06:51.144454 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.144604 kubelet[2204]: E0906 00:06:51.144575 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.145326 kubelet[2204]: E0906 00:06:51.145297 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.145495 kubelet[2204]: W0906 00:06:51.145468 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.145618 kubelet[2204]: E0906 00:06:51.145593 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.146173 kubelet[2204]: E0906 00:06:51.146148 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.146324 kubelet[2204]: W0906 00:06:51.146297 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.146449 kubelet[2204]: E0906 00:06:51.146424 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.147000 audit[2553]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2553 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.147000 audit[2553]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdf333240 a2=0 a3=1 items=0 ppid=2384 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.147000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:06:51.149096 kubelet[2204]: E0906 00:06:51.148076 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.149096 kubelet[2204]: W0906 00:06:51.148115 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.149096 kubelet[2204]: E0906 00:06:51.148148 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.150261 kubelet[2204]: E0906 00:06:51.150220 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.150261 kubelet[2204]: W0906 00:06:51.150257 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.150455 kubelet[2204]: E0906 00:06:51.150291 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.150815 kubelet[2204]: E0906 00:06:51.150785 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.150897 kubelet[2204]: W0906 00:06:51.150815 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.150897 kubelet[2204]: E0906 00:06:51.150840 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.151352 kubelet[2204]: E0906 00:06:51.151322 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.151470 kubelet[2204]: W0906 00:06:51.151351 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.151470 kubelet[2204]: E0906 00:06:51.151376 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.151896 kubelet[2204]: E0906 00:06:51.151867 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.151896 kubelet[2204]: W0906 00:06:51.151895 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.152072 kubelet[2204]: E0906 00:06:51.151946 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.153005 kubelet[2204]: E0906 00:06:51.152887 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.153005 kubelet[2204]: W0906 00:06:51.152969 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.153182 kubelet[2204]: E0906 00:06:51.153021 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.153634 kubelet[2204]: E0906 00:06:51.153603 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.153725 kubelet[2204]: W0906 00:06:51.153632 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.153725 kubelet[2204]: E0906 00:06:51.153659 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.155054 kubelet[2204]: E0906 00:06:51.155018 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.155054 kubelet[2204]: W0906 00:06:51.155051 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.155219 kubelet[2204]: E0906 00:06:51.155080 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.155573 kubelet[2204]: E0906 00:06:51.155539 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.155654 kubelet[2204]: W0906 00:06:51.155571 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.155654 kubelet[2204]: E0906 00:06:51.155598 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.158515 kubelet[2204]: E0906 00:06:51.157083 2204 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:06:51.158515 kubelet[2204]: W0906 00:06:51.157123 2204 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:06:51.158515 kubelet[2204]: E0906 00:06:51.157158 2204 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:06:51.159000 audit[2566]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2566 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:06:51.159000 audit[2566]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffc17dd50 a2=0 a3=1 items=0 ppid=2384 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.159000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:06:51.166000 audit[2568]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2568 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 00:06:51.166000 audit[2568]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffc7754650 a2=0 a3=1 items=0 ppid=2384 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.166000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:06:51.167000 audit[2568]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2568 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 00:06:51.167000 audit[2568]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffc7754650 a2=0 a3=1 items=0 ppid=2384 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.167000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:06:51.234000 audit[2570]: NETFILTER_CFG table=filter:65 family=2 entries=13 op=nft_register_rule pid=2570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:06:51.234000 audit[2570]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd12ffbc0 a2=0 a3=1 items=0 ppid=2384 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.234000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:06:51.239000 audit[2570]: NETFILTER_CFG table=nat:66 family=2 entries=27 op=nft_register_chain pid=2570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:06:51.239000 audit[2570]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffd12ffbc0 a2=0 a3=1 items=0 ppid=2384 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.239000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:06:51.373128 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3564946628.mount: Deactivated successfully. Sep 6 00:06:51.548320 env[1811]: time="2025-09-06T00:06:51.548148079Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:51.552236 env[1811]: time="2025-09-06T00:06:51.552165403Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:51.561210 env[1811]: time="2025-09-06T00:06:51.561152308Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:51.562473 env[1811]: time="2025-09-06T00:06:51.562425704Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:51.563607 env[1811]: time="2025-09-06T00:06:51.563552146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5\"" Sep 6 00:06:51.569994 env[1811]: time="2025-09-06T00:06:51.569931391Z" level=info msg="CreateContainer within sandbox \"ad397e2393aad6f4244549bd0050d32fca1305408a7ab25ce93fcd4eafecc9c1\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 6 00:06:51.588267 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1903111296.mount: Deactivated successfully. Sep 6 00:06:51.594677 env[1811]: time="2025-09-06T00:06:51.594600478Z" level=info msg="CreateContainer within sandbox \"ad397e2393aad6f4244549bd0050d32fca1305408a7ab25ce93fcd4eafecc9c1\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d7e19da04a2499c2c465bca50d2205d778a8ecf8e0992f92f70df3579af28d00\"" Sep 6 00:06:51.595622 env[1811]: time="2025-09-06T00:06:51.595566320Z" level=info msg="StartContainer for \"d7e19da04a2499c2c465bca50d2205d778a8ecf8e0992f92f70df3579af28d00\"" Sep 6 00:06:51.636222 systemd[1]: Started cri-containerd-d7e19da04a2499c2c465bca50d2205d778a8ecf8e0992f92f70df3579af28d00.scope. Sep 6 00:06:51.679000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.679000 audit[2579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2293 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437653139646130346132343939633263343635626361353064323230 Sep 6 00:06:51.679000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.679000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.679000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.679000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.679000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.679000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.679000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.679000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.679000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.679000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.679000 audit: BPF prog-id=75 op=LOAD Sep 6 00:06:51.679000 audit[2579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2293 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437653139646130346132343939633263343635626361353064323230 Sep 6 00:06:51.681000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.681000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.681000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.681000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.681000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.681000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.681000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.681000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.681000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.681000 audit: BPF prog-id=76 op=LOAD Sep 6 00:06:51.681000 audit[2579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2293 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437653139646130346132343939633263343635626361353064323230 Sep 6 00:06:51.683000 audit: BPF prog-id=76 op=UNLOAD Sep 6 00:06:51.683000 audit: BPF prog-id=75 op=UNLOAD Sep 6 00:06:51.683000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.683000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.683000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.683000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.683000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.683000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.683000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.683000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.683000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.683000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:51.683000 audit: BPF prog-id=77 op=LOAD Sep 6 00:06:51.683000 audit[2579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2293 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:51.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437653139646130346132343939633263343635626361353064323230 Sep 6 00:06:51.711647 env[1811]: time="2025-09-06T00:06:51.707710147Z" level=info msg="StartContainer for \"d7e19da04a2499c2c465bca50d2205d778a8ecf8e0992f92f70df3579af28d00\" returns successfully" Sep 6 00:06:51.729370 kubelet[2204]: E0906 00:06:51.729297 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:06:51.740299 systemd[1]: cri-containerd-d7e19da04a2499c2c465bca50d2205d778a8ecf8e0992f92f70df3579af28d00.scope: Deactivated successfully. Sep 6 00:06:51.742000 audit: BPF prog-id=77 op=UNLOAD Sep 6 00:06:51.981745 env[1811]: time="2025-09-06T00:06:51.981574218Z" level=info msg="shim disconnected" id=d7e19da04a2499c2c465bca50d2205d778a8ecf8e0992f92f70df3579af28d00 Sep 6 00:06:51.981745 env[1811]: time="2025-09-06T00:06:51.981647797Z" level=warning msg="cleaning up after shim disconnected" id=d7e19da04a2499c2c465bca50d2205d778a8ecf8e0992f92f70df3579af28d00 namespace=k8s.io Sep 6 00:06:51.981745 env[1811]: time="2025-09-06T00:06:51.981671408Z" level=info msg="cleaning up dead shim" Sep 6 00:06:51.995789 env[1811]: time="2025-09-06T00:06:51.995724064Z" level=warning msg="cleanup warnings time=\"2025-09-06T00:06:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2618 runtime=io.containerd.runc.v2\n" Sep 6 00:06:52.064591 kubelet[2204]: E0906 00:06:52.064049 2204 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kswk5" podUID="cdb34975-5312-4f42-97e3-78ac269aa123" Sep 6 00:06:52.090124 env[1811]: time="2025-09-06T00:06:52.090070794Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 6 00:06:52.299708 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d7e19da04a2499c2c465bca50d2205d778a8ecf8e0992f92f70df3579af28d00-rootfs.mount: Deactivated successfully. Sep 6 00:06:52.730159 kubelet[2204]: E0906 00:06:52.729739 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:06:52.960530 amazon-ssm-agent[1789]: 2025-09-06 00:06:52 INFO [HealthCheck] HealthCheck reporting agent health. Sep 6 00:06:53.730916 kubelet[2204]: E0906 00:06:53.730791 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:06:54.064572 kubelet[2204]: E0906 00:06:54.064136 2204 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kswk5" podUID="cdb34975-5312-4f42-97e3-78ac269aa123" Sep 6 00:06:54.168000 audit[2637]: NETFILTER_CFG table=filter:67 family=2 entries=12 op=nft_register_rule pid=2637 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:06:54.172152 kernel: kauditd_printk_skb: 354 callbacks suppressed Sep 6 00:06:54.172249 kernel: audit: type=1325 audit(1757117214.168:551): table=filter:67 family=2 entries=12 op=nft_register_rule pid=2637 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:06:54.178949 kernel: audit: type=1300 audit(1757117214.168:551): arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffc9010a40 a2=0 a3=1 items=0 ppid=2384 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:54.168000 audit[2637]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffc9010a40 a2=0 a3=1 items=0 ppid=2384 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:54.168000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:06:54.191065 kernel: audit: type=1327 audit(1757117214.168:551): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:06:54.208000 audit[2637]: NETFILTER_CFG table=nat:68 family=2 entries=58 op=nft_register_chain pid=2637 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:06:54.208000 audit[2637]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20628 a0=3 a1=ffffc9010a40 a2=0 a3=1 items=0 ppid=2384 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:54.227728 kernel: audit: type=1325 audit(1757117214.208:552): table=nat:68 family=2 entries=58 op=nft_register_chain pid=2637 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:06:54.227849 kernel: audit: type=1300 audit(1757117214.208:552): arch=c00000b7 syscall=211 success=yes exit=20628 a0=3 a1=ffffc9010a40 a2=0 a3=1 items=0 ppid=2384 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:54.208000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:06:54.238960 kernel: audit: type=1327 audit(1757117214.208:552): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:06:54.731239 kubelet[2204]: E0906 00:06:54.731162 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:06:55.718456 env[1811]: time="2025-09-06T00:06:55.718396553Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:55.722318 env[1811]: time="2025-09-06T00:06:55.722244821Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:55.724301 env[1811]: time="2025-09-06T00:06:55.724241035Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:55.727616 env[1811]: time="2025-09-06T00:06:55.727556464Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:06:55.729493 env[1811]: time="2025-09-06T00:06:55.729425885Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23\"" Sep 6 00:06:55.731959 kubelet[2204]: E0906 00:06:55.731782 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:06:55.738718 env[1811]: time="2025-09-06T00:06:55.738642416Z" level=info msg="CreateContainer within sandbox \"ad397e2393aad6f4244549bd0050d32fca1305408a7ab25ce93fcd4eafecc9c1\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 6 00:06:55.762773 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3478341487.mount: Deactivated successfully. Sep 6 00:06:55.771308 env[1811]: time="2025-09-06T00:06:55.771205332Z" level=info msg="CreateContainer within sandbox \"ad397e2393aad6f4244549bd0050d32fca1305408a7ab25ce93fcd4eafecc9c1\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"50e5bfa21f145858e49df588d4007ef46cbffb9d81d500da705326ff01c1be0b\"" Sep 6 00:06:55.772253 env[1811]: time="2025-09-06T00:06:55.772169953Z" level=info msg="StartContainer for \"50e5bfa21f145858e49df588d4007ef46cbffb9d81d500da705326ff01c1be0b\"" Sep 6 00:06:55.772739 amazon-ssm-agent[1789]: 2025-09-06 00:06:55 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Sep 6 00:06:55.822725 systemd[1]: run-containerd-runc-k8s.io-50e5bfa21f145858e49df588d4007ef46cbffb9d81d500da705326ff01c1be0b-runc.t2FiJ3.mount: Deactivated successfully. Sep 6 00:06:55.830390 systemd[1]: Started cri-containerd-50e5bfa21f145858e49df588d4007ef46cbffb9d81d500da705326ff01c1be0b.scope. Sep 6 00:06:55.868000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.868000 audit[2648]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2293 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:55.888747 kernel: audit: type=1400 audit(1757117215.868:553): avc: denied { perfmon } for pid=2648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.888842 kernel: audit: type=1300 audit(1757117215.868:553): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2293 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:55.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530653562666132316631343538353865343964663538386434303037 Sep 6 00:06:55.899448 kernel: audit: type=1327 audit(1757117215.868:553): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530653562666132316631343538353865343964663538386434303037 Sep 6 00:06:55.868000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.907243 kernel: audit: type=1400 audit(1757117215.868:554): avc: denied { bpf } for pid=2648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.868000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.868000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.868000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.868000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.868000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.868000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.868000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.868000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.868000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.868000 audit: BPF prog-id=78 op=LOAD Sep 6 00:06:55.868000 audit[2648]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2293 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:55.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530653562666132316631343538353865343964663538386434303037 Sep 6 00:06:55.876000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.876000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.876000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.876000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.876000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.876000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.876000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.876000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.876000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.876000 audit: BPF prog-id=79 op=LOAD Sep 6 00:06:55.876000 audit[2648]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2293 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:55.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530653562666132316631343538353865343964663538386434303037 Sep 6 00:06:55.888000 audit: BPF prog-id=79 op=UNLOAD Sep 6 00:06:55.888000 audit: BPF prog-id=78 op=UNLOAD Sep 6 00:06:55.888000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.888000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.888000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.888000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.888000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.888000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.888000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.888000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.888000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.888000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:06:55.888000 audit: BPF prog-id=80 op=LOAD Sep 6 00:06:55.888000 audit[2648]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2293 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:55.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530653562666132316631343538353865343964663538386434303037 Sep 6 00:06:55.934322 env[1811]: time="2025-09-06T00:06:55.934234230Z" level=info msg="StartContainer for \"50e5bfa21f145858e49df588d4007ef46cbffb9d81d500da705326ff01c1be0b\" returns successfully" Sep 6 00:06:56.063414 kubelet[2204]: E0906 00:06:56.063258 2204 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kswk5" podUID="cdb34975-5312-4f42-97e3-78ac269aa123" Sep 6 00:06:56.249000 audit[2676]: NETFILTER_CFG table=filter:69 family=2 entries=12 op=nft_register_rule pid=2676 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:06:56.249000 audit[2676]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd1a27050 a2=0 a3=1 items=0 ppid=2384 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:56.249000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:06:56.255000 audit[2676]: NETFILTER_CFG table=nat:70 family=2 entries=22 op=nft_register_rule pid=2676 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:06:56.255000 audit[2676]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffd1a27050 a2=0 a3=1 items=0 ppid=2384 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:06:56.255000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:06:56.732357 kubelet[2204]: E0906 00:06:56.732249 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:06:57.146388 env[1811]: time="2025-09-06T00:06:57.146303170Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 6 00:06:57.150826 systemd[1]: cri-containerd-50e5bfa21f145858e49df588d4007ef46cbffb9d81d500da705326ff01c1be0b.scope: Deactivated successfully. Sep 6 00:06:57.151289 systemd[1]: cri-containerd-50e5bfa21f145858e49df588d4007ef46cbffb9d81d500da705326ff01c1be0b.scope: Consumed 1.144s CPU time. Sep 6 00:06:57.153000 audit: BPF prog-id=80 op=UNLOAD Sep 6 00:06:57.175941 kubelet[2204]: I0906 00:06:57.175136 2204 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Sep 6 00:06:57.190853 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-50e5bfa21f145858e49df588d4007ef46cbffb9d81d500da705326ff01c1be0b-rootfs.mount: Deactivated successfully. Sep 6 00:06:57.617052 env[1811]: time="2025-09-06T00:06:57.616865891Z" level=info msg="shim disconnected" id=50e5bfa21f145858e49df588d4007ef46cbffb9d81d500da705326ff01c1be0b Sep 6 00:06:57.617443 env[1811]: time="2025-09-06T00:06:57.617380462Z" level=warning msg="cleaning up after shim disconnected" id=50e5bfa21f145858e49df588d4007ef46cbffb9d81d500da705326ff01c1be0b namespace=k8s.io Sep 6 00:06:57.617617 env[1811]: time="2025-09-06T00:06:57.617559258Z" level=info msg="cleaning up dead shim" Sep 6 00:06:57.631953 env[1811]: time="2025-09-06T00:06:57.631875735Z" level=warning msg="cleanup warnings time=\"2025-09-06T00:06:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2692 runtime=io.containerd.runc.v2\n" Sep 6 00:06:57.732934 kubelet[2204]: E0906 00:06:57.732865 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:06:58.072769 systemd[1]: Created slice kubepods-besteffort-podcdb34975_5312_4f42_97e3_78ac269aa123.slice. Sep 6 00:06:58.077579 env[1811]: time="2025-09-06T00:06:58.077519374Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kswk5,Uid:cdb34975-5312-4f42-97e3-78ac269aa123,Namespace:calico-system,Attempt:0,}" Sep 6 00:06:58.110769 env[1811]: time="2025-09-06T00:06:58.110679672Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 6 00:06:58.241244 env[1811]: time="2025-09-06T00:06:58.241139127Z" level=error msg="Failed to destroy network for sandbox \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:06:58.246437 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db-shm.mount: Deactivated successfully. Sep 6 00:06:58.248497 env[1811]: time="2025-09-06T00:06:58.248402291Z" level=error msg="encountered an error cleaning up failed sandbox \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:06:58.248641 env[1811]: time="2025-09-06T00:06:58.248514799Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kswk5,Uid:cdb34975-5312-4f42-97e3-78ac269aa123,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:06:58.248889 kubelet[2204]: E0906 00:06:58.248823 2204 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:06:58.249018 kubelet[2204]: E0906 00:06:58.248946 2204 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kswk5" Sep 6 00:06:58.249018 kubelet[2204]: E0906 00:06:58.248986 2204 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kswk5" Sep 6 00:06:58.249187 kubelet[2204]: E0906 00:06:58.249075 2204 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-kswk5_calico-system(cdb34975-5312-4f42-97e3-78ac269aa123)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-kswk5_calico-system(cdb34975-5312-4f42-97e3-78ac269aa123)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kswk5" podUID="cdb34975-5312-4f42-97e3-78ac269aa123" Sep 6 00:06:58.434438 systemd[1]: Created slice kubepods-besteffort-podad49a872_1129_4ec2_a305_554b2a506fb9.slice. Sep 6 00:06:58.517333 kubelet[2204]: I0906 00:06:58.517290 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fnqq5\" (UniqueName: \"kubernetes.io/projected/ad49a872-1129-4ec2-a305-554b2a506fb9-kube-api-access-fnqq5\") pod \"nginx-deployment-7fcdb87857-97dz2\" (UID: \"ad49a872-1129-4ec2-a305-554b2a506fb9\") " pod="default/nginx-deployment-7fcdb87857-97dz2" Sep 6 00:06:58.734332 kubelet[2204]: E0906 00:06:58.733895 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:06:58.743188 env[1811]: time="2025-09-06T00:06:58.743112820Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-97dz2,Uid:ad49a872-1129-4ec2-a305-554b2a506fb9,Namespace:default,Attempt:0,}" Sep 6 00:06:58.853058 env[1811]: time="2025-09-06T00:06:58.852964025Z" level=error msg="Failed to destroy network for sandbox \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:06:58.856589 env[1811]: time="2025-09-06T00:06:58.856515783Z" level=error msg="encountered an error cleaning up failed sandbox \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:06:58.856868 env[1811]: time="2025-09-06T00:06:58.856799237Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-97dz2,Uid:ad49a872-1129-4ec2-a305-554b2a506fb9,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:06:58.858801 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0-shm.mount: Deactivated successfully. Sep 6 00:06:58.860082 kubelet[2204]: E0906 00:06:58.860023 2204 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:06:58.860237 kubelet[2204]: E0906 00:06:58.860105 2204 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-97dz2" Sep 6 00:06:58.860237 kubelet[2204]: E0906 00:06:58.860149 2204 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-97dz2" Sep 6 00:06:58.860367 kubelet[2204]: E0906 00:06:58.860221 2204 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-97dz2_default(ad49a872-1129-4ec2-a305-554b2a506fb9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-97dz2_default(ad49a872-1129-4ec2-a305-554b2a506fb9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-97dz2" podUID="ad49a872-1129-4ec2-a305-554b2a506fb9" Sep 6 00:06:59.121543 kubelet[2204]: I0906 00:06:59.120518 2204 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Sep 6 00:06:59.122965 env[1811]: time="2025-09-06T00:06:59.122856548Z" level=info msg="StopPodSandbox for \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\"" Sep 6 00:06:59.139957 kubelet[2204]: I0906 00:06:59.139378 2204 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Sep 6 00:06:59.140517 env[1811]: time="2025-09-06T00:06:59.140465208Z" level=info msg="StopPodSandbox for \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\"" Sep 6 00:06:59.239432 env[1811]: time="2025-09-06T00:06:59.239352014Z" level=error msg="StopPodSandbox for \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\" failed" error="failed to destroy network for sandbox \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:06:59.240207 kubelet[2204]: E0906 00:06:59.239947 2204 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Sep 6 00:06:59.240207 kubelet[2204]: E0906 00:06:59.240027 2204 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0"} Sep 6 00:06:59.240207 kubelet[2204]: E0906 00:06:59.240114 2204 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ad49a872-1129-4ec2-a305-554b2a506fb9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:06:59.240207 kubelet[2204]: E0906 00:06:59.240154 2204 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ad49a872-1129-4ec2-a305-554b2a506fb9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-97dz2" podUID="ad49a872-1129-4ec2-a305-554b2a506fb9" Sep 6 00:06:59.248125 env[1811]: time="2025-09-06T00:06:59.248049596Z" level=error msg="StopPodSandbox for \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\" failed" error="failed to destroy network for sandbox \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:06:59.249219 kubelet[2204]: E0906 00:06:59.248988 2204 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Sep 6 00:06:59.249219 kubelet[2204]: E0906 00:06:59.249069 2204 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db"} Sep 6 00:06:59.249219 kubelet[2204]: E0906 00:06:59.249124 2204 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cdb34975-5312-4f42-97e3-78ac269aa123\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:06:59.249219 kubelet[2204]: E0906 00:06:59.249164 2204 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cdb34975-5312-4f42-97e3-78ac269aa123\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kswk5" podUID="cdb34975-5312-4f42-97e3-78ac269aa123" Sep 6 00:06:59.735359 kubelet[2204]: E0906 00:06:59.735300 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:00.291000 audit[2789]: NETFILTER_CFG table=filter:71 family=2 entries=12 op=nft_register_rule pid=2789 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:00.294682 kernel: kauditd_printk_skb: 46 callbacks suppressed Sep 6 00:07:00.294815 kernel: audit: type=1325 audit(1757117220.291:562): table=filter:71 family=2 entries=12 op=nft_register_rule pid=2789 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:00.291000 audit[2789]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffc0a2d9b0 a2=0 a3=1 items=0 ppid=2384 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:00.312341 kernel: audit: type=1300 audit(1757117220.291:562): arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffc0a2d9b0 a2=0 a3=1 items=0 ppid=2384 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:00.291000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:00.318157 kernel: audit: type=1327 audit(1757117220.291:562): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:00.320000 audit[2789]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=2789 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:00.320000 audit[2789]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc0a2d9b0 a2=0 a3=1 items=0 ppid=2384 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:00.339586 kernel: audit: type=1325 audit(1757117220.320:563): table=nat:72 family=2 entries=22 op=nft_register_rule pid=2789 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:00.339707 kernel: audit: type=1300 audit(1757117220.320:563): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc0a2d9b0 a2=0 a3=1 items=0 ppid=2384 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:00.320000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:00.345958 kernel: audit: type=1327 audit(1757117220.320:563): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:00.355000 audit[2791]: NETFILTER_CFG table=filter:73 family=2 entries=12 op=nft_register_rule pid=2791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:00.355000 audit[2791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffeaa06420 a2=0 a3=1 items=0 ppid=2384 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:00.363069 kernel: audit: type=1325 audit(1757117220.355:564): table=filter:73 family=2 entries=12 op=nft_register_rule pid=2791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:00.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:00.382388 kernel: audit: type=1300 audit(1757117220.355:564): arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffeaa06420 a2=0 a3=1 items=0 ppid=2384 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:00.382547 kernel: audit: type=1327 audit(1757117220.355:564): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:00.381000 audit[2791]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:00.381000 audit[2791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffeaa06420 a2=0 a3=1 items=0 ppid=2384 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:00.388952 kernel: audit: type=1325 audit(1757117220.381:565): table=nat:74 family=2 entries=22 op=nft_register_rule pid=2791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:00.381000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:00.638581 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Sep 6 00:07:00.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:07:00.664000 audit: BPF prog-id=60 op=UNLOAD Sep 6 00:07:00.664000 audit: BPF prog-id=59 op=UNLOAD Sep 6 00:07:00.664000 audit: BPF prog-id=58 op=UNLOAD Sep 6 00:07:00.736438 kubelet[2204]: E0906 00:07:00.736376 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:01.736561 kubelet[2204]: E0906 00:07:01.736499 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:02.736862 kubelet[2204]: E0906 00:07:02.736794 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:03.072000 audit[2795]: NETFILTER_CFG table=filter:75 family=2 entries=11 op=nft_register_rule pid=2795 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:03.072000 audit[2795]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=fffff7fe2ab0 a2=0 a3=1 items=0 ppid=2384 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:03.072000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:03.078000 audit[2795]: NETFILTER_CFG table=nat:76 family=2 entries=29 op=nft_register_chain pid=2795 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:03.078000 audit[2795]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10116 a0=3 a1=fffff7fe2ab0 a2=0 a3=1 items=0 ppid=2384 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:03.078000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:03.737293 kubelet[2204]: E0906 00:07:03.737228 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:04.029000 audit[2797]: NETFILTER_CFG table=filter:77 family=2 entries=10 op=nft_register_rule pid=2797 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:04.029000 audit[2797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffdcf6e150 a2=0 a3=1 items=0 ppid=2384 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:04.029000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:04.036000 audit[2797]: NETFILTER_CFG table=nat:78 family=2 entries=36 op=nft_register_chain pid=2797 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:04.036000 audit[2797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12004 a0=3 a1=ffffdcf6e150 a2=0 a3=1 items=0 ppid=2384 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:04.036000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:04.717520 kubelet[2204]: E0906 00:07:04.717446 2204 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:04.738251 kubelet[2204]: E0906 00:07:04.738188 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:05.741314 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3239589487.mount: Deactivated successfully. Sep 6 00:07:05.742828 kubelet[2204]: E0906 00:07:05.742672 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:05.793243 env[1811]: time="2025-09-06T00:07:05.793173641Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:05.796284 env[1811]: time="2025-09-06T00:07:05.796213731Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:05.799708 env[1811]: time="2025-09-06T00:07:05.799628820Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:05.802531 env[1811]: time="2025-09-06T00:07:05.802462078Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9\"" Sep 6 00:07:05.802755 env[1811]: time="2025-09-06T00:07:05.802715756Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:05.833368 env[1811]: time="2025-09-06T00:07:05.833313173Z" level=info msg="CreateContainer within sandbox \"ad397e2393aad6f4244549bd0050d32fca1305408a7ab25ce93fcd4eafecc9c1\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 6 00:07:05.864716 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2215368643.mount: Deactivated successfully. Sep 6 00:07:05.902374 env[1811]: time="2025-09-06T00:07:05.902250385Z" level=info msg="CreateContainer within sandbox \"ad397e2393aad6f4244549bd0050d32fca1305408a7ab25ce93fcd4eafecc9c1\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"6956121d4f8a99770960305b7c617e4f03807167558860fb5cf75d70f97c0634\"" Sep 6 00:07:05.903589 env[1811]: time="2025-09-06T00:07:05.903541879Z" level=info msg="StartContainer for \"6956121d4f8a99770960305b7c617e4f03807167558860fb5cf75d70f97c0634\"" Sep 6 00:07:05.943139 systemd[1]: Started cri-containerd-6956121d4f8a99770960305b7c617e4f03807167558860fb5cf75d70f97c0634.scope. Sep 6 00:07:06.003870 kernel: kauditd_printk_skb: 18 callbacks suppressed Sep 6 00:07:06.004046 kernel: audit: type=1400 audit(1757117225.993:574): avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:05.993000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.016464 kernel: audit: type=1300 audit(1757117225.993:574): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2293 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:05.993000 audit[2808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2293 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:05.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639353631323164346638613939373730393630333035623763363137 Sep 6 00:07:06.028008 kernel: audit: type=1327 audit(1757117225.993:574): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639353631323164346638613939373730393630333035623763363137 Sep 6 00:07:06.002000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.030034 kernel: audit: type=1400 audit(1757117226.002:575): avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.002000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.049720 kernel: audit: type=1400 audit(1757117226.002:575): avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.002000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.060315 kernel: audit: type=1400 audit(1757117226.002:575): avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.002000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.068316 kernel: audit: type=1400 audit(1757117226.002:575): avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.002000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.070684 env[1811]: time="2025-09-06T00:07:06.070626257Z" level=info msg="StartContainer for \"6956121d4f8a99770960305b7c617e4f03807167558860fb5cf75d70f97c0634\" returns successfully" Sep 6 00:07:06.076296 kernel: audit: type=1400 audit(1757117226.002:575): avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.002000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.084802 kernel: audit: type=1400 audit(1757117226.002:575): avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.002000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.093318 kernel: audit: type=1400 audit(1757117226.002:575): avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.002000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.002000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.002000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.002000 audit: BPF prog-id=81 op=LOAD Sep 6 00:07:06.002000 audit[2808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2293 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:06.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639353631323164346638613939373730393630333035623763363137 Sep 6 00:07:06.003000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.003000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.003000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.003000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.003000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.003000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.003000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.003000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.003000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.003000 audit: BPF prog-id=82 op=LOAD Sep 6 00:07:06.003000 audit[2808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2293 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:06.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639353631323164346638613939373730393630333035623763363137 Sep 6 00:07:06.003000 audit: BPF prog-id=82 op=UNLOAD Sep 6 00:07:06.003000 audit: BPF prog-id=81 op=UNLOAD Sep 6 00:07:06.003000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.003000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.003000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.003000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.003000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.003000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.003000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.003000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.003000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.003000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:06.003000 audit: BPF prog-id=83 op=LOAD Sep 6 00:07:06.003000 audit[2808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2293 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:06.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639353631323164346638613939373730393630333035623763363137 Sep 6 00:07:06.191667 kubelet[2204]: I0906 00:07:06.191572 2204 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-5b2h8" podStartSLOduration=3.353478875 podStartE2EDuration="21.191533787s" podCreationTimestamp="2025-09-06 00:06:45 +0000 UTC" firstStartedPulling="2025-09-06 00:06:47.9664125 +0000 UTC m=+4.637108045" lastFinishedPulling="2025-09-06 00:07:05.804467424 +0000 UTC m=+22.475162957" observedRunningTime="2025-09-06 00:07:06.182016475 +0000 UTC m=+22.852712044" watchObservedRunningTime="2025-09-06 00:07:06.191533787 +0000 UTC m=+22.862229332" Sep 6 00:07:06.414546 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 6 00:07:06.414817 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 6 00:07:06.743241 kubelet[2204]: E0906 00:07:06.743090 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:07.190057 systemd[1]: run-containerd-runc-k8s.io-6956121d4f8a99770960305b7c617e4f03807167558860fb5cf75d70f97c0634-runc.8pB9oa.mount: Deactivated successfully. Sep 6 00:07:07.743840 kubelet[2204]: E0906 00:07:07.743780 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:07.887000 audit[2951]: AVC avc: denied { write } for pid=2951 comm="tee" name="fd" dev="proc" ino=15254 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:07:07.887000 audit[2951]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff7d067dc a2=241 a3=1b6 items=1 ppid=2914 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:07.887000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 6 00:07:07.887000 audit: PATH item=0 name="/dev/fd/63" inode=15245 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:07:07.887000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:07:07.893000 audit[2949]: AVC avc: denied { write } for pid=2949 comm="tee" name="fd" dev="proc" ino=16023 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:07:07.893000 audit[2949]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff8ba87cd a2=241 a3=1b6 items=1 ppid=2917 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:07.893000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 6 00:07:07.893000 audit: PATH item=0 name="/dev/fd/63" inode=15244 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:07:07.893000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:07:07.911000 audit[2958]: AVC avc: denied { write } for pid=2958 comm="tee" name="fd" dev="proc" ino=15265 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:07:07.911000 audit[2958]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe31607dc a2=241 a3=1b6 items=1 ppid=2922 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:07.911000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 6 00:07:07.911000 audit: PATH item=0 name="/dev/fd/63" inode=16018 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:07:07.911000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:07:07.914000 audit[2956]: AVC avc: denied { write } for pid=2956 comm="tee" name="fd" dev="proc" ino=15267 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:07:07.914000 audit[2956]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe6e2d7dd a2=241 a3=1b6 items=1 ppid=2919 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:07.914000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 6 00:07:07.914000 audit: PATH item=0 name="/dev/fd/63" inode=16017 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:07:07.914000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:07:07.926000 audit[2986]: AVC avc: denied { write } for pid=2986 comm="tee" name="fd" dev="proc" ino=16037 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:07:07.926000 audit[2982]: AVC avc: denied { write } for pid=2982 comm="tee" name="fd" dev="proc" ino=15271 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:07:07.926000 audit[2982]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd2ef37dc a2=241 a3=1b6 items=1 ppid=2924 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:07.926000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 6 00:07:07.926000 audit: PATH item=0 name="/dev/fd/63" inode=15262 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:07:07.926000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:07:07.935000 audit[2984]: AVC avc: denied { write } for pid=2984 comm="tee" name="fd" dev="proc" ino=16040 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:07:07.926000 audit[2986]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff6cc97cc a2=241 a3=1b6 items=1 ppid=2925 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:07.926000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 6 00:07:07.926000 audit: PATH item=0 name="/dev/fd/63" inode=16034 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:07:07.926000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:07:07.935000 audit[2984]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffca7f77de a2=241 a3=1b6 items=1 ppid=2926 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:07.935000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 6 00:07:07.935000 audit: PATH item=0 name="/dev/fd/63" inode=16033 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:07:07.935000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit: BPF prog-id=84 op=LOAD Sep 6 00:07:08.347000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff3fc0d78 a2=98 a3=fffff3fc0d68 items=0 ppid=2933 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.347000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:07:08.347000 audit: BPF prog-id=84 op=UNLOAD Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit: BPF prog-id=85 op=LOAD Sep 6 00:07:08.347000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff3fc0c28 a2=74 a3=95 items=0 ppid=2933 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.347000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:07:08.347000 audit: BPF prog-id=85 op=UNLOAD Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit: BPF prog-id=86 op=LOAD Sep 6 00:07:08.347000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff3fc0c58 a2=40 a3=fffff3fc0c88 items=0 ppid=2933 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.347000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:07:08.347000 audit: BPF prog-id=86 op=UNLOAD Sep 6 00:07:08.347000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.347000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=fffff3fc0d70 a2=50 a3=0 items=0 ppid=2933 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.347000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:07:08.350000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.350000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.350000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.350000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.350000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.350000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.350000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.350000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.350000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.350000 audit: BPF prog-id=87 op=LOAD Sep 6 00:07:08.350000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc4fd1b48 a2=98 a3=ffffc4fd1b38 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.350000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.351000 audit: BPF prog-id=87 op=UNLOAD Sep 6 00:07:08.351000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.351000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.351000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.351000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.351000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.351000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.351000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.351000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.351000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.351000 audit: BPF prog-id=88 op=LOAD Sep 6 00:07:08.351000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc4fd17d8 a2=74 a3=95 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.351000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.351000 audit: BPF prog-id=88 op=UNLOAD Sep 6 00:07:08.351000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.351000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.351000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.351000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.351000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.351000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.351000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.351000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.351000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.351000 audit: BPF prog-id=89 op=LOAD Sep 6 00:07:08.351000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc4fd1838 a2=94 a3=2 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.351000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.351000 audit: BPF prog-id=89 op=UNLOAD Sep 6 00:07:08.521000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.521000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.521000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.521000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.521000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.521000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.521000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.521000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.521000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.521000 audit: BPF prog-id=90 op=LOAD Sep 6 00:07:08.521000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc4fd17f8 a2=40 a3=ffffc4fd1828 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.521000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.523000 audit: BPF prog-id=90 op=UNLOAD Sep 6 00:07:08.523000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.523000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc4fd1910 a2=50 a3=0 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.523000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.539000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.539000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc4fd1868 a2=28 a3=ffffc4fd1998 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.539000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.540000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.540000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc4fd1898 a2=28 a3=ffffc4fd19c8 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.540000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.540000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.540000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc4fd1748 a2=28 a3=ffffc4fd1878 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.540000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.541000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.541000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc4fd18b8 a2=28 a3=ffffc4fd19e8 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.541000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.541000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.541000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc4fd1898 a2=28 a3=ffffc4fd19c8 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.541000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.541000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.541000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc4fd1888 a2=28 a3=ffffc4fd19b8 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.541000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.542000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.542000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc4fd18b8 a2=28 a3=ffffc4fd19e8 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.542000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.542000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.542000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc4fd1898 a2=28 a3=ffffc4fd19c8 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.542000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.543000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.543000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc4fd18b8 a2=28 a3=ffffc4fd19e8 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.543000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.543000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.543000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc4fd1888 a2=28 a3=ffffc4fd19b8 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.543000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.543000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.543000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc4fd1908 a2=28 a3=ffffc4fd1a48 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.543000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.544000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.544000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc4fd1640 a2=50 a3=0 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.544000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.544000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.544000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.544000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.544000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.544000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.544000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.544000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.544000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.544000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.544000 audit: BPF prog-id=91 op=LOAD Sep 6 00:07:08.544000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc4fd1648 a2=94 a3=5 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.544000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.546000 audit: BPF prog-id=91 op=UNLOAD Sep 6 00:07:08.546000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.546000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc4fd1750 a2=50 a3=0 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.546000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.546000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.546000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc4fd1898 a2=4 a3=3 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.546000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.546000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.546000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.546000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.546000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.546000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.546000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.546000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.546000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.546000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.546000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.546000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:08.546000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc4fd1878 a2=94 a3=6 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.546000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.548000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.548000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.548000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.548000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.548000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.548000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.548000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.548000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.548000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.548000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.548000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:08.548000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc4fd1048 a2=94 a3=83 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.548000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.550000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.550000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.550000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.550000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.550000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.550000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.550000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.550000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.550000 audit[3020]: AVC avc: denied { perfmon } for pid=3020 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.550000 audit[3020]: AVC avc: denied { bpf } for pid=3020 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.550000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:08.550000 audit[3020]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc4fd1048 a2=94 a3=83 items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.550000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:07:08.572000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.572000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.572000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.572000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.572000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.572000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.572000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.572000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.572000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.572000 audit: BPF prog-id=92 op=LOAD Sep 6 00:07:08.572000 audit[3023]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc17ca918 a2=98 a3=ffffc17ca908 items=0 ppid=2933 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.572000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 00:07:08.573000 audit: BPF prog-id=92 op=UNLOAD Sep 6 00:07:08.573000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.573000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.573000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.573000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.573000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.573000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.573000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.573000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.573000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.573000 audit: BPF prog-id=93 op=LOAD Sep 6 00:07:08.573000 audit[3023]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc17ca7c8 a2=74 a3=95 items=0 ppid=2933 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.573000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 00:07:08.575000 audit: BPF prog-id=93 op=UNLOAD Sep 6 00:07:08.575000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.575000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.575000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.575000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.575000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.575000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.575000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.575000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.575000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.575000 audit: BPF prog-id=94 op=LOAD Sep 6 00:07:08.575000 audit[3023]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc17ca7f8 a2=40 a3=ffffc17ca828 items=0 ppid=2933 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.575000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 00:07:08.576000 audit: BPF prog-id=94 op=UNLOAD Sep 6 00:07:08.711671 systemd-networkd[1528]: vxlan.calico: Link UP Sep 6 00:07:08.711702 systemd-networkd[1528]: vxlan.calico: Gained carrier Sep 6 00:07:08.713785 (udev-worker)[2862]: Network interface NamePolicy= disabled on kernel command line. Sep 6 00:07:08.744650 kubelet[2204]: E0906 00:07:08.744580 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:08.770000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.770000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.770000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.770000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.770000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.770000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.770000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.770000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.770000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.770000 audit: BPF prog-id=95 op=LOAD Sep 6 00:07:08.770000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff9d123c8 a2=98 a3=fffff9d123b8 items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.770000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:07:08.770000 audit: BPF prog-id=95 op=UNLOAD Sep 6 00:07:08.770000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.770000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.770000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.770000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.770000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.770000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.770000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.770000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.770000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.770000 audit: BPF prog-id=96 op=LOAD Sep 6 00:07:08.770000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff9d120a8 a2=74 a3=95 items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.770000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:07:08.771000 audit: BPF prog-id=96 op=UNLOAD Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit: BPF prog-id=97 op=LOAD Sep 6 00:07:08.771000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff9d12108 a2=94 a3=2 items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.771000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:07:08.771000 audit: BPF prog-id=97 op=UNLOAD Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff9d12138 a2=28 a3=fffff9d12268 items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.771000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff9d12168 a2=28 a3=fffff9d12298 items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.771000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff9d12018 a2=28 a3=fffff9d12148 items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.771000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff9d12188 a2=28 a3=fffff9d122b8 items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.771000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff9d12168 a2=28 a3=fffff9d12298 items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.771000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff9d12158 a2=28 a3=fffff9d12288 items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.771000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff9d12188 a2=28 a3=fffff9d122b8 items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.771000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff9d12168 a2=28 a3=fffff9d12298 items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.771000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff9d12188 a2=28 a3=fffff9d122b8 items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.771000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff9d12158 a2=28 a3=fffff9d12288 items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.771000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff9d121d8 a2=28 a3=fffff9d12318 items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.771000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.771000 audit: BPF prog-id=98 op=LOAD Sep 6 00:07:08.771000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff9d11ff8 a2=40 a3=fffff9d12028 items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.771000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:07:08.772000 audit: BPF prog-id=98 op=UNLOAD Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=fffff9d12020 a2=50 a3=0 items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.773000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=fffff9d12020 a2=50 a3=0 items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.773000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit: BPF prog-id=99 op=LOAD Sep 6 00:07:08.773000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff9d11788 a2=94 a3=2 items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.773000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:07:08.773000 audit: BPF prog-id=99 op=UNLOAD Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.773000 audit: BPF prog-id=100 op=LOAD Sep 6 00:07:08.773000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff9d11918 a2=94 a3=30 items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.773000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:07:08.781000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.781000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.781000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.781000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.781000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.781000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.781000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.781000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.781000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.781000 audit: BPF prog-id=101 op=LOAD Sep 6 00:07:08.781000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcbe57688 a2=98 a3=ffffcbe57678 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.781000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:08.781000 audit: BPF prog-id=101 op=UNLOAD Sep 6 00:07:08.782000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.782000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.782000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.782000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.782000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.782000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.782000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.782000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.782000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.782000 audit: BPF prog-id=102 op=LOAD Sep 6 00:07:08.782000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcbe57318 a2=74 a3=95 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.782000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:08.782000 audit: BPF prog-id=102 op=UNLOAD Sep 6 00:07:08.782000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.782000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.782000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.782000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.782000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.782000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.782000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.782000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.782000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.782000 audit: BPF prog-id=103 op=LOAD Sep 6 00:07:08.782000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcbe57378 a2=94 a3=2 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.782000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:08.782000 audit: BPF prog-id=103 op=UNLOAD Sep 6 00:07:08.775786 (udev-worker)[3044]: Network interface NamePolicy= disabled on kernel command line. Sep 6 00:07:08.975000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.975000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.975000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.975000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.975000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.975000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.975000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.975000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.975000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.975000 audit: BPF prog-id=104 op=LOAD Sep 6 00:07:08.975000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcbe57338 a2=40 a3=ffffcbe57368 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.975000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:08.975000 audit: BPF prog-id=104 op=UNLOAD Sep 6 00:07:08.975000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.975000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffcbe57450 a2=50 a3=0 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.975000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:08.996000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.996000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcbe573a8 a2=28 a3=ffffcbe574d8 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.996000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:08.997000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.997000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbe573d8 a2=28 a3=ffffcbe57508 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.997000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:08.997000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.997000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbe57288 a2=28 a3=ffffcbe573b8 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.997000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:08.997000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.997000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcbe573f8 a2=28 a3=ffffcbe57528 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.997000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:08.998000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.998000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcbe573d8 a2=28 a3=ffffcbe57508 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.998000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:08.999000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.999000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcbe573c8 a2=28 a3=ffffcbe574f8 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.999000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:08.999000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:08.999000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcbe573f8 a2=28 a3=ffffcbe57528 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:08.999000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbe573d8 a2=28 a3=ffffcbe57508 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:09.000000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbe573f8 a2=28 a3=ffffcbe57528 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:09.000000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbe573c8 a2=28 a3=ffffcbe574f8 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:09.000000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcbe57448 a2=28 a3=ffffcbe57588 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:09.000000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcbe57180 a2=50 a3=0 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:09.000000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit: BPF prog-id=105 op=LOAD Sep 6 00:07:09.000000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcbe57188 a2=94 a3=5 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:09.000000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:09.000000 audit: BPF prog-id=105 op=UNLOAD Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcbe57290 a2=50 a3=0 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:09.000000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffcbe573d8 a2=4 a3=3 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:09.000000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.000000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:09.000000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcbe573b8 a2=94 a3=6 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:09.000000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:09.001000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcbe56b88 a2=94 a3=83 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:09.001000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.001000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:09.001000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcbe56b88 a2=94 a3=83 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:09.001000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:09.002000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.002000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcbe585c8 a2=10 a3=ffffcbe586b8 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:09.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:09.002000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.002000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcbe58488 a2=10 a3=ffffcbe58578 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:09.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:09.002000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.002000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcbe583f8 a2=10 a3=ffffcbe58578 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:09.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:09.002000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:09.002000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcbe583f8 a2=10 a3=ffffcbe58578 items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:09.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:07:09.010000 audit: BPF prog-id=100 op=UNLOAD Sep 6 00:07:09.118000 audit[3081]: NETFILTER_CFG table=mangle:79 family=2 entries=16 op=nft_register_chain pid=3081 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:07:09.118000 audit[3081]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffffd36adb0 a2=0 a3=ffffaff7efa8 items=0 ppid=2933 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:09.118000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:07:09.134000 audit[3082]: NETFILTER_CFG table=nat:80 family=2 entries=15 op=nft_register_chain pid=3082 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:07:09.134000 audit[3082]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffcb1aec80 a2=0 a3=ffffa96d5fa8 items=0 ppid=2933 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:09.134000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:07:09.136000 audit[3080]: NETFILTER_CFG table=raw:81 family=2 entries=21 op=nft_register_chain pid=3080 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:07:09.136000 audit[3080]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=fffff6e2d0f0 a2=0 a3=ffff912f1fa8 items=0 ppid=2933 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:09.136000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:07:09.145000 audit[3083]: NETFILTER_CFG table=filter:82 family=2 entries=39 op=nft_register_chain pid=3083 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:07:09.145000 audit[3083]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffda9b15c0 a2=0 a3=ffff99ab2fa8 items=0 ppid=2933 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:09.145000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:07:09.745245 kubelet[2204]: E0906 00:07:09.745184 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:09.870451 systemd-networkd[1528]: vxlan.calico: Gained IPv6LL Sep 6 00:07:10.745778 kubelet[2204]: E0906 00:07:10.745715 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:11.065086 env[1811]: time="2025-09-06T00:07:11.064932645Z" level=info msg="StopPodSandbox for \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\"" Sep 6 00:07:11.257534 env[1811]: 2025-09-06 00:07:11.156 [INFO][3100] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Sep 6 00:07:11.257534 env[1811]: 2025-09-06 00:07:11.157 [INFO][3100] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" iface="eth0" netns="/var/run/netns/cni-35104c1b-5ae1-2b06-0b93-9532a4a179c3" Sep 6 00:07:11.257534 env[1811]: 2025-09-06 00:07:11.157 [INFO][3100] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" iface="eth0" netns="/var/run/netns/cni-35104c1b-5ae1-2b06-0b93-9532a4a179c3" Sep 6 00:07:11.257534 env[1811]: 2025-09-06 00:07:11.158 [INFO][3100] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" iface="eth0" netns="/var/run/netns/cni-35104c1b-5ae1-2b06-0b93-9532a4a179c3" Sep 6 00:07:11.257534 env[1811]: 2025-09-06 00:07:11.158 [INFO][3100] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Sep 6 00:07:11.257534 env[1811]: 2025-09-06 00:07:11.158 [INFO][3100] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Sep 6 00:07:11.257534 env[1811]: 2025-09-06 00:07:11.234 [INFO][3108] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" HandleID="k8s-pod-network.00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Workload="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0" Sep 6 00:07:11.257534 env[1811]: 2025-09-06 00:07:11.234 [INFO][3108] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:07:11.257534 env[1811]: 2025-09-06 00:07:11.234 [INFO][3108] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:07:11.257534 env[1811]: 2025-09-06 00:07:11.247 [WARNING][3108] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" HandleID="k8s-pod-network.00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Workload="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0" Sep 6 00:07:11.257534 env[1811]: 2025-09-06 00:07:11.247 [INFO][3108] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" HandleID="k8s-pod-network.00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Workload="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0" Sep 6 00:07:11.257534 env[1811]: 2025-09-06 00:07:11.249 [INFO][3108] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:07:11.257534 env[1811]: 2025-09-06 00:07:11.254 [INFO][3100] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Sep 6 00:07:11.260983 systemd[1]: run-netns-cni\x2d35104c1b\x2d5ae1\x2d2b06\x2d0b93\x2d9532a4a179c3.mount: Deactivated successfully. Sep 6 00:07:11.262341 env[1811]: time="2025-09-06T00:07:11.262240043Z" level=info msg="TearDown network for sandbox \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\" successfully" Sep 6 00:07:11.262799 env[1811]: time="2025-09-06T00:07:11.262577200Z" level=info msg="StopPodSandbox for \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\" returns successfully" Sep 6 00:07:11.264453 env[1811]: time="2025-09-06T00:07:11.264387316Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-97dz2,Uid:ad49a872-1129-4ec2-a305-554b2a506fb9,Namespace:default,Attempt:1,}" Sep 6 00:07:11.531267 systemd-networkd[1528]: calibe1bbb12e0f: Link UP Sep 6 00:07:11.536831 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:07:11.537047 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibe1bbb12e0f: link becomes ready Sep 6 00:07:11.537760 systemd-networkd[1528]: calibe1bbb12e0f: Gained carrier Sep 6 00:07:11.538407 (udev-worker)[3057]: Network interface NamePolicy= disabled on kernel command line. Sep 6 00:07:11.564651 env[1811]: 2025-09-06 00:07:11.377 [INFO][3114] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0 nginx-deployment-7fcdb87857- default ad49a872-1129-4ec2-a305-554b2a506fb9 1310 0 2025-09-06 00:06:58 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.26.60 nginx-deployment-7fcdb87857-97dz2 eth0 default [] [] [kns.default ksa.default.default] calibe1bbb12e0f [] [] }} ContainerID="c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8" Namespace="default" Pod="nginx-deployment-7fcdb87857-97dz2" WorkloadEndpoint="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-" Sep 6 00:07:11.564651 env[1811]: 2025-09-06 00:07:11.377 [INFO][3114] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8" Namespace="default" Pod="nginx-deployment-7fcdb87857-97dz2" WorkloadEndpoint="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0" Sep 6 00:07:11.564651 env[1811]: 2025-09-06 00:07:11.451 [INFO][3127] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8" HandleID="k8s-pod-network.c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8" Workload="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0" Sep 6 00:07:11.564651 env[1811]: 2025-09-06 00:07:11.452 [INFO][3127] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8" HandleID="k8s-pod-network.c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8" Workload="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d3aa0), Attrs:map[string]string{"namespace":"default", "node":"172.31.26.60", "pod":"nginx-deployment-7fcdb87857-97dz2", "timestamp":"2025-09-06 00:07:11.451893802 +0000 UTC"}, Hostname:"172.31.26.60", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:07:11.564651 env[1811]: 2025-09-06 00:07:11.452 [INFO][3127] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:07:11.564651 env[1811]: 2025-09-06 00:07:11.452 [INFO][3127] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:07:11.564651 env[1811]: 2025-09-06 00:07:11.452 [INFO][3127] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.26.60' Sep 6 00:07:11.564651 env[1811]: 2025-09-06 00:07:11.474 [INFO][3127] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8" host="172.31.26.60" Sep 6 00:07:11.564651 env[1811]: 2025-09-06 00:07:11.483 [INFO][3127] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.26.60" Sep 6 00:07:11.564651 env[1811]: 2025-09-06 00:07:11.490 [INFO][3127] ipam/ipam.go 511: Trying affinity for 192.168.35.64/26 host="172.31.26.60" Sep 6 00:07:11.564651 env[1811]: 2025-09-06 00:07:11.493 [INFO][3127] ipam/ipam.go 158: Attempting to load block cidr=192.168.35.64/26 host="172.31.26.60" Sep 6 00:07:11.564651 env[1811]: 2025-09-06 00:07:11.496 [INFO][3127] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.35.64/26 host="172.31.26.60" Sep 6 00:07:11.564651 env[1811]: 2025-09-06 00:07:11.496 [INFO][3127] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.35.64/26 handle="k8s-pod-network.c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8" host="172.31.26.60" Sep 6 00:07:11.564651 env[1811]: 2025-09-06 00:07:11.499 [INFO][3127] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8 Sep 6 00:07:11.564651 env[1811]: 2025-09-06 00:07:11.507 [INFO][3127] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.35.64/26 handle="k8s-pod-network.c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8" host="172.31.26.60" Sep 6 00:07:11.564651 env[1811]: 2025-09-06 00:07:11.519 [INFO][3127] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.35.65/26] block=192.168.35.64/26 handle="k8s-pod-network.c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8" host="172.31.26.60" Sep 6 00:07:11.564651 env[1811]: 2025-09-06 00:07:11.519 [INFO][3127] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.35.65/26] handle="k8s-pod-network.c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8" host="172.31.26.60" Sep 6 00:07:11.564651 env[1811]: 2025-09-06 00:07:11.519 [INFO][3127] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:07:11.564651 env[1811]: 2025-09-06 00:07:11.519 [INFO][3127] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.65/26] IPv6=[] ContainerID="c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8" HandleID="k8s-pod-network.c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8" Workload="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0" Sep 6 00:07:11.565879 env[1811]: 2025-09-06 00:07:11.523 [INFO][3114] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8" Namespace="default" Pod="nginx-deployment-7fcdb87857-97dz2" WorkloadEndpoint="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"ad49a872-1129-4ec2-a305-554b2a506fb9", ResourceVersion:"1310", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 6, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.60", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-97dz2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.35.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calibe1bbb12e0f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:07:11.565879 env[1811]: 2025-09-06 00:07:11.523 [INFO][3114] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.35.65/32] ContainerID="c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8" Namespace="default" Pod="nginx-deployment-7fcdb87857-97dz2" WorkloadEndpoint="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0" Sep 6 00:07:11.565879 env[1811]: 2025-09-06 00:07:11.523 [INFO][3114] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibe1bbb12e0f ContainerID="c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8" Namespace="default" Pod="nginx-deployment-7fcdb87857-97dz2" WorkloadEndpoint="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0" Sep 6 00:07:11.565879 env[1811]: 2025-09-06 00:07:11.538 [INFO][3114] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8" Namespace="default" Pod="nginx-deployment-7fcdb87857-97dz2" WorkloadEndpoint="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0" Sep 6 00:07:11.565879 env[1811]: 2025-09-06 00:07:11.539 [INFO][3114] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8" Namespace="default" Pod="nginx-deployment-7fcdb87857-97dz2" WorkloadEndpoint="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"ad49a872-1129-4ec2-a305-554b2a506fb9", ResourceVersion:"1310", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 6, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.60", ContainerID:"c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8", Pod:"nginx-deployment-7fcdb87857-97dz2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.35.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calibe1bbb12e0f", MAC:"d2:3c:d1:d5:db:ee", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:07:11.565879 env[1811]: 2025-09-06 00:07:11.558 [INFO][3114] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8" Namespace="default" Pod="nginx-deployment-7fcdb87857-97dz2" WorkloadEndpoint="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0" Sep 6 00:07:11.624505 env[1811]: time="2025-09-06T00:07:11.624373129Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:07:11.624505 env[1811]: time="2025-09-06T00:07:11.624452109Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:07:11.624835 env[1811]: time="2025-09-06T00:07:11.624479235Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:07:11.625282 env[1811]: time="2025-09-06T00:07:11.625198025Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8 pid=3156 runtime=io.containerd.runc.v2 Sep 6 00:07:11.601000 audit[3143]: NETFILTER_CFG table=filter:83 family=2 entries=38 op=nft_register_chain pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:07:11.646573 kernel: kauditd_printk_skb: 590 callbacks suppressed Sep 6 00:07:11.646699 kernel: audit: type=1325 audit(1757117231.601:689): table=filter:83 family=2 entries=38 op=nft_register_chain pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:07:11.601000 audit[3143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21324 a0=3 a1=fffff6644090 a2=0 a3=ffffaeb15fa8 items=0 ppid=2933 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:11.665560 kernel: audit: type=1300 audit(1757117231.601:689): arch=c00000b7 syscall=211 success=yes exit=21324 a0=3 a1=fffff6644090 a2=0 a3=ffffaeb15fa8 items=0 ppid=2933 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:11.601000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:07:11.678829 kernel: audit: type=1327 audit(1757117231.601:689): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:07:11.687652 systemd[1]: Started cri-containerd-c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8.scope. Sep 6 00:07:11.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.738679 kernel: audit: type=1400 audit(1757117231.722:690): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.738817 kernel: audit: type=1400 audit(1757117231.722:691): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.738869 kernel: audit: type=1400 audit(1757117231.722:692): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.746623 kubelet[2204]: E0906 00:07:11.746378 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:11.754132 kernel: audit: type=1400 audit(1757117231.722:693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.762424 kernel: audit: type=1400 audit(1757117231.722:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.771099 kernel: audit: type=1400 audit(1757117231.722:695): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.730000 audit: BPF prog-id=106 op=LOAD Sep 6 00:07:11.731000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.731000 audit[3166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=3156 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:11.780036 kernel: audit: type=1400 audit(1757117231.722:696): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331303264353533313132373436613730393331623430643434663962 Sep 6 00:07:11.731000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.731000 audit[3166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3156 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:11.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331303264353533313132373436613730393331623430643434663962 Sep 6 00:07:11.731000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.731000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.731000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.731000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.731000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.731000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.731000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.731000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.731000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.731000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.731000 audit: BPF prog-id=107 op=LOAD Sep 6 00:07:11.731000 audit[3166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3156 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:11.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331303264353533313132373436613730393331623430643434663962 Sep 6 00:07:11.738000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.738000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.738000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.738000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.738000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.738000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.738000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.738000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.738000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.738000 audit: BPF prog-id=108 op=LOAD Sep 6 00:07:11.738000 audit[3166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3156 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:11.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331303264353533313132373436613730393331623430643434663962 Sep 6 00:07:11.746000 audit: BPF prog-id=108 op=UNLOAD Sep 6 00:07:11.746000 audit: BPF prog-id=107 op=UNLOAD Sep 6 00:07:11.746000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.746000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.746000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.746000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.746000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.746000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.746000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.746000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.746000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.746000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:11.746000 audit: BPF prog-id=109 op=LOAD Sep 6 00:07:11.746000 audit[3166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3156 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:11.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331303264353533313132373436613730393331623430643434663962 Sep 6 00:07:11.808218 env[1811]: time="2025-09-06T00:07:11.808145332Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-97dz2,Uid:ad49a872-1129-4ec2-a305-554b2a506fb9,Namespace:default,Attempt:1,} returns sandbox id \"c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8\"" Sep 6 00:07:11.810276 env[1811]: time="2025-09-06T00:07:11.810212173Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 6 00:07:12.065045 env[1811]: time="2025-09-06T00:07:12.064816457Z" level=info msg="StopPodSandbox for \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\"" Sep 6 00:07:12.202899 env[1811]: 2025-09-06 00:07:12.138 [INFO][3198] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Sep 6 00:07:12.202899 env[1811]: 2025-09-06 00:07:12.139 [INFO][3198] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" iface="eth0" netns="/var/run/netns/cni-fa855957-d4bb-72a2-0f2c-8d81716109c7" Sep 6 00:07:12.202899 env[1811]: 2025-09-06 00:07:12.139 [INFO][3198] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" iface="eth0" netns="/var/run/netns/cni-fa855957-d4bb-72a2-0f2c-8d81716109c7" Sep 6 00:07:12.202899 env[1811]: 2025-09-06 00:07:12.139 [INFO][3198] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" iface="eth0" netns="/var/run/netns/cni-fa855957-d4bb-72a2-0f2c-8d81716109c7" Sep 6 00:07:12.202899 env[1811]: 2025-09-06 00:07:12.139 [INFO][3198] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Sep 6 00:07:12.202899 env[1811]: 2025-09-06 00:07:12.139 [INFO][3198] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Sep 6 00:07:12.202899 env[1811]: 2025-09-06 00:07:12.180 [INFO][3205] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" HandleID="k8s-pod-network.481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Workload="172.31.26.60-k8s-csi--node--driver--kswk5-eth0" Sep 6 00:07:12.202899 env[1811]: 2025-09-06 00:07:12.181 [INFO][3205] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:07:12.202899 env[1811]: 2025-09-06 00:07:12.181 [INFO][3205] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:07:12.202899 env[1811]: 2025-09-06 00:07:12.195 [WARNING][3205] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" HandleID="k8s-pod-network.481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Workload="172.31.26.60-k8s-csi--node--driver--kswk5-eth0" Sep 6 00:07:12.202899 env[1811]: 2025-09-06 00:07:12.195 [INFO][3205] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" HandleID="k8s-pod-network.481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Workload="172.31.26.60-k8s-csi--node--driver--kswk5-eth0" Sep 6 00:07:12.202899 env[1811]: 2025-09-06 00:07:12.197 [INFO][3205] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:07:12.202899 env[1811]: 2025-09-06 00:07:12.200 [INFO][3198] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Sep 6 00:07:12.204177 env[1811]: time="2025-09-06T00:07:12.203104595Z" level=info msg="TearDown network for sandbox \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\" successfully" Sep 6 00:07:12.204177 env[1811]: time="2025-09-06T00:07:12.203171410Z" level=info msg="StopPodSandbox for \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\" returns successfully" Sep 6 00:07:12.205535 env[1811]: time="2025-09-06T00:07:12.205465323Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kswk5,Uid:cdb34975-5312-4f42-97e3-78ac269aa123,Namespace:calico-system,Attempt:1,}" Sep 6 00:07:12.263310 systemd[1]: run-containerd-runc-k8s.io-c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8-runc.itohKs.mount: Deactivated successfully. Sep 6 00:07:12.263478 systemd[1]: run-netns-cni\x2dfa855957\x2dd4bb\x2d72a2\x2d0f2c\x2d8d81716109c7.mount: Deactivated successfully. Sep 6 00:07:12.435248 systemd-networkd[1528]: cali14cd5dfd57a: Link UP Sep 6 00:07:12.440179 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali14cd5dfd57a: link becomes ready Sep 6 00:07:12.440302 systemd-networkd[1528]: cali14cd5dfd57a: Gained carrier Sep 6 00:07:12.471105 env[1811]: 2025-09-06 00:07:12.293 [INFO][3213] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.26.60-k8s-csi--node--driver--kswk5-eth0 csi-node-driver- calico-system cdb34975-5312-4f42-97e3-78ac269aa123 1318 0 2025-09-06 00:06:45 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6c96d95cc7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.31.26.60 csi-node-driver-kswk5 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali14cd5dfd57a [] [] }} ContainerID="f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b" Namespace="calico-system" Pod="csi-node-driver-kswk5" WorkloadEndpoint="172.31.26.60-k8s-csi--node--driver--kswk5-" Sep 6 00:07:12.471105 env[1811]: 2025-09-06 00:07:12.293 [INFO][3213] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b" Namespace="calico-system" Pod="csi-node-driver-kswk5" WorkloadEndpoint="172.31.26.60-k8s-csi--node--driver--kswk5-eth0" Sep 6 00:07:12.471105 env[1811]: 2025-09-06 00:07:12.342 [INFO][3228] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b" HandleID="k8s-pod-network.f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b" Workload="172.31.26.60-k8s-csi--node--driver--kswk5-eth0" Sep 6 00:07:12.471105 env[1811]: 2025-09-06 00:07:12.343 [INFO][3228] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b" HandleID="k8s-pod-network.f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b" Workload="172.31.26.60-k8s-csi--node--driver--kswk5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d38d0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.26.60", "pod":"csi-node-driver-kswk5", "timestamp":"2025-09-06 00:07:12.339314923 +0000 UTC"}, Hostname:"172.31.26.60", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:07:12.471105 env[1811]: 2025-09-06 00:07:12.343 [INFO][3228] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:07:12.471105 env[1811]: 2025-09-06 00:07:12.343 [INFO][3228] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:07:12.471105 env[1811]: 2025-09-06 00:07:12.343 [INFO][3228] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.26.60' Sep 6 00:07:12.471105 env[1811]: 2025-09-06 00:07:12.360 [INFO][3228] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b" host="172.31.26.60" Sep 6 00:07:12.471105 env[1811]: 2025-09-06 00:07:12.366 [INFO][3228] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.26.60" Sep 6 00:07:12.471105 env[1811]: 2025-09-06 00:07:12.386 [INFO][3228] ipam/ipam.go 511: Trying affinity for 192.168.35.64/26 host="172.31.26.60" Sep 6 00:07:12.471105 env[1811]: 2025-09-06 00:07:12.390 [INFO][3228] ipam/ipam.go 158: Attempting to load block cidr=192.168.35.64/26 host="172.31.26.60" Sep 6 00:07:12.471105 env[1811]: 2025-09-06 00:07:12.397 [INFO][3228] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.35.64/26 host="172.31.26.60" Sep 6 00:07:12.471105 env[1811]: 2025-09-06 00:07:12.397 [INFO][3228] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.35.64/26 handle="k8s-pod-network.f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b" host="172.31.26.60" Sep 6 00:07:12.471105 env[1811]: 2025-09-06 00:07:12.400 [INFO][3228] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b Sep 6 00:07:12.471105 env[1811]: 2025-09-06 00:07:12.411 [INFO][3228] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.35.64/26 handle="k8s-pod-network.f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b" host="172.31.26.60" Sep 6 00:07:12.471105 env[1811]: 2025-09-06 00:07:12.422 [INFO][3228] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.35.66/26] block=192.168.35.64/26 handle="k8s-pod-network.f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b" host="172.31.26.60" Sep 6 00:07:12.471105 env[1811]: 2025-09-06 00:07:12.423 [INFO][3228] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.35.66/26] handle="k8s-pod-network.f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b" host="172.31.26.60" Sep 6 00:07:12.471105 env[1811]: 2025-09-06 00:07:12.423 [INFO][3228] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:07:12.471105 env[1811]: 2025-09-06 00:07:12.423 [INFO][3228] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.66/26] IPv6=[] ContainerID="f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b" HandleID="k8s-pod-network.f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b" Workload="172.31.26.60-k8s-csi--node--driver--kswk5-eth0" Sep 6 00:07:12.472337 env[1811]: 2025-09-06 00:07:12.426 [INFO][3213] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b" Namespace="calico-system" Pod="csi-node-driver-kswk5" WorkloadEndpoint="172.31.26.60-k8s-csi--node--driver--kswk5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.60-k8s-csi--node--driver--kswk5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cdb34975-5312-4f42-97e3-78ac269aa123", ResourceVersion:"1318", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 6, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.60", ContainerID:"", Pod:"csi-node-driver-kswk5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.35.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali14cd5dfd57a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:07:12.472337 env[1811]: 2025-09-06 00:07:12.426 [INFO][3213] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.35.66/32] ContainerID="f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b" Namespace="calico-system" Pod="csi-node-driver-kswk5" WorkloadEndpoint="172.31.26.60-k8s-csi--node--driver--kswk5-eth0" Sep 6 00:07:12.472337 env[1811]: 2025-09-06 00:07:12.426 [INFO][3213] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali14cd5dfd57a ContainerID="f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b" Namespace="calico-system" Pod="csi-node-driver-kswk5" WorkloadEndpoint="172.31.26.60-k8s-csi--node--driver--kswk5-eth0" Sep 6 00:07:12.472337 env[1811]: 2025-09-06 00:07:12.442 [INFO][3213] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b" Namespace="calico-system" Pod="csi-node-driver-kswk5" WorkloadEndpoint="172.31.26.60-k8s-csi--node--driver--kswk5-eth0" Sep 6 00:07:12.472337 env[1811]: 2025-09-06 00:07:12.443 [INFO][3213] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b" Namespace="calico-system" Pod="csi-node-driver-kswk5" WorkloadEndpoint="172.31.26.60-k8s-csi--node--driver--kswk5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.60-k8s-csi--node--driver--kswk5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cdb34975-5312-4f42-97e3-78ac269aa123", ResourceVersion:"1318", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 6, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.60", ContainerID:"f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b", Pod:"csi-node-driver-kswk5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.35.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali14cd5dfd57a", MAC:"12:90:a0:31:9f:36", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:07:12.472337 env[1811]: 2025-09-06 00:07:12.468 [INFO][3213] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b" Namespace="calico-system" Pod="csi-node-driver-kswk5" WorkloadEndpoint="172.31.26.60-k8s-csi--node--driver--kswk5-eth0" Sep 6 00:07:12.499996 env[1811]: time="2025-09-06T00:07:12.499703725Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:07:12.500305 env[1811]: time="2025-09-06T00:07:12.500215237Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:07:12.500516 env[1811]: time="2025-09-06T00:07:12.500454581Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:07:12.501046 env[1811]: time="2025-09-06T00:07:12.500979495Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b pid=3252 runtime=io.containerd.runc.v2 Sep 6 00:07:12.502000 audit[3254]: NETFILTER_CFG table=filter:84 family=2 entries=42 op=nft_register_chain pid=3254 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:07:12.502000 audit[3254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22552 a0=3 a1=ffffdec4d450 a2=0 a3=ffffbc086fa8 items=0 ppid=2933 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:12.502000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:07:12.553810 systemd[1]: run-containerd-runc-k8s.io-f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b-runc.5uy4N9.mount: Deactivated successfully. Sep 6 00:07:12.559591 systemd[1]: Started cri-containerd-f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b.scope. Sep 6 00:07:12.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.595000 audit: BPF prog-id=110 op=LOAD Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit[3263]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3252 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:12.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637663239303433376232383034336331363635636231326138306663 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit[3263]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3252 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:12.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637663239303433376232383034336331363635636231326138306663 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit: BPF prog-id=111 op=LOAD Sep 6 00:07:12.596000 audit[3263]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3252 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:12.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637663239303433376232383034336331363635636231326138306663 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.596000 audit: BPF prog-id=112 op=LOAD Sep 6 00:07:12.596000 audit[3263]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3252 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:12.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637663239303433376232383034336331363635636231326138306663 Sep 6 00:07:12.597000 audit: BPF prog-id=112 op=UNLOAD Sep 6 00:07:12.597000 audit: BPF prog-id=111 op=UNLOAD Sep 6 00:07:12.597000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.597000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.597000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.597000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.597000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.597000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.597000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.597000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.597000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.597000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:12.597000 audit: BPF prog-id=113 op=LOAD Sep 6 00:07:12.597000 audit[3263]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3252 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:12.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637663239303433376232383034336331363635636231326138306663 Sep 6 00:07:12.621143 env[1811]: time="2025-09-06T00:07:12.621073538Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kswk5,Uid:cdb34975-5312-4f42-97e3-78ac269aa123,Namespace:calico-system,Attempt:1,} returns sandbox id \"f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b\"" Sep 6 00:07:12.622679 systemd-networkd[1528]: calibe1bbb12e0f: Gained IPv6LL Sep 6 00:07:12.747698 kubelet[2204]: E0906 00:07:12.747520 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:13.645623 systemd-networkd[1528]: cali14cd5dfd57a: Gained IPv6LL Sep 6 00:07:13.748264 kubelet[2204]: E0906 00:07:13.748075 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:14.748527 kubelet[2204]: E0906 00:07:14.748454 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:15.314819 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3207134156.mount: Deactivated successfully. Sep 6 00:07:15.407727 update_engine[1803]: I0906 00:07:15.406939 1803 update_attempter.cc:509] Updating boot flags... Sep 6 00:07:15.754584 kubelet[2204]: E0906 00:07:15.752715 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:16.753048 kubelet[2204]: E0906 00:07:16.752989 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:17.753717 kubelet[2204]: E0906 00:07:17.753646 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:17.828654 env[1811]: time="2025-09-06T00:07:17.828595269Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:17.831050 env[1811]: time="2025-09-06T00:07:17.831004040Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:17.834410 env[1811]: time="2025-09-06T00:07:17.834336614Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:17.837742 env[1811]: time="2025-09-06T00:07:17.837680371Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:17.839531 env[1811]: time="2025-09-06T00:07:17.839467338Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e\"" Sep 6 00:07:17.843384 env[1811]: time="2025-09-06T00:07:17.843334644Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 6 00:07:17.847656 env[1811]: time="2025-09-06T00:07:17.847590086Z" level=info msg="CreateContainer within sandbox \"c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 6 00:07:17.867091 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2230732802.mount: Deactivated successfully. Sep 6 00:07:17.881766 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1237873874.mount: Deactivated successfully. Sep 6 00:07:17.883344 env[1811]: time="2025-09-06T00:07:17.883220013Z" level=info msg="CreateContainer within sandbox \"c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"4d5b4fa7a096ec2de93c23ab4db001b706485a785ab220da8caf0ebeac915b92\"" Sep 6 00:07:17.884513 env[1811]: time="2025-09-06T00:07:17.884444927Z" level=info msg="StartContainer for \"4d5b4fa7a096ec2de93c23ab4db001b706485a785ab220da8caf0ebeac915b92\"" Sep 6 00:07:17.924237 systemd[1]: Started cri-containerd-4d5b4fa7a096ec2de93c23ab4db001b706485a785ab220da8caf0ebeac915b92.scope. Sep 6 00:07:17.972862 kernel: kauditd_printk_skb: 110 callbacks suppressed Sep 6 00:07:17.973035 kernel: audit: type=1400 audit(1757117237.962:727): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.981295 kernel: audit: type=1400 audit(1757117237.964:728): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.981432 kernel: audit: type=1400 audit(1757117237.964:729): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.997015 kernel: audit: type=1400 audit(1757117237.964:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.997422 kernel: audit: type=1400 audit(1757117237.964:731): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:18.005400 kernel: audit: type=1400 audit(1757117237.964:732): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:18.021770 kernel: audit: type=1400 audit(1757117237.964:733): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:18.030067 kernel: audit: type=1400 audit(1757117237.964:734): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:18.038454 kernel: audit: type=1400 audit(1757117237.964:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:18.046503 kernel: audit: type=1400 audit(1757117237.971:736): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.971000 audit: BPF prog-id=114 op=LOAD Sep 6 00:07:17.973000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.973000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3156 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:17.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464356234666137613039366563326465393363323361623464623030 Sep 6 00:07:17.973000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.973000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3156 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:17.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464356234666137613039366563326465393363323361623464623030 Sep 6 00:07:17.973000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.973000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.973000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.973000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.973000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.973000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.973000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.973000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.973000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.973000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.973000 audit: BPF prog-id=115 op=LOAD Sep 6 00:07:17.973000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3156 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:17.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464356234666137613039366563326465393363323361623464623030 Sep 6 00:07:17.981000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.981000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.981000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.981000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.981000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.981000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.981000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.981000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.981000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.981000 audit: BPF prog-id=116 op=LOAD Sep 6 00:07:17.981000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3156 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:17.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464356234666137613039366563326465393363323361623464623030 Sep 6 00:07:17.988000 audit: BPF prog-id=116 op=UNLOAD Sep 6 00:07:17.988000 audit: BPF prog-id=115 op=UNLOAD Sep 6 00:07:17.988000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.988000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.988000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.988000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.988000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.988000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.988000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.988000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.988000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.988000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:17.988000 audit: BPF prog-id=117 op=LOAD Sep 6 00:07:17.988000 audit[3482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3156 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:17.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464356234666137613039366563326465393363323361623464623030 Sep 6 00:07:18.055156 env[1811]: time="2025-09-06T00:07:18.055093338Z" level=info msg="StartContainer for \"4d5b4fa7a096ec2de93c23ab4db001b706485a785ab220da8caf0ebeac915b92\" returns successfully" Sep 6 00:07:18.211984 kubelet[2204]: I0906 00:07:18.211875 2204 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-97dz2" podStartSLOduration=14.179780641 podStartE2EDuration="20.21185528s" podCreationTimestamp="2025-09-06 00:06:58 +0000 UTC" firstStartedPulling="2025-09-06 00:07:11.809629941 +0000 UTC m=+28.480325486" lastFinishedPulling="2025-09-06 00:07:17.841704592 +0000 UTC m=+34.512400125" observedRunningTime="2025-09-06 00:07:18.21169756 +0000 UTC m=+34.882393153" watchObservedRunningTime="2025-09-06 00:07:18.21185528 +0000 UTC m=+34.882550825" Sep 6 00:07:18.754052 kubelet[2204]: E0906 00:07:18.753978 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:19.191152 env[1811]: time="2025-09-06T00:07:19.191071283Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:19.193680 env[1811]: time="2025-09-06T00:07:19.193616769Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:19.195962 env[1811]: time="2025-09-06T00:07:19.195876053Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:19.200164 env[1811]: time="2025-09-06T00:07:19.200100825Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:19.202001 env[1811]: time="2025-09-06T00:07:19.201887713Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b\"" Sep 6 00:07:19.208216 env[1811]: time="2025-09-06T00:07:19.208162717Z" level=info msg="CreateContainer within sandbox \"f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 6 00:07:19.230288 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2328825886.mount: Deactivated successfully. Sep 6 00:07:19.238859 env[1811]: time="2025-09-06T00:07:19.238769096Z" level=info msg="CreateContainer within sandbox \"f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"3fbfdb9891839f6e95720716221ed8343ac7cafb8e9f66447ffa5dc41892cc19\"" Sep 6 00:07:19.239685 env[1811]: time="2025-09-06T00:07:19.239610101Z" level=info msg="StartContainer for \"3fbfdb9891839f6e95720716221ed8343ac7cafb8e9f66447ffa5dc41892cc19\"" Sep 6 00:07:19.289777 systemd[1]: Started cri-containerd-3fbfdb9891839f6e95720716221ed8343ac7cafb8e9f66447ffa5dc41892cc19.scope. Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3252 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:19.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366626664623938393138333966366539353732303731363232316564 Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit: BPF prog-id=118 op=LOAD Sep 6 00:07:19.336000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3252 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:19.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366626664623938393138333966366539353732303731363232316564 Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.336000 audit: BPF prog-id=119 op=LOAD Sep 6 00:07:19.336000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3252 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:19.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366626664623938393138333966366539353732303731363232316564 Sep 6 00:07:19.337000 audit: BPF prog-id=119 op=UNLOAD Sep 6 00:07:19.337000 audit: BPF prog-id=118 op=UNLOAD Sep 6 00:07:19.337000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.337000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.337000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.337000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.337000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.337000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.337000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.337000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.337000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.337000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:19.337000 audit: BPF prog-id=120 op=LOAD Sep 6 00:07:19.337000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3252 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:19.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366626664623938393138333966366539353732303731363232316564 Sep 6 00:07:19.364663 env[1811]: time="2025-09-06T00:07:19.364503271Z" level=info msg="StartContainer for \"3fbfdb9891839f6e95720716221ed8343ac7cafb8e9f66447ffa5dc41892cc19\" returns successfully" Sep 6 00:07:19.368228 env[1811]: time="2025-09-06T00:07:19.368177295Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 6 00:07:19.755063 kubelet[2204]: E0906 00:07:19.754998 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:19.860179 systemd[1]: run-containerd-runc-k8s.io-3fbfdb9891839f6e95720716221ed8343ac7cafb8e9f66447ffa5dc41892cc19-runc.PU46T7.mount: Deactivated successfully. Sep 6 00:07:20.755184 kubelet[2204]: E0906 00:07:20.755104 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:20.917410 env[1811]: time="2025-09-06T00:07:20.917340897Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:20.919715 env[1811]: time="2025-09-06T00:07:20.919654240Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:20.922058 env[1811]: time="2025-09-06T00:07:20.921998107Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:20.924425 env[1811]: time="2025-09-06T00:07:20.924367028Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:20.925687 env[1811]: time="2025-09-06T00:07:20.925639523Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65\"" Sep 6 00:07:20.932533 env[1811]: time="2025-09-06T00:07:20.932468432Z" level=info msg="CreateContainer within sandbox \"f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 6 00:07:20.954196 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2439177040.mount: Deactivated successfully. Sep 6 00:07:20.958769 env[1811]: time="2025-09-06T00:07:20.958699221Z" level=info msg="CreateContainer within sandbox \"f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"60f39128b44ff13611542139786af83856375f3b4251b2a503f0eaf2b6e39c2e\"" Sep 6 00:07:20.959976 env[1811]: time="2025-09-06T00:07:20.959930092Z" level=info msg="StartContainer for \"60f39128b44ff13611542139786af83856375f3b4251b2a503f0eaf2b6e39c2e\"" Sep 6 00:07:21.013476 systemd[1]: run-containerd-runc-k8s.io-60f39128b44ff13611542139786af83856375f3b4251b2a503f0eaf2b6e39c2e-runc.bK1OBr.mount: Deactivated successfully. Sep 6 00:07:21.018543 systemd[1]: Started cri-containerd-60f39128b44ff13611542139786af83856375f3b4251b2a503f0eaf2b6e39c2e.scope. Sep 6 00:07:21.055000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.055000 audit[3579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3252 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:21.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630663339313238623434666631333631313534323133393738366166 Sep 6 00:07:21.056000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.056000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.056000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.056000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.056000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.056000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.056000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.056000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.056000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.056000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.056000 audit: BPF prog-id=121 op=LOAD Sep 6 00:07:21.056000 audit[3579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3252 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:21.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630663339313238623434666631333631313534323133393738366166 Sep 6 00:07:21.058000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.058000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.058000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.058000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.058000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.058000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.058000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.058000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.058000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.058000 audit: BPF prog-id=122 op=LOAD Sep 6 00:07:21.058000 audit[3579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3252 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:21.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630663339313238623434666631333631313534323133393738366166 Sep 6 00:07:21.059000 audit: BPF prog-id=122 op=UNLOAD Sep 6 00:07:21.059000 audit: BPF prog-id=121 op=UNLOAD Sep 6 00:07:21.059000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.059000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.059000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.059000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.059000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.059000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.059000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.059000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.059000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.059000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:21.059000 audit: BPF prog-id=123 op=LOAD Sep 6 00:07:21.059000 audit[3579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3252 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:21.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630663339313238623434666631333631313534323133393738366166 Sep 6 00:07:21.098925 env[1811]: time="2025-09-06T00:07:21.098711379Z" level=info msg="StartContainer for \"60f39128b44ff13611542139786af83856375f3b4251b2a503f0eaf2b6e39c2e\" returns successfully" Sep 6 00:07:21.237329 kubelet[2204]: I0906 00:07:21.237247 2204 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-kswk5" podStartSLOduration=27.934927745 podStartE2EDuration="36.237227108s" podCreationTimestamp="2025-09-06 00:06:45 +0000 UTC" firstStartedPulling="2025-09-06 00:07:12.62567702 +0000 UTC m=+29.296372577" lastFinishedPulling="2025-09-06 00:07:20.927976395 +0000 UTC m=+37.598671940" observedRunningTime="2025-09-06 00:07:21.237044691 +0000 UTC m=+37.907740260" watchObservedRunningTime="2025-09-06 00:07:21.237227108 +0000 UTC m=+37.907922665" Sep 6 00:07:21.755445 kubelet[2204]: E0906 00:07:21.755383 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:21.907311 kubelet[2204]: I0906 00:07:21.907261 2204 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 6 00:07:21.907311 kubelet[2204]: I0906 00:07:21.907311 2204 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 6 00:07:22.755975 kubelet[2204]: E0906 00:07:22.755887 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:23.756674 kubelet[2204]: E0906 00:07:23.756606 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:24.717074 kubelet[2204]: E0906 00:07:24.717031 2204 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:24.757006 kubelet[2204]: E0906 00:07:24.756976 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:25.376000 audit[3613]: NETFILTER_CFG table=filter:85 family=2 entries=22 op=nft_register_rule pid=3613 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:25.380586 kernel: kauditd_printk_skb: 133 callbacks suppressed Sep 6 00:07:25.380664 kernel: audit: type=1325 audit(1757117245.376:757): table=filter:85 family=2 entries=22 op=nft_register_rule pid=3613 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:25.376000 audit[3613]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12688 a0=3 a1=fffffd4c88c0 a2=0 a3=1 items=0 ppid=2384 pid=3613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:25.398372 kernel: audit: type=1300 audit(1757117245.376:757): arch=c00000b7 syscall=211 success=yes exit=12688 a0=3 a1=fffffd4c88c0 a2=0 a3=1 items=0 ppid=2384 pid=3613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:25.376000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:25.405096 kernel: audit: type=1327 audit(1757117245.376:757): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:25.399000 audit[3613]: NETFILTER_CFG table=nat:86 family=2 entries=24 op=nft_register_rule pid=3613 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:25.411363 kernel: audit: type=1325 audit(1757117245.399:758): table=nat:86 family=2 entries=24 op=nft_register_rule pid=3613 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:25.399000 audit[3613]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7308 a0=3 a1=fffffd4c88c0 a2=0 a3=1 items=0 ppid=2384 pid=3613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:25.423226 kernel: audit: type=1300 audit(1757117245.399:758): arch=c00000b7 syscall=211 success=yes exit=7308 a0=3 a1=fffffd4c88c0 a2=0 a3=1 items=0 ppid=2384 pid=3613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:25.399000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:25.428932 kernel: audit: type=1327 audit(1757117245.399:758): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:25.439000 audit[3615]: NETFILTER_CFG table=filter:87 family=2 entries=34 op=nft_register_rule pid=3615 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:25.439000 audit[3615]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12688 a0=3 a1=ffffd60d3fe0 a2=0 a3=1 items=0 ppid=2384 pid=3615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:25.458710 kernel: audit: type=1325 audit(1757117245.439:759): table=filter:87 family=2 entries=34 op=nft_register_rule pid=3615 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:25.458847 kernel: audit: type=1300 audit(1757117245.439:759): arch=c00000b7 syscall=211 success=yes exit=12688 a0=3 a1=ffffd60d3fe0 a2=0 a3=1 items=0 ppid=2384 pid=3615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:25.458893 kernel: audit: type=1327 audit(1757117245.439:759): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:25.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:25.467000 audit[3615]: NETFILTER_CFG table=nat:88 family=2 entries=24 op=nft_register_rule pid=3615 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:25.467000 audit[3615]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7308 a0=3 a1=ffffd60d3fe0 a2=0 a3=1 items=0 ppid=2384 pid=3615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:25.467000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:25.474944 kernel: audit: type=1325 audit(1757117245.467:760): table=nat:88 family=2 entries=24 op=nft_register_rule pid=3615 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:25.483967 kubelet[2204]: I0906 00:07:25.483396 2204 status_manager.go:895] "Failed to get status for pod" podUID="d39c39ad-5385-4b8f-88ef-2515b29abb03" pod="default/nfs-server-provisioner-0" err="pods \"nfs-server-provisioner-0\" is forbidden: User \"system:node:172.31.26.60\" cannot get resource \"pods\" in API group \"\" in the namespace \"default\": no relationship found between node '172.31.26.60' and this object" Sep 6 00:07:25.488873 systemd[1]: Created slice kubepods-besteffort-podd39c39ad_5385_4b8f_88ef_2515b29abb03.slice. Sep 6 00:07:25.531248 kubelet[2204]: I0906 00:07:25.531202 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/d39c39ad-5385-4b8f-88ef-2515b29abb03-data\") pod \"nfs-server-provisioner-0\" (UID: \"d39c39ad-5385-4b8f-88ef-2515b29abb03\") " pod="default/nfs-server-provisioner-0" Sep 6 00:07:25.531569 kubelet[2204]: I0906 00:07:25.531539 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tzf7j\" (UniqueName: \"kubernetes.io/projected/d39c39ad-5385-4b8f-88ef-2515b29abb03-kube-api-access-tzf7j\") pod \"nfs-server-provisioner-0\" (UID: \"d39c39ad-5385-4b8f-88ef-2515b29abb03\") " pod="default/nfs-server-provisioner-0" Sep 6 00:07:25.757850 kubelet[2204]: E0906 00:07:25.757801 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:25.795283 env[1811]: time="2025-09-06T00:07:25.794752324Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:d39c39ad-5385-4b8f-88ef-2515b29abb03,Namespace:default,Attempt:0,}" Sep 6 00:07:25.805039 amazon-ssm-agent[1789]: 2025-09-06 00:07:25 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Sep 6 00:07:26.094123 systemd-networkd[1528]: cali60e51b789ff: Link UP Sep 6 00:07:26.096930 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:07:26.097027 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 6 00:07:26.097730 systemd-networkd[1528]: cali60e51b789ff: Gained carrier Sep 6 00:07:26.100705 (udev-worker)[3637]: Network interface NamePolicy= disabled on kernel command line. Sep 6 00:07:26.132381 env[1811]: 2025-09-06 00:07:25.955 [INFO][3617] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.26.60-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default d39c39ad-5385-4b8f-88ef-2515b29abb03 1384 0 2025-09-06 00:07:25 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.26.60 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.26.60-k8s-nfs--server--provisioner--0-" Sep 6 00:07:26.132381 env[1811]: 2025-09-06 00:07:25.955 [INFO][3617] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.26.60-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:07:26.132381 env[1811]: 2025-09-06 00:07:26.009 [INFO][3630] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235" HandleID="k8s-pod-network.27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235" Workload="172.31.26.60-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:07:26.132381 env[1811]: 2025-09-06 00:07:26.009 [INFO][3630] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235" HandleID="k8s-pod-network.27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235" Workload="172.31.26.60-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d29d0), Attrs:map[string]string{"namespace":"default", "node":"172.31.26.60", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-06 00:07:26.009226417 +0000 UTC"}, Hostname:"172.31.26.60", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:07:26.132381 env[1811]: 2025-09-06 00:07:26.009 [INFO][3630] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:07:26.132381 env[1811]: 2025-09-06 00:07:26.009 [INFO][3630] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:07:26.132381 env[1811]: 2025-09-06 00:07:26.010 [INFO][3630] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.26.60' Sep 6 00:07:26.132381 env[1811]: 2025-09-06 00:07:26.031 [INFO][3630] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235" host="172.31.26.60" Sep 6 00:07:26.132381 env[1811]: 2025-09-06 00:07:26.039 [INFO][3630] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.26.60" Sep 6 00:07:26.132381 env[1811]: 2025-09-06 00:07:26.050 [INFO][3630] ipam/ipam.go 511: Trying affinity for 192.168.35.64/26 host="172.31.26.60" Sep 6 00:07:26.132381 env[1811]: 2025-09-06 00:07:26.053 [INFO][3630] ipam/ipam.go 158: Attempting to load block cidr=192.168.35.64/26 host="172.31.26.60" Sep 6 00:07:26.132381 env[1811]: 2025-09-06 00:07:26.057 [INFO][3630] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.35.64/26 host="172.31.26.60" Sep 6 00:07:26.132381 env[1811]: 2025-09-06 00:07:26.057 [INFO][3630] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.35.64/26 handle="k8s-pod-network.27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235" host="172.31.26.60" Sep 6 00:07:26.132381 env[1811]: 2025-09-06 00:07:26.061 [INFO][3630] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235 Sep 6 00:07:26.132381 env[1811]: 2025-09-06 00:07:26.068 [INFO][3630] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.35.64/26 handle="k8s-pod-network.27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235" host="172.31.26.60" Sep 6 00:07:26.132381 env[1811]: 2025-09-06 00:07:26.082 [INFO][3630] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.35.67/26] block=192.168.35.64/26 handle="k8s-pod-network.27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235" host="172.31.26.60" Sep 6 00:07:26.132381 env[1811]: 2025-09-06 00:07:26.082 [INFO][3630] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.35.67/26] handle="k8s-pod-network.27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235" host="172.31.26.60" Sep 6 00:07:26.132381 env[1811]: 2025-09-06 00:07:26.082 [INFO][3630] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:07:26.132381 env[1811]: 2025-09-06 00:07:26.083 [INFO][3630] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.67/26] IPv6=[] ContainerID="27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235" HandleID="k8s-pod-network.27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235" Workload="172.31.26.60-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:07:26.133613 env[1811]: 2025-09-06 00:07:26.086 [INFO][3617] cni-plugin/k8s.go 418: Populated endpoint ContainerID="27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.26.60-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.60-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"d39c39ad-5385-4b8f-88ef-2515b29abb03", ResourceVersion:"1384", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 7, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.60", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.35.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:07:26.133613 env[1811]: 2025-09-06 00:07:26.086 [INFO][3617] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.35.67/32] ContainerID="27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.26.60-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:07:26.133613 env[1811]: 2025-09-06 00:07:26.086 [INFO][3617] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.26.60-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:07:26.133613 env[1811]: 2025-09-06 00:07:26.099 [INFO][3617] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.26.60-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:07:26.134071 env[1811]: 2025-09-06 00:07:26.100 [INFO][3617] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.26.60-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.60-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"d39c39ad-5385-4b8f-88ef-2515b29abb03", ResourceVersion:"1384", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 7, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.60", ContainerID:"27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.35.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"3e:57:4c:59:ec:c6", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:07:26.134071 env[1811]: 2025-09-06 00:07:26.120 [INFO][3617] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.26.60-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:07:26.158762 env[1811]: time="2025-09-06T00:07:26.158549702Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:07:26.158940 env[1811]: time="2025-09-06T00:07:26.158782893Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:07:26.158940 env[1811]: time="2025-09-06T00:07:26.158870978Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:07:26.160948 env[1811]: time="2025-09-06T00:07:26.160496856Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235 pid=3655 runtime=io.containerd.runc.v2 Sep 6 00:07:26.185000 audit[3665]: NETFILTER_CFG table=filter:89 family=2 entries=40 op=nft_register_chain pid=3665 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:07:26.185000 audit[3665]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20756 a0=3 a1=ffffff726350 a2=0 a3=ffff95507fa8 items=0 ppid=2933 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:26.185000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:07:26.218938 systemd[1]: Started cri-containerd-27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235.scope. Sep 6 00:07:26.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.257000 audit: BPF prog-id=124 op=LOAD Sep 6 00:07:26.259000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.259000 audit[3667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3655 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:26.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237636636623538363533313461666361613438323834306263383631 Sep 6 00:07:26.259000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.259000 audit[3667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3655 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:26.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237636636623538363533313461666361613438323834306263383631 Sep 6 00:07:26.260000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.260000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.260000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.260000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.260000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.260000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.260000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.260000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.260000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.260000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.260000 audit: BPF prog-id=125 op=LOAD Sep 6 00:07:26.260000 audit[3667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3655 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:26.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237636636623538363533313461666361613438323834306263383631 Sep 6 00:07:26.261000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.261000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.261000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.261000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.261000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.261000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.261000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.261000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.261000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.261000 audit: BPF prog-id=126 op=LOAD Sep 6 00:07:26.261000 audit[3667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3655 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:26.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237636636623538363533313461666361613438323834306263383631 Sep 6 00:07:26.262000 audit: BPF prog-id=126 op=UNLOAD Sep 6 00:07:26.263000 audit: BPF prog-id=125 op=UNLOAD Sep 6 00:07:26.263000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.263000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.263000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.263000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.263000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.263000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.263000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.263000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.263000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.263000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:26.263000 audit: BPF prog-id=127 op=LOAD Sep 6 00:07:26.263000 audit[3667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3655 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:26.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237636636623538363533313461666361613438323834306263383631 Sep 6 00:07:26.308845 env[1811]: time="2025-09-06T00:07:26.308779928Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:d39c39ad-5385-4b8f-88ef-2515b29abb03,Namespace:default,Attempt:0,} returns sandbox id \"27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235\"" Sep 6 00:07:26.311532 env[1811]: time="2025-09-06T00:07:26.311436683Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 6 00:07:26.653357 systemd[1]: run-containerd-runc-k8s.io-27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235-runc.8MbfD0.mount: Deactivated successfully. Sep 6 00:07:26.759356 kubelet[2204]: E0906 00:07:26.759303 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:27.278311 systemd-networkd[1528]: cali60e51b789ff: Gained IPv6LL Sep 6 00:07:27.760260 kubelet[2204]: E0906 00:07:27.760175 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:28.434000 audit[3690]: NETFILTER_CFG table=filter:90 family=2 entries=33 op=nft_register_rule pid=3690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:28.434000 audit[3690]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffff51a2090 a2=0 a3=1 items=0 ppid=2384 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:28.434000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:28.440000 audit[3690]: NETFILTER_CFG table=nat:91 family=2 entries=31 op=nft_register_chain pid=3690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:28.440000 audit[3690]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10884 a0=3 a1=fffff51a2090 a2=0 a3=1 items=0 ppid=2384 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:28.440000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:28.761581 kubelet[2204]: E0906 00:07:28.761162 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:29.482020 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount509924286.mount: Deactivated successfully. Sep 6 00:07:29.762130 kubelet[2204]: E0906 00:07:29.761709 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:30.762696 kubelet[2204]: E0906 00:07:30.762626 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:31.763802 kubelet[2204]: E0906 00:07:31.763735 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:32.764334 kubelet[2204]: E0906 00:07:32.764278 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:32.994455 env[1811]: time="2025-09-06T00:07:32.994369699Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:33.005543 env[1811]: time="2025-09-06T00:07:33.005471341Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:33.013722 env[1811]: time="2025-09-06T00:07:33.013666335Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:33.022990 env[1811]: time="2025-09-06T00:07:33.022575643Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:33.024843 env[1811]: time="2025-09-06T00:07:33.024758710Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Sep 6 00:07:33.050021 env[1811]: time="2025-09-06T00:07:33.049938001Z" level=info msg="CreateContainer within sandbox \"27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 6 00:07:33.086282 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount734013587.mount: Deactivated successfully. Sep 6 00:07:33.099792 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount313596893.mount: Deactivated successfully. Sep 6 00:07:33.108896 env[1811]: time="2025-09-06T00:07:33.108835949Z" level=info msg="CreateContainer within sandbox \"27cf6b5865314afcaa482840bc8613a14642026fbda1027bdd6d8d01a4911235\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"07ea63b37bf87a0b968cbfbb5dc6184a4de89e0d46287850e73429c478e86731\"" Sep 6 00:07:33.110219 env[1811]: time="2025-09-06T00:07:33.110170705Z" level=info msg="StartContainer for \"07ea63b37bf87a0b968cbfbb5dc6184a4de89e0d46287850e73429c478e86731\"" Sep 6 00:07:33.146299 systemd[1]: Started cri-containerd-07ea63b37bf87a0b968cbfbb5dc6184a4de89e0d46287850e73429c478e86731.scope. Sep 6 00:07:33.200135 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 6 00:07:33.200297 kernel: audit: type=1400 audit(1757117253.189:782): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.208184 kernel: audit: type=1400 audit(1757117253.198:783): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.215931 kernel: audit: type=1400 audit(1757117253.198:784): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.223880 kernel: audit: type=1400 audit(1757117253.198:785): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.235120 kernel: audit: type=1400 audit(1757117253.198:786): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.243542 kernel: audit: type=1400 audit(1757117253.198:787): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.252163 kernel: audit: type=1400 audit(1757117253.198:788): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.252324 kernel: audit: type=1400 audit(1757117253.198:789): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.276176 kernel: audit: type=1400 audit(1757117253.198:790): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.276330 kernel: audit: type=1400 audit(1757117253.199:791): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.199000 audit: BPF prog-id=128 op=LOAD Sep 6 00:07:33.199000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.199000 audit[3707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3655 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:33.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037656136336233376266383761306239363863626662623564633631 Sep 6 00:07:33.199000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.199000 audit[3707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3655 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:33.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037656136336233376266383761306239363863626662623564633631 Sep 6 00:07:33.199000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.199000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.199000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.199000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.199000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.199000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.199000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.199000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.199000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.199000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.199000 audit: BPF prog-id=129 op=LOAD Sep 6 00:07:33.199000 audit[3707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3655 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:33.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037656136336233376266383761306239363863626662623564633631 Sep 6 00:07:33.279336 env[1811]: time="2025-09-06T00:07:33.278459083Z" level=info msg="StartContainer for \"07ea63b37bf87a0b968cbfbb5dc6184a4de89e0d46287850e73429c478e86731\" returns successfully" Sep 6 00:07:33.207000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.207000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.207000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.207000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.207000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.207000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.207000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.207000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.207000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.207000 audit: BPF prog-id=130 op=LOAD Sep 6 00:07:33.207000 audit[3707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3655 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:33.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037656136336233376266383761306239363863626662623564633631 Sep 6 00:07:33.215000 audit: BPF prog-id=130 op=UNLOAD Sep 6 00:07:33.215000 audit: BPF prog-id=129 op=UNLOAD Sep 6 00:07:33.215000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.215000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.215000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.215000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.215000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.215000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.215000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.215000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.215000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.215000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:33.215000 audit: BPF prog-id=131 op=LOAD Sep 6 00:07:33.215000 audit[3707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3655 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:33.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037656136336233376266383761306239363863626662623564633631 Sep 6 00:07:33.405000 audit[3736]: AVC avc: denied { search } for pid=3736 comm="rpcbind" name="crypto" dev="proc" ino=19596 scontext=system_u:system_r:svirt_lxc_net_t:s0:c73,c506 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 00:07:33.405000 audit[3736]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8f3cf000 a2=0 a3=0 items=0 ppid=3718 pid=3736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c73,c506 key=(null) Sep 6 00:07:33.405000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 6 00:07:33.484000 audit[3741]: AVC avc: denied { search } for pid=3741 comm="dbus-daemon" name="crypto" dev="proc" ino=19596 scontext=system_u:system_r:svirt_lxc_net_t:s0:c73,c506 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 00:07:33.484000 audit[3741]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8522f000 a2=0 a3=0 items=0 ppid=3718 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c73,c506 key=(null) Sep 6 00:07:33.484000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 6 00:07:33.492000 audit[3742]: AVC avc: denied { watch } for pid=3742 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c73,c506 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c73,c506 tclass=dir permissive=0 Sep 6 00:07:33.492000 audit[3742]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaaedb72cb0 a2=2c8 a3=aaaaedb6ea60 items=0 ppid=3718 pid=3742 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c73,c506 key=(null) Sep 6 00:07:33.492000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 6 00:07:33.501000 audit[3743]: AVC avc: denied { read } for pid=3743 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=19213 scontext=system_u:system_r:svirt_lxc_net_t:s0:c73,c506 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 6 00:07:33.501000 audit[3743]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffb51da570 a2=80000 a3=0 items=0 ppid=3718 pid=3743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c73,c506 key=(null) Sep 6 00:07:33.501000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 6 00:07:33.503000 audit[3743]: AVC avc: denied { search } for pid=3743 comm="ganesha.nfsd" name="crypto" dev="proc" ino=19596 scontext=system_u:system_r:svirt_lxc_net_t:s0:c73,c506 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 00:07:33.503000 audit[3743]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb456f000 a2=0 a3=0 items=0 ppid=3718 pid=3743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c73,c506 key=(null) Sep 6 00:07:33.503000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 6 00:07:33.764784 kubelet[2204]: E0906 00:07:33.764722 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:34.270887 kubelet[2204]: I0906 00:07:34.270807 2204 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.547605675 podStartE2EDuration="9.270789346s" podCreationTimestamp="2025-09-06 00:07:25 +0000 UTC" firstStartedPulling="2025-09-06 00:07:26.310620613 +0000 UTC m=+42.981316158" lastFinishedPulling="2025-09-06 00:07:33.033804296 +0000 UTC m=+49.704499829" observedRunningTime="2025-09-06 00:07:34.270346304 +0000 UTC m=+50.941041885" watchObservedRunningTime="2025-09-06 00:07:34.270789346 +0000 UTC m=+50.941484891" Sep 6 00:07:34.296000 audit[3748]: NETFILTER_CFG table=filter:92 family=2 entries=20 op=nft_register_rule pid=3748 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:34.296000 audit[3748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffdb8d5ad0 a2=0 a3=1 items=0 ppid=2384 pid=3748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:34.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:34.305000 audit[3748]: NETFILTER_CFG table=nat:93 family=2 entries=110 op=nft_register_chain pid=3748 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:07:34.305000 audit[3748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=50988 a0=3 a1=ffffdb8d5ad0 a2=0 a3=1 items=0 ppid=2384 pid=3748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:34.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:07:34.765516 kubelet[2204]: E0906 00:07:34.765431 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:35.766001 kubelet[2204]: E0906 00:07:35.765957 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:36.767833 kubelet[2204]: E0906 00:07:36.767764 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:37.192381 systemd[1]: run-containerd-runc-k8s.io-6956121d4f8a99770960305b7c617e4f03807167558860fb5cf75d70f97c0634-runc.kMYfBD.mount: Deactivated successfully. Sep 6 00:07:37.768722 kubelet[2204]: E0906 00:07:37.768686 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:38.769472 kubelet[2204]: E0906 00:07:38.769414 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:39.771066 kubelet[2204]: E0906 00:07:39.771021 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:40.772150 kubelet[2204]: E0906 00:07:40.772087 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:41.773035 kubelet[2204]: E0906 00:07:41.772992 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:42.773809 kubelet[2204]: E0906 00:07:42.773769 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:43.774719 kubelet[2204]: E0906 00:07:43.774651 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:44.716760 kubelet[2204]: E0906 00:07:44.716716 2204 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:44.765885 env[1811]: time="2025-09-06T00:07:44.765782983Z" level=info msg="StopPodSandbox for \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\"" Sep 6 00:07:44.775214 kubelet[2204]: E0906 00:07:44.775147 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:44.900179 env[1811]: 2025-09-06 00:07:44.832 [WARNING][3798] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.60-k8s-csi--node--driver--kswk5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cdb34975-5312-4f42-97e3-78ac269aa123", ResourceVersion:"1358", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 6, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.60", ContainerID:"f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b", Pod:"csi-node-driver-kswk5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.35.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali14cd5dfd57a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:07:44.900179 env[1811]: 2025-09-06 00:07:44.833 [INFO][3798] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Sep 6 00:07:44.900179 env[1811]: 2025-09-06 00:07:44.833 [INFO][3798] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" iface="eth0" netns="" Sep 6 00:07:44.900179 env[1811]: 2025-09-06 00:07:44.833 [INFO][3798] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Sep 6 00:07:44.900179 env[1811]: 2025-09-06 00:07:44.833 [INFO][3798] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Sep 6 00:07:44.900179 env[1811]: 2025-09-06 00:07:44.873 [INFO][3805] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" HandleID="k8s-pod-network.481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Workload="172.31.26.60-k8s-csi--node--driver--kswk5-eth0" Sep 6 00:07:44.900179 env[1811]: 2025-09-06 00:07:44.873 [INFO][3805] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:07:44.900179 env[1811]: 2025-09-06 00:07:44.873 [INFO][3805] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:07:44.900179 env[1811]: 2025-09-06 00:07:44.888 [WARNING][3805] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" HandleID="k8s-pod-network.481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Workload="172.31.26.60-k8s-csi--node--driver--kswk5-eth0" Sep 6 00:07:44.900179 env[1811]: 2025-09-06 00:07:44.888 [INFO][3805] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" HandleID="k8s-pod-network.481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Workload="172.31.26.60-k8s-csi--node--driver--kswk5-eth0" Sep 6 00:07:44.900179 env[1811]: 2025-09-06 00:07:44.895 [INFO][3805] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:07:44.900179 env[1811]: 2025-09-06 00:07:44.897 [INFO][3798] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Sep 6 00:07:44.901444 env[1811]: time="2025-09-06T00:07:44.901394815Z" level=info msg="TearDown network for sandbox \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\" successfully" Sep 6 00:07:44.901583 env[1811]: time="2025-09-06T00:07:44.901549615Z" level=info msg="StopPodSandbox for \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\" returns successfully" Sep 6 00:07:44.902682 env[1811]: time="2025-09-06T00:07:44.902614136Z" level=info msg="RemovePodSandbox for \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\"" Sep 6 00:07:44.902836 env[1811]: time="2025-09-06T00:07:44.902676807Z" level=info msg="Forcibly stopping sandbox \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\"" Sep 6 00:07:45.045349 env[1811]: 2025-09-06 00:07:44.961 [WARNING][3821] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.60-k8s-csi--node--driver--kswk5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cdb34975-5312-4f42-97e3-78ac269aa123", ResourceVersion:"1358", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 6, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.60", ContainerID:"f7f290437b28043c1665cb12a80fcce8156596e00fa475349d740dd6d127e04b", Pod:"csi-node-driver-kswk5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.35.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali14cd5dfd57a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:07:45.045349 env[1811]: 2025-09-06 00:07:44.962 [INFO][3821] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Sep 6 00:07:45.045349 env[1811]: 2025-09-06 00:07:44.962 [INFO][3821] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" iface="eth0" netns="" Sep 6 00:07:45.045349 env[1811]: 2025-09-06 00:07:44.962 [INFO][3821] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Sep 6 00:07:45.045349 env[1811]: 2025-09-06 00:07:44.962 [INFO][3821] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Sep 6 00:07:45.045349 env[1811]: 2025-09-06 00:07:44.999 [INFO][3828] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" HandleID="k8s-pod-network.481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Workload="172.31.26.60-k8s-csi--node--driver--kswk5-eth0" Sep 6 00:07:45.045349 env[1811]: 2025-09-06 00:07:44.999 [INFO][3828] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:07:45.045349 env[1811]: 2025-09-06 00:07:44.999 [INFO][3828] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:07:45.045349 env[1811]: 2025-09-06 00:07:45.030 [WARNING][3828] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" HandleID="k8s-pod-network.481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Workload="172.31.26.60-k8s-csi--node--driver--kswk5-eth0" Sep 6 00:07:45.045349 env[1811]: 2025-09-06 00:07:45.030 [INFO][3828] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" HandleID="k8s-pod-network.481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Workload="172.31.26.60-k8s-csi--node--driver--kswk5-eth0" Sep 6 00:07:45.045349 env[1811]: 2025-09-06 00:07:45.033 [INFO][3828] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:07:45.045349 env[1811]: 2025-09-06 00:07:45.042 [INFO][3821] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db" Sep 6 00:07:45.045349 env[1811]: time="2025-09-06T00:07:45.045214735Z" level=info msg="TearDown network for sandbox \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\" successfully" Sep 6 00:07:45.052985 env[1811]: time="2025-09-06T00:07:45.052889928Z" level=info msg="RemovePodSandbox \"481dc9df592470e9870d603bc135034e696a131932947f1e1756ea28b18162db\" returns successfully" Sep 6 00:07:45.053807 env[1811]: time="2025-09-06T00:07:45.053763558Z" level=info msg="StopPodSandbox for \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\"" Sep 6 00:07:45.180084 env[1811]: 2025-09-06 00:07:45.117 [WARNING][3844] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"ad49a872-1129-4ec2-a305-554b2a506fb9", ResourceVersion:"1342", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 6, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.60", ContainerID:"c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8", Pod:"nginx-deployment-7fcdb87857-97dz2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.35.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calibe1bbb12e0f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:07:45.180084 env[1811]: 2025-09-06 00:07:45.117 [INFO][3844] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Sep 6 00:07:45.180084 env[1811]: 2025-09-06 00:07:45.117 [INFO][3844] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" iface="eth0" netns="" Sep 6 00:07:45.180084 env[1811]: 2025-09-06 00:07:45.117 [INFO][3844] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Sep 6 00:07:45.180084 env[1811]: 2025-09-06 00:07:45.117 [INFO][3844] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Sep 6 00:07:45.180084 env[1811]: 2025-09-06 00:07:45.154 [INFO][3853] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" HandleID="k8s-pod-network.00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Workload="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0" Sep 6 00:07:45.180084 env[1811]: 2025-09-06 00:07:45.154 [INFO][3853] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:07:45.180084 env[1811]: 2025-09-06 00:07:45.154 [INFO][3853] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:07:45.180084 env[1811]: 2025-09-06 00:07:45.172 [WARNING][3853] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" HandleID="k8s-pod-network.00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Workload="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0" Sep 6 00:07:45.180084 env[1811]: 2025-09-06 00:07:45.173 [INFO][3853] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" HandleID="k8s-pod-network.00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Workload="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0" Sep 6 00:07:45.180084 env[1811]: 2025-09-06 00:07:45.175 [INFO][3853] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:07:45.180084 env[1811]: 2025-09-06 00:07:45.177 [INFO][3844] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Sep 6 00:07:45.180084 env[1811]: time="2025-09-06T00:07:45.180052897Z" level=info msg="TearDown network for sandbox \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\" successfully" Sep 6 00:07:45.181283 env[1811]: time="2025-09-06T00:07:45.180164368Z" level=info msg="StopPodSandbox for \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\" returns successfully" Sep 6 00:07:45.182280 env[1811]: time="2025-09-06T00:07:45.182234019Z" level=info msg="RemovePodSandbox for \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\"" Sep 6 00:07:45.182508 env[1811]: time="2025-09-06T00:07:45.182447195Z" level=info msg="Forcibly stopping sandbox \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\"" Sep 6 00:07:45.317859 env[1811]: 2025-09-06 00:07:45.243 [WARNING][3868] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"ad49a872-1129-4ec2-a305-554b2a506fb9", ResourceVersion:"1342", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 6, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.60", ContainerID:"c102d553112746a70931b40d44f9b47194613c7074e69f54063d9d832f59c6d8", Pod:"nginx-deployment-7fcdb87857-97dz2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.35.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calibe1bbb12e0f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:07:45.317859 env[1811]: 2025-09-06 00:07:45.243 [INFO][3868] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Sep 6 00:07:45.317859 env[1811]: 2025-09-06 00:07:45.243 [INFO][3868] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" iface="eth0" netns="" Sep 6 00:07:45.317859 env[1811]: 2025-09-06 00:07:45.244 [INFO][3868] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Sep 6 00:07:45.317859 env[1811]: 2025-09-06 00:07:45.244 [INFO][3868] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Sep 6 00:07:45.317859 env[1811]: 2025-09-06 00:07:45.286 [INFO][3875] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" HandleID="k8s-pod-network.00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Workload="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0" Sep 6 00:07:45.317859 env[1811]: 2025-09-06 00:07:45.286 [INFO][3875] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:07:45.317859 env[1811]: 2025-09-06 00:07:45.286 [INFO][3875] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:07:45.317859 env[1811]: 2025-09-06 00:07:45.309 [WARNING][3875] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" HandleID="k8s-pod-network.00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Workload="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0" Sep 6 00:07:45.317859 env[1811]: 2025-09-06 00:07:45.309 [INFO][3875] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" HandleID="k8s-pod-network.00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Workload="172.31.26.60-k8s-nginx--deployment--7fcdb87857--97dz2-eth0" Sep 6 00:07:45.317859 env[1811]: 2025-09-06 00:07:45.313 [INFO][3875] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:07:45.317859 env[1811]: 2025-09-06 00:07:45.315 [INFO][3868] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0" Sep 6 00:07:45.319076 env[1811]: time="2025-09-06T00:07:45.319021336Z" level=info msg="TearDown network for sandbox \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\" successfully" Sep 6 00:07:45.325607 env[1811]: time="2025-09-06T00:07:45.325552824Z" level=info msg="RemovePodSandbox \"00052576e07499cdbc0d9fcdf055c43691550331075e1a8606190458b0b06cd0\" returns successfully" Sep 6 00:07:45.775827 kubelet[2204]: E0906 00:07:45.775763 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:46.776410 kubelet[2204]: E0906 00:07:46.776368 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:47.777663 kubelet[2204]: E0906 00:07:47.777622 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:48.778876 kubelet[2204]: E0906 00:07:48.778833 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:49.780604 kubelet[2204]: E0906 00:07:49.780537 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:50.781359 kubelet[2204]: E0906 00:07:50.781289 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:51.781670 kubelet[2204]: E0906 00:07:51.781601 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:52.782246 kubelet[2204]: E0906 00:07:52.782204 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:53.716699 systemd[1]: Created slice kubepods-besteffort-pod72756167_3b33_4f86_8ba2_126bbb79276e.slice. Sep 6 00:07:53.783147 kubelet[2204]: E0906 00:07:53.783065 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:53.813129 kubelet[2204]: I0906 00:07:53.813090 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-50fc6c34-e040-45a9-94e5-54bd41577699\" (UniqueName: \"kubernetes.io/nfs/72756167-3b33-4f86-8ba2-126bbb79276e-pvc-50fc6c34-e040-45a9-94e5-54bd41577699\") pod \"test-pod-1\" (UID: \"72756167-3b33-4f86-8ba2-126bbb79276e\") " pod="default/test-pod-1" Sep 6 00:07:53.813585 kubelet[2204]: I0906 00:07:53.813555 2204 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z5c72\" (UniqueName: \"kubernetes.io/projected/72756167-3b33-4f86-8ba2-126bbb79276e-kube-api-access-z5c72\") pod \"test-pod-1\" (UID: \"72756167-3b33-4f86-8ba2-126bbb79276e\") " pod="default/test-pod-1" Sep 6 00:07:53.965000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:53.972939 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 6 00:07:53.973072 kernel: audit: type=1400 audit(1757117273.965:807): avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:53.973131 kernel: Failed to create system directory netfs Sep 6 00:07:53.991313 kernel: Failed to create system directory netfs Sep 6 00:07:53.991415 kernel: audit: type=1400 audit(1757117273.965:807): avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:53.991469 kernel: Failed to create system directory netfs Sep 6 00:07:53.965000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:53.965000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.001651 kernel: audit: type=1400 audit(1757117273.965:807): avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.001724 kernel: Failed to create system directory netfs Sep 6 00:07:53.965000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.004246 kernel: audit: type=1400 audit(1757117273.965:807): avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:53.965000 audit[3894]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab20b235e0 a1=12c14 a2=aaaae10ce028 a3=aaab20b14010 items=0 ppid=1651 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:54.029126 kernel: audit: type=1300 audit(1757117273.965:807): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab20b235e0 a1=12c14 a2=aaaae10ce028 a3=aaab20b14010 items=0 ppid=1651 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:53.965000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:07:54.033526 kernel: audit: type=1327 audit(1757117273.965:807): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:07:54.016000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.049063 kernel: Failed to create system directory fscache Sep 6 00:07:54.049140 kernel: audit: type=1400 audit(1757117274.016:808): avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.049209 kernel: Failed to create system directory fscache Sep 6 00:07:54.049255 kernel: audit: type=1400 audit(1757117274.016:808): avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.016000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.059449 kernel: Failed to create system directory fscache Sep 6 00:07:54.059505 kernel: audit: type=1400 audit(1757117274.016:808): avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.016000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.069809 kernel: Failed to create system directory fscache Sep 6 00:07:54.069879 kernel: audit: type=1400 audit(1757117274.016:808): avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.016000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.078410 kernel: Failed to create system directory fscache Sep 6 00:07:54.016000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.016000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.082172 kernel: Failed to create system directory fscache Sep 6 00:07:54.082250 kernel: Failed to create system directory fscache Sep 6 00:07:54.016000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.016000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.086210 kernel: Failed to create system directory fscache Sep 6 00:07:54.086258 kernel: Failed to create system directory fscache Sep 6 00:07:54.016000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.016000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.090101 kernel: Failed to create system directory fscache Sep 6 00:07:54.090167 kernel: Failed to create system directory fscache Sep 6 00:07:54.016000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.016000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.093950 kernel: Failed to create system directory fscache Sep 6 00:07:54.094011 kernel: Failed to create system directory fscache Sep 6 00:07:54.016000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.016000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.097843 kernel: Failed to create system directory fscache Sep 6 00:07:54.016000 audit[3894]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab20d36210 a1=4c344 a2=aaaae10ce028 a3=aaab20b14010 items=0 ppid=1651 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:54.016000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:07:54.100027 kernel: FS-Cache: Loaded Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.142811 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.142923 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.143022 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.146814 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.150699 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.150774 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.150830 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.154601 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.154661 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.158457 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.158541 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.162333 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.162407 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.166107 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.166167 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.169888 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.169963 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.173781 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.173842 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.177661 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.177736 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.179610 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.183554 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.183639 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.187368 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.187468 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.189319 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.193103 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.193175 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.196818 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.196941 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.200734 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.200807 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.202732 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.206522 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.206634 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.210335 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.210407 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.214199 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.214249 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.217984 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.218080 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.221764 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.221893 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.227954 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.228060 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.228109 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.231669 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.231794 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.235633 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.235705 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.239524 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.239585 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.243294 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.243416 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.247093 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.249173 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.251271 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.251476 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.255218 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.255299 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.258976 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.259066 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.262881 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.262956 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.264794 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.268770 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.268998 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.273238 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.273310 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.275079 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.276986 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.280846 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.281001 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.284783 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.284859 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.288746 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.288816 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.292628 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.292740 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.294647 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.296483 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.298417 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.300202 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.304142 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.304249 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.308618 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.311172 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.311250 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.314933 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.314985 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.316768 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.318745 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.320589 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.322540 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.326298 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.326387 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.328095 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.332011 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.332068 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.335870 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.335989 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.339681 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.339732 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.341518 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.343464 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.347204 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.347297 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.348999 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.350882 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.352739 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.354720 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.358541 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.358644 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.362352 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.362444 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.366134 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.366196 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.369891 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.369976 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.373715 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.373765 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.377529 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.377579 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.381392 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.381448 kernel: Failed to create system directory sunrpc Sep 6 00:07:54.127000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.395522 kernel: RPC: Registered named UNIX socket transport module. Sep 6 00:07:54.395658 kernel: RPC: Registered udp transport module. Sep 6 00:07:54.395736 kernel: RPC: Registered tcp transport module. Sep 6 00:07:54.400072 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 6 00:07:54.127000 audit[3894]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab20d82560 a1=14a74c a2=aaaae10ce028 a3=aaab20b14010 items=6 ppid=1651 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:54.127000 audit: CWD cwd="/" Sep 6 00:07:54.127000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:07:54.127000 audit: PATH item=1 name=(null) inode=20672 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:07:54.127000 audit: PATH item=2 name=(null) inode=20672 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:07:54.127000 audit: PATH item=3 name=(null) inode=20673 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:07:54.127000 audit: PATH item=4 name=(null) inode=20672 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:07:54.127000 audit: PATH item=5 name=(null) inode=20674 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:07:54.127000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.450115 kernel: Failed to create system directory nfs Sep 6 00:07:54.450221 kernel: Failed to create system directory nfs Sep 6 00:07:54.450266 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.453740 kernel: Failed to create system directory nfs Sep 6 00:07:54.453837 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.457384 kernel: Failed to create system directory nfs Sep 6 00:07:54.457438 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.461056 kernel: Failed to create system directory nfs Sep 6 00:07:54.461152 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.464646 kernel: Failed to create system directory nfs Sep 6 00:07:54.464698 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.468260 kernel: Failed to create system directory nfs Sep 6 00:07:54.468365 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.471828 kernel: Failed to create system directory nfs Sep 6 00:07:54.471880 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.475497 kernel: Failed to create system directory nfs Sep 6 00:07:54.475549 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.479088 kernel: Failed to create system directory nfs Sep 6 00:07:54.479145 kernel: Failed to create system directory nfs Sep 6 00:07:54.485803 kernel: Failed to create system directory nfs Sep 6 00:07:54.486608 kernel: Failed to create system directory nfs Sep 6 00:07:54.486677 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.487032 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.488781 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.492401 kernel: Failed to create system directory nfs Sep 6 00:07:54.492454 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.495929 kernel: Failed to create system directory nfs Sep 6 00:07:54.496023 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.499554 kernel: Failed to create system directory nfs Sep 6 00:07:54.499607 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.503327 kernel: Failed to create system directory nfs Sep 6 00:07:54.503450 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.507226 kernel: Failed to create system directory nfs Sep 6 00:07:54.507314 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.509006 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.512513 kernel: Failed to create system directory nfs Sep 6 00:07:54.512609 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.514446 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.518145 kernel: Failed to create system directory nfs Sep 6 00:07:54.518248 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.521732 kernel: Failed to create system directory nfs Sep 6 00:07:54.521784 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.525409 kernel: Failed to create system directory nfs Sep 6 00:07:54.525515 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.527265 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.530776 kernel: Failed to create system directory nfs Sep 6 00:07:54.530867 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.534400 kernel: Failed to create system directory nfs Sep 6 00:07:54.534495 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.537943 kernel: Failed to create system directory nfs Sep 6 00:07:54.537993 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.541639 kernel: Failed to create system directory nfs Sep 6 00:07:54.541703 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.545154 kernel: Failed to create system directory nfs Sep 6 00:07:54.545248 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.548717 kernel: Failed to create system directory nfs Sep 6 00:07:54.548823 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.550635 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.554220 kernel: Failed to create system directory nfs Sep 6 00:07:54.554312 kernel: Failed to create system directory nfs Sep 6 00:07:54.438000 audit[3894]: AVC avc: denied { confidentiality } for pid=3894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.587148 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 6 00:07:54.438000 audit[3894]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab20f2ba40 a1=11672c a2=aaaae10ce028 a3=aaab20b14010 items=0 ppid=1651 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:54.438000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.643338 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.643436 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.643481 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.645349 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.649164 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.649294 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.653010 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.653165 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.656848 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.657005 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.660596 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.660674 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.664461 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.664617 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.668240 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.668331 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.670229 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.673977 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.674055 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.677738 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.677927 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.681649 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.683697 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.683790 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.687570 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.687710 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.691594 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.691706 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.695422 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.695556 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.699348 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.699476 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.703269 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.703411 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.707168 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.707335 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.711085 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.711223 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.715024 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.715151 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.718934 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.719059 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.722878 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.722974 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.726785 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.726885 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.730678 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.730844 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.734584 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.734750 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.736689 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.743297 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.743380 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.743441 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.746506 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.746560 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.748405 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.750313 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.752242 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.756017 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.756068 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.759769 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.760137 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.762015 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.765882 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.765996 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.767724 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.769616 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.771498 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.775083 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.775132 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.776867 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.778764 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.780562 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.782472 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.783628 kubelet[2204]: E0906 00:07:54.783561 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:54.784336 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.786216 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.788026 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.791673 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.791724 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.795365 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.795417 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.799077 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.799174 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.800890 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.804587 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.804681 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.808268 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.808377 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.811855 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.811936 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.815602 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.815653 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.626000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:54.819257 kernel: Failed to create system directory nfs4 Sep 6 00:07:54.999234 kernel: NFS: Registering the id_resolver key type Sep 6 00:07:54.999417 kernel: Key type id_resolver registered Sep 6 00:07:54.999463 kernel: Key type id_legacy registered Sep 6 00:07:54.626000 audit[3899]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff8773a010 a1=19c6dc a2=aaaabcb3e028 a3=aaaaf1b68010 items=0 ppid=1651 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:54.626000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.024473 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.024550 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.024592 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.028533 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.030563 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.032565 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.034583 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.036574 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.038585 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.040639 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.042635 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.045253 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.047397 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.050117 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.053995 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.054134 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.057094 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.061973 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.062092 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.065016 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.065153 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.069070 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.073309 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.080200 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.080344 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.080399 kernel: Failed to create system directory rpcgss Sep 6 00:07:55.016000 audit[3900]: AVC avc: denied { confidentiality } for pid=3900 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:07:55.016000 audit[3900]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb0b42010 a1=5ee94 a2=aaaae78be028 a3=aaab04751010 items=0 ppid=1651 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:55.016000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 6 00:07:55.117850 nfsidmap[3906]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Sep 6 00:07:55.123427 nfsidmap[3907]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Sep 6 00:07:55.144000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2823 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:07:55.144000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2823 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:07:55.144000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2823 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:07:55.145000 audit[2008]: AVC avc: denied { watch_reads } for pid=2008 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2823 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:07:55.145000 audit[2008]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab08ff42f0 a2=10 a3=0 items=0 ppid=1 pid=2008 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:55.145000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 00:07:55.145000 audit[2008]: AVC avc: denied { watch_reads } for pid=2008 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2823 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:07:55.145000 audit[2008]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab08ff42f0 a2=10 a3=0 items=0 ppid=1 pid=2008 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:55.145000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 00:07:55.145000 audit[2008]: AVC avc: denied { watch_reads } for pid=2008 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2823 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:07:55.145000 audit[2008]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab08ff42f0 a2=10 a3=0 items=0 ppid=1 pid=2008 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:55.145000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 00:07:55.223724 env[1811]: time="2025-09-06T00:07:55.223662273Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:72756167-3b33-4f86-8ba2-126bbb79276e,Namespace:default,Attempt:0,}" Sep 6 00:07:55.434412 (udev-worker)[3895]: Network interface NamePolicy= disabled on kernel command line. Sep 6 00:07:55.435569 systemd-networkd[1528]: cali5ec59c6bf6e: Link UP Sep 6 00:07:55.442148 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:07:55.442534 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 6 00:07:55.442834 systemd-networkd[1528]: cali5ec59c6bf6e: Gained carrier Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.311 [INFO][3908] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.26.60-k8s-test--pod--1-eth0 default 72756167-3b33-4f86-8ba2-126bbb79276e 1497 0 2025-09-06 00:07:26 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.26.60 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.26.60-k8s-test--pod--1-" Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.311 [INFO][3908] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.26.60-k8s-test--pod--1-eth0" Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.359 [INFO][3922] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641" HandleID="k8s-pod-network.31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641" Workload="172.31.26.60-k8s-test--pod--1-eth0" Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.360 [INFO][3922] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641" HandleID="k8s-pod-network.31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641" Workload="172.31.26.60-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d2ff0), Attrs:map[string]string{"namespace":"default", "node":"172.31.26.60", "pod":"test-pod-1", "timestamp":"2025-09-06 00:07:55.359792582 +0000 UTC"}, Hostname:"172.31.26.60", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.360 [INFO][3922] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.360 [INFO][3922] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.360 [INFO][3922] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.26.60' Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.382 [INFO][3922] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641" host="172.31.26.60" Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.391 [INFO][3922] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.26.60" Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.399 [INFO][3922] ipam/ipam.go 511: Trying affinity for 192.168.35.64/26 host="172.31.26.60" Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.402 [INFO][3922] ipam/ipam.go 158: Attempting to load block cidr=192.168.35.64/26 host="172.31.26.60" Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.405 [INFO][3922] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.35.64/26 host="172.31.26.60" Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.406 [INFO][3922] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.35.64/26 handle="k8s-pod-network.31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641" host="172.31.26.60" Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.408 [INFO][3922] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641 Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.414 [INFO][3922] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.35.64/26 handle="k8s-pod-network.31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641" host="172.31.26.60" Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.427 [INFO][3922] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.35.68/26] block=192.168.35.64/26 handle="k8s-pod-network.31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641" host="172.31.26.60" Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.427 [INFO][3922] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.35.68/26] handle="k8s-pod-network.31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641" host="172.31.26.60" Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.427 [INFO][3922] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.427 [INFO][3922] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.68/26] IPv6=[] ContainerID="31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641" HandleID="k8s-pod-network.31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641" Workload="172.31.26.60-k8s-test--pod--1-eth0" Sep 6 00:07:55.461965 env[1811]: 2025-09-06 00:07:55.430 [INFO][3908] cni-plugin/k8s.go 418: Populated endpoint ContainerID="31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.26.60-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.60-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"72756167-3b33-4f86-8ba2-126bbb79276e", ResourceVersion:"1497", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 7, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.60", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.35.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:07:55.469358 env[1811]: 2025-09-06 00:07:55.430 [INFO][3908] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.35.68/32] ContainerID="31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.26.60-k8s-test--pod--1-eth0" Sep 6 00:07:55.469358 env[1811]: 2025-09-06 00:07:55.430 [INFO][3908] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.26.60-k8s-test--pod--1-eth0" Sep 6 00:07:55.469358 env[1811]: 2025-09-06 00:07:55.445 [INFO][3908] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.26.60-k8s-test--pod--1-eth0" Sep 6 00:07:55.469358 env[1811]: 2025-09-06 00:07:55.447 [INFO][3908] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.26.60-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.60-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"72756167-3b33-4f86-8ba2-126bbb79276e", ResourceVersion:"1497", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 7, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.60", ContainerID:"31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.35.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"42:33:e4:08:b9:4a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:07:55.469358 env[1811]: 2025-09-06 00:07:55.459 [INFO][3908] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.26.60-k8s-test--pod--1-eth0" Sep 6 00:07:55.487313 env[1811]: time="2025-09-06T00:07:55.487178798Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:07:55.487313 env[1811]: time="2025-09-06T00:07:55.487261233Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:07:55.487588 env[1811]: time="2025-09-06T00:07:55.487288352Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:07:55.487588 env[1811]: time="2025-09-06T00:07:55.487508275Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641 pid=3945 runtime=io.containerd.runc.v2 Sep 6 00:07:55.490000 audit[3949]: NETFILTER_CFG table=filter:94 family=2 entries=40 op=nft_register_chain pid=3949 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:07:55.490000 audit[3949]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=ffffc4153c80 a2=0 a3=ffffae3f2fa8 items=0 ppid=2933 pid=3949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:55.490000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:07:55.520623 systemd[1]: Started cri-containerd-31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641.scope. Sep 6 00:07:55.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.575000 audit: BPF prog-id=132 op=LOAD Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit[3955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3945 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:55.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331613033313735353133303637313863643734343235636566626137 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit[3955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3945 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:55.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331613033313735353133303637313863643734343235636566626137 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit: BPF prog-id=133 op=LOAD Sep 6 00:07:55.576000 audit[3955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3945 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:55.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331613033313735353133303637313863643734343235636566626137 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.576000 audit: BPF prog-id=134 op=LOAD Sep 6 00:07:55.576000 audit[3955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3945 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:55.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331613033313735353133303637313863643734343235636566626137 Sep 6 00:07:55.577000 audit: BPF prog-id=134 op=UNLOAD Sep 6 00:07:55.577000 audit: BPF prog-id=133 op=UNLOAD Sep 6 00:07:55.577000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.577000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.577000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.577000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.577000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.577000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.577000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.577000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.577000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.577000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:55.577000 audit: BPF prog-id=135 op=LOAD Sep 6 00:07:55.577000 audit[3955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3945 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:55.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331613033313735353133303637313863643734343235636566626137 Sep 6 00:07:55.619887 env[1811]: time="2025-09-06T00:07:55.619820239Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:72756167-3b33-4f86-8ba2-126bbb79276e,Namespace:default,Attempt:0,} returns sandbox id \"31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641\"" Sep 6 00:07:55.622248 env[1811]: time="2025-09-06T00:07:55.621863851Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 6 00:07:55.785001 kubelet[2204]: E0906 00:07:55.783979 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:55.961752 env[1811]: time="2025-09-06T00:07:55.961675208Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:55.967374 env[1811]: time="2025-09-06T00:07:55.967309971Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:55.971322 env[1811]: time="2025-09-06T00:07:55.971260308Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:55.975224 env[1811]: time="2025-09-06T00:07:55.975160813Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:07:55.976879 env[1811]: time="2025-09-06T00:07:55.976802557Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e\"" Sep 6 00:07:55.987186 env[1811]: time="2025-09-06T00:07:55.987120082Z" level=info msg="CreateContainer within sandbox \"31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 6 00:07:56.016624 env[1811]: time="2025-09-06T00:07:56.016516216Z" level=info msg="CreateContainer within sandbox \"31a0317551306718cd74425cefba7e484885b2216714dd2b9a3b3dcbd7f4c641\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"aa98d5762bd7dca62da3b0e9e061186e75407ac47ec02c4955223159aa7247f2\"" Sep 6 00:07:56.017858 env[1811]: time="2025-09-06T00:07:56.017762669Z" level=info msg="StartContainer for \"aa98d5762bd7dca62da3b0e9e061186e75407ac47ec02c4955223159aa7247f2\"" Sep 6 00:07:56.048293 systemd[1]: Started cri-containerd-aa98d5762bd7dca62da3b0e9e061186e75407ac47ec02c4955223159aa7247f2.scope. Sep 6 00:07:56.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.089000 audit: BPF prog-id=136 op=LOAD Sep 6 00:07:56.090000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.090000 audit[3987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400019db38 a2=10 a3=0 items=0 ppid=3945 pid=3987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:56.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161393864353736326264376463613632646133623065396530363131 Sep 6 00:07:56.091000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.091000 audit[3987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=3945 pid=3987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:56.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161393864353736326264376463613632646133623065396530363131 Sep 6 00:07:56.091000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.091000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.091000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.091000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.091000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.091000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.091000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.091000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.091000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.091000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.091000 audit: BPF prog-id=137 op=LOAD Sep 6 00:07:56.091000 audit[3987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=3945 pid=3987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:56.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161393864353736326264376463613632646133623065396530363131 Sep 6 00:07:56.093000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.093000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.093000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.093000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.093000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.093000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.093000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.093000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.093000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.093000 audit: BPF prog-id=138 op=LOAD Sep 6 00:07:56.093000 audit[3987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=3945 pid=3987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:56.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161393864353736326264376463613632646133623065396530363131 Sep 6 00:07:56.094000 audit: BPF prog-id=138 op=UNLOAD Sep 6 00:07:56.094000 audit: BPF prog-id=137 op=UNLOAD Sep 6 00:07:56.094000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.094000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.094000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.094000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.094000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.094000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.094000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.094000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.094000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.094000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:07:56.094000 audit: BPF prog-id=139 op=LOAD Sep 6 00:07:56.094000 audit[3987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=3945 pid=3987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:07:56.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161393864353736326264376463613632646133623065396530363131 Sep 6 00:07:56.124919 env[1811]: time="2025-09-06T00:07:56.124839988Z" level=info msg="StartContainer for \"aa98d5762bd7dca62da3b0e9e061186e75407ac47ec02c4955223159aa7247f2\" returns successfully" Sep 6 00:07:56.717192 systemd-networkd[1528]: cali5ec59c6bf6e: Gained IPv6LL Sep 6 00:07:56.785111 kubelet[2204]: E0906 00:07:56.785037 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:57.786027 kubelet[2204]: E0906 00:07:57.785963 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:58.787032 kubelet[2204]: E0906 00:07:58.786989 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:07:59.788325 kubelet[2204]: E0906 00:07:59.788286 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:00.789334 kubelet[2204]: E0906 00:08:00.789263 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:01.789510 kubelet[2204]: E0906 00:08:01.789435 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:02.790401 kubelet[2204]: E0906 00:08:02.790334 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:03.791051 kubelet[2204]: E0906 00:08:03.790984 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:04.717013 kubelet[2204]: E0906 00:08:04.716972 2204 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:04.792113 kubelet[2204]: E0906 00:08:04.792048 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:05.793160 kubelet[2204]: E0906 00:08:05.793092 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:06.793291 kubelet[2204]: E0906 00:08:06.793218 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:07.202863 systemd[1]: run-containerd-runc-k8s.io-6956121d4f8a99770960305b7c617e4f03807167558860fb5cf75d70f97c0634-runc.WYPPJz.mount: Deactivated successfully. Sep 6 00:08:07.793965 kubelet[2204]: E0906 00:08:07.793886 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:08.794632 kubelet[2204]: E0906 00:08:08.794564 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:09.794770 kubelet[2204]: E0906 00:08:09.794694 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:10.795693 kubelet[2204]: E0906 00:08:10.795637 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:11.796263 kubelet[2204]: E0906 00:08:11.796191 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:12.796724 kubelet[2204]: E0906 00:08:12.796681 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:13.798378 kubelet[2204]: E0906 00:08:13.798317 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:14.798478 kubelet[2204]: E0906 00:08:14.798408 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:15.799421 kubelet[2204]: E0906 00:08:15.799359 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:16.560163 kubelet[2204]: E0906 00:08:16.559893 2204 controller.go:195] "Failed to update lease" err="Put \"https://172.31.29.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.26.60?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Sep 6 00:08:16.800127 kubelet[2204]: E0906 00:08:16.800082 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:17.801394 kubelet[2204]: E0906 00:08:17.801324 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:18.802208 kubelet[2204]: E0906 00:08:18.802141 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:19.803262 kubelet[2204]: E0906 00:08:19.803195 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:20.803342 kubelet[2204]: E0906 00:08:20.803286 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:21.804033 kubelet[2204]: E0906 00:08:21.803972 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:22.805090 kubelet[2204]: E0906 00:08:22.805049 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:23.805994 kubelet[2204]: E0906 00:08:23.805955 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:24.717519 kubelet[2204]: E0906 00:08:24.717406 2204 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:24.806691 kubelet[2204]: E0906 00:08:24.806660 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:25.808338 kubelet[2204]: E0906 00:08:25.808268 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:26.560990 kubelet[2204]: E0906 00:08:26.560937 2204 controller.go:195] "Failed to update lease" err="Put \"https://172.31.29.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.26.60?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Sep 6 00:08:26.809454 kubelet[2204]: E0906 00:08:26.809412 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:27.811057 kubelet[2204]: E0906 00:08:27.810983 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:28.811855 kubelet[2204]: E0906 00:08:28.811794 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:29.812445 kubelet[2204]: E0906 00:08:29.812379 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:30.812874 kubelet[2204]: E0906 00:08:30.812836 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:31.814088 kubelet[2204]: E0906 00:08:31.814046 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:32.814977 kubelet[2204]: E0906 00:08:32.814937 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:33.816365 kubelet[2204]: E0906 00:08:33.816297 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:34.817339 kubelet[2204]: E0906 00:08:34.817301 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:35.818970 kubelet[2204]: E0906 00:08:35.818877 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:36.561715 kubelet[2204]: E0906 00:08:36.561648 2204 controller.go:195] "Failed to update lease" err="Put \"https://172.31.29.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.26.60?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Sep 6 00:08:36.820183 kubelet[2204]: E0906 00:08:36.820046 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:37.199329 systemd[1]: run-containerd-runc-k8s.io-6956121d4f8a99770960305b7c617e4f03807167558860fb5cf75d70f97c0634-runc.pp5X2f.mount: Deactivated successfully. Sep 6 00:08:37.820658 kubelet[2204]: E0906 00:08:37.820588 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:38.821746 kubelet[2204]: E0906 00:08:38.821676 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:39.822216 kubelet[2204]: E0906 00:08:39.822175 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:40.823997 kubelet[2204]: E0906 00:08:40.823935 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:41.824871 kubelet[2204]: E0906 00:08:41.824809 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:42.825883 kubelet[2204]: E0906 00:08:42.825823 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:43.826531 kubelet[2204]: E0906 00:08:43.826489 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:44.717485 kubelet[2204]: E0906 00:08:44.717424 2204 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:44.828246 kubelet[2204]: E0906 00:08:44.828175 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:45.828573 kubelet[2204]: E0906 00:08:45.828535 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:46.562540 kubelet[2204]: E0906 00:08:46.562470 2204 controller.go:195] "Failed to update lease" err="Put \"https://172.31.29.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.26.60?timeout=10s\": context deadline exceeded" Sep 6 00:08:46.595224 kubelet[2204]: E0906 00:08:46.595145 2204 controller.go:195] "Failed to update lease" err="Put \"https://172.31.29.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.26.60?timeout=10s\": read tcp 172.31.26.60:46162->172.31.29.17:6443: read: connection reset by peer" Sep 6 00:08:46.595489 kubelet[2204]: I0906 00:08:46.595234 2204 controller.go:115] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Sep 6 00:08:46.596078 kubelet[2204]: E0906 00:08:46.595991 2204 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.29.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.26.60?timeout=10s\": dial tcp 172.31.29.17:6443: connect: connection refused" interval="200ms" Sep 6 00:08:46.797670 kubelet[2204]: E0906 00:08:46.797618 2204 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.29.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.26.60?timeout=10s\": dial tcp 172.31.29.17:6443: connect: connection refused" interval="400ms" Sep 6 00:08:46.830016 kubelet[2204]: E0906 00:08:46.829919 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:47.199217 kubelet[2204]: E0906 00:08:47.199168 2204 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.29.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.26.60?timeout=10s\": dial tcp 172.31.29.17:6443: connect: connection refused" interval="800ms" Sep 6 00:08:47.830706 kubelet[2204]: E0906 00:08:47.830624 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:48.831128 kubelet[2204]: E0906 00:08:48.831077 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:49.832643 kubelet[2204]: E0906 00:08:49.832584 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:50.834342 kubelet[2204]: E0906 00:08:50.834284 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:51.835507 kubelet[2204]: E0906 00:08:51.835464 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:52.837225 kubelet[2204]: E0906 00:08:52.837156 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:53.838237 kubelet[2204]: E0906 00:08:53.838166 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:54.838505 kubelet[2204]: E0906 00:08:54.838437 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:55.839463 kubelet[2204]: E0906 00:08:55.839421 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:56.840659 kubelet[2204]: E0906 00:08:56.840618 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:57.842027 kubelet[2204]: E0906 00:08:57.841966 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:58.001079 kubelet[2204]: E0906 00:08:58.001012 2204 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.29.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.26.60?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" interval="1.6s" Sep 6 00:08:58.843055 kubelet[2204]: E0906 00:08:58.843015 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:08:59.844287 kubelet[2204]: E0906 00:08:59.844249 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:09:00.845944 kubelet[2204]: E0906 00:09:00.845874 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:09:01.846116 kubelet[2204]: E0906 00:09:01.846043 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:09:02.846994 kubelet[2204]: E0906 00:09:02.846956 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:09:03.847965 kubelet[2204]: E0906 00:09:03.847888 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:09:04.716879 kubelet[2204]: E0906 00:09:04.716812 2204 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:09:04.849105 kubelet[2204]: E0906 00:09:04.849044 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:09:05.849608 kubelet[2204]: E0906 00:09:05.849566 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:09:06.851087 kubelet[2204]: E0906 00:09:06.851048 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:09:07.200766 systemd[1]: run-containerd-runc-k8s.io-6956121d4f8a99770960305b7c617e4f03807167558860fb5cf75d70f97c0634-runc.Kg3I11.mount: Deactivated successfully. Sep 6 00:09:07.852836 kubelet[2204]: E0906 00:09:07.852773 2204 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"